While rare, attacks directly aimed at the infrastructure layers can happen, like the Kubernetes man-in-the-middle attack that was disclosed publicly on December 8th, 2020.
But usually, vulnerabilities in infrastructures are not to be directly compared to what they mean in the more generic sense of the word for applications developers. The major part of the issues related to security in infrastructures come from a lack of compliance with some standards, which is why the way we write our Infrastructure as Code matters.
Things like an insecure AWS S3 bucket or an EC2 instance that is open to all can leave you open to a potentially tremendous breach. Similarly, a container running without root user control, hard-coded credentials in the configuration of a VM, and other such practices are vulnerabilities that you should fix as quickly as you can.
And Obviously, we here at driftctl would say that infrastructure drift is one of the key elements that you should be monitoring since any blind spot is a source of potential security issues, but just this once, we are not going to focus on that. 🙂