Strategies to Security a Cloud Misconfiguration Assault