Malware injection
Attack tree
1 Injection
1.1 XSS
1.2 SQLi
1.3 Using a service (SaaS or PaaS)
1.4 Affecting served images (IaaS)
Notes
XSS and SQLi attacks also work in the cloud. And there are additional vectors of attack for malware injection in the cloud. Attackers may be able to use the access acquired through other attacks to inject malicious content into served images or cloud services.
Good controls for integrity management are less often considered