CS Notes Unit-3
CS Notes Unit-3
Cloud security threats and vulnerabilities are any potential dangers to the security of cloud
infrastructure, which includes the hardware, software, and network resources that support cloud
computing services.
Cloud security threats are malicious actions that can be taken against cloud infrastructure by
attackers to gain unauthorized access, steal data, disrupt operations, or cause other damage. Some
common cloud security threats include:
Misconfiguration
Misconfiguration of cloud resources is one of the most common causes of cloud data breaches.
Misconfigurations can occur accidentally, or they can be exploited by attackers to gain unauthorized
access. A recent study by IBM found that 95% of cloud security incidents are caused by human error,
and misconfiguration is the most common type of human error.
Cloud resources are often complex and can be easily misconfigured, either accidentally or
intentionally by attackers. Misconfigurations can expose cloud resources to the public internet, leave
sensitive data unencrypted, or grant excessive permissions to users.
• Exposing cloud resources to the public internet without proper authentication and
authorization controls.
Organizations can help to prevent misconfigurations by implementing a strong cloud security posture
management (CSPM) program. CSPM programs use automation to continuously monitor cloud
resources for misconfigurations and to notify organizations of any potential security issues.
Unauthorized access
Unauthorized access to cloud resources can occur when attackers steal or crack user credentials, or
when they exploit security vulnerabilities in cloud infrastructure. Attackers can also exploit security
vulnerabilities in cloud infrastructure to gain unauthorized access. For example, an attacker might
exploit a vulnerability in a cloud API to gain access to sensitive data.
Organizations can help to protect against unauthorized access by implementing strong identity and
access management (IAM) controls and by regularly patching and updating software.
1|Page
• Phishing attacks: Attackers send fraudulent emails or text messages that appear to be from a
legitimate source, such as a cloud provider. These messages often contain links to malicious
websites or attachments that install malware on the victim's device.
• Password brute-force attacks: Attackers use software to try to guess user passwords by trying
a large number of possible combinations.
• Password spraying attacks: Attackers try to guess common passwords or password patterns
against a large number of user accounts.
Insecure cloud interfaces and APIs can be exploited by attackers to gain unauthorized access to cloud
resources or to launch attacks against cloud services. Cloud interfaces and APIs provide a way for
users and applications to interact with cloud resources. If these interfaces and APIs are not properly
secured, they can be exploited by attackers to gain unauthorized access to cloud resources or to
launch attacks against cloud services.
• APIs that have known security vulnerabilities that have not been patched.
For example, an attacker might exploit an insecure API to steal data or to launch a denial-of-service
attack.
Organizations can help to protect against insecure interfaces and APIs by implementing strong API
security best practices, such as using strong authentication and authorization controls and by
regularly testing APIs for security vulnerabilities.
Malicious insiders
Malicious insiders are employees or contractors who have authorized access to cloud resources but
who abuse that access for malicious purposes. Some common examples of malicious insider activity
include:
Malicious insiders can pose a significant threat to cloud security because they have trusted access to
cloud resources and may be able to bypass security controls.
Organizations can help to protect against malicious insiders by implementing strong security controls,
such as role-based access control (RBAC) and two-factor authentication (2FA). Organizations should
2|Page
also conduct regular security audits and employee training programs to help identify and prevent
malicious insider activity.
Cyberattacks
Cyberattacks such as denial-of-service attacks, malware attacks, and phishing attacks can be launched
against cloud infrastructure to disrupt operations or steal data. Some common examples of
cyberattacks against cloud infrastructure include:
• Malware attacks: Attackers install malware on cloud resources to steal data, disrupt
operations, or launch further attacks.
• Phishing attacks: Attackers send fraudulent emails or text messages that appear to be from a
legitimate source, such as a cloud provider. These messages often contain links to malicious
websites or attachments that install malware on the victim's device.
For example, an attacker might launch a DDoS attack against a cloud service to make it unavailable to
legitimate users. Or, an attacker might launch a malware attack against a cloud server to steal data or
to disrupt operations.
Organizations can help to protect against cyberattacks by implementing strong security controls, such
as firewalls, intrusion detection systems, and intrusion prevention systems. Organizations should also
regularly monitor their cloud environment for suspicious activity.
Cloud security vulnerabilities are weaknesses in cloud infrastructure or services that can be exploited
by attackers to carry out threats. Some common cloud security vulnerabilities include:
• Insecure default configurations: Cloud resources often have default configurations that are
not secure. Attackers can exploit these default configurations to gain unauthorized access or
to launch attacks.
• Weak passwords and authentication: Weak passwords and authentication controls can make
it easy for attackers to steal user credentials and gain unauthorized access to cloud
resources.
• API vulnerabilities: Insecure APIs can contain vulnerabilities that can be exploited by
attackers to gain unauthorized access to cloud resources or to launch attacks against cloud
services.
• Data storage vulnerabilities: Cloud storage services can contain vulnerabilities that can allow
attackers to steal or corrupt data.
3|Page
Protecting cloud infrastructure from threats and vulnerabilities
There are a number of steps that organizations can take to protect their cloud infrastructure from
threats and vulnerabilities, including:
• Implement strong identity and access management (IAM) controls. IAM controls ensure that
only authorized users have access to cloud resources. Organizations should implement IAM
controls such as role-based access control (RBAC) and two-factor authentication (2FA).
• Regularly patch and update software. Software vendors regularly release patches and
updates to address known security vulnerabilities. Organizations should regularly apply these
patches and updates to their cloud infrastructure and applications.
• Securely configure cloud resources. Cloud resources often have default configurations that
are not secure. Organizations should securely configure their cloud resources by following
best practices provided by their cloud provider.
• Monitor cloud activity for suspicious activity. Organizations should monitor their cloud
activity for suspicious activity such as unusual login attempts, unauthorized access to
resources, and unusual data exfiltration.
• Have a plan for responding to cloud security incidents. Organizations should have a plan in
place for responding to cloud security incidents. This plan should include steps for
identifying, containing, eradicating, and recovering from incidents.
By taking these steps, organizations can help to protect their cloud infrastructure from threats and
vulnerabilities.
Usually, cloud data is stored in an encrypted form, meaning that anyone needing
data access needs a digital key. Not to mention that the data itself is stored across a
large fleet of servers with multiple backups. This is done to protect the information in
case of a server malfunction or a cyberattack.
Let’s consider an example: An API endpoint hosted in the cloud and exposed to
the public Internet is a risk, the attacker who tries to access sensitive data using
that API is the threat (along with any specific techniques they could try), and
your organization’s challenge is effectively protecting public APIs while keeping
them available for legitimate users or customers who need them.
5|Page
While the cloud is much safer than device storage, it's important to note that no
security system is uncrackable. A broad spectrum of cybersecurity risks applies to
cloud infrastructure that could compromise your data.
Most business owners view data loss as their biggest cloud security concern.
Leaking financial or customer data threatens customer trust, which can cause long-
lasting revenue loss. As the security responsibilities are shared between a cloud
service provider and a client, there's always a risk of failure to secure the network
properly. The servers should also be properly equipped to withstand DDoS attacks.
Misconfigurations
Your data is as secure as strong is the weakest component within its chain. If the
only thing that your employees need is a username and a password, this is
something that could be easily exploited. Generally, the rule is to protect sensitive
assets with a corresponding level of authentication mechanisms. The more sensitive
the data, the more authentication layers it should have.
Hackers don't need to penetrate your internal networks when the data is hosted in
the cloud. This means that hijacking your administrator's account and posing as one
could be enough to gain direct access to the cloud-hosted data. It requires less effort
to pull off than bypassing various cybersecurity defenses that could be deployed
internally.
API insecurities
6|Page
points that hackers will check first when attempting to penetrate a network. Here's
the list of the top cloud vulnerabilities.
Open S3 bucket
An Amazon S3 bucket is a public cloud storage resource used within Amazon Web
Services. Buckets are similar to folders as they consist of data and descriptive
metadata. According to various reports, poorly configured S3 buckets contribute to
a significant portion of cloud security data breaches. Some of the companies that
were recently affected by these misconfigurations that resulted in a data breach
were Netflix and Capital One. This allowed some of the private buckets to be
accessible to anyone interested. Therefore, when using cloud services, it's critical to
implement proper access rules.
One of the trickiest parts of cloud data management is data deletion. On the one
hand, it's a process that should be done irreversibly. On the other hand, an
administrator must ensure that there are no backups left.
In cases when multiple tenants are sharing the infrastructure, data should be deleted
without the possibility of retrieving it. It's not enough to wipe the hard drive and hope
for the best. The data should be overwritten with blank tables and then deleted
again.
As for the data backups, this requires full visibility of where they are kept. There
shouldn't be any unsupervised copies lying in the cloud as, over time, this data could
find its way to hackers. That said, in most cases, data deletion must follow the cloud
provider's procedures, so it will likely be a joint effort. Although some cloud service
providers may have different requirements.
Lambda function is an AWS computing service that allows running code without
provisioning or managing servers. It can execute code when needed, ranging from a
few daily requests to thousands per second. The service model allows using this tool
per the computed time only. It's a convenient tool that tests any application or
backend service.
As the user function is serverless, this greatly increases the potential attack surface.
The function can be launched from various events like database changes, code
modifications, notifications, and other events. This means that a hacker can try to
inject an unexpected event into the vulnerable function, which is then passed down
to the OS-level application. It's potentially devastating to the stored data as the
hacker could obtain direct access to the cloud using this vulnerability.
7|Page
The multitenancy model helps drive costs low — multiple customers are using the
same software instance, which is installed on multiple servers. User data and
resources are located in the same computing cloud, controlled and distinguished by
various unique identifiers. Naturally, the risks associated with this model arise from
the shared model itself, as the used computer hardware is the same for multiple
clients.
Summary
While cloud computing is an incredible opportunity for most businesses to reorganize
their infrastructure flexibly, this doesn't come without a price. While, by default, cloud
security provides much more safety than locally hosted data, there's much that an
organization should keep in consideration when setting it up.
Like most systems, cloud computing isn't without its weak points. The majority of
data breaches result from misconfigurations and poor authentication controls. It's
important to emphasize that cloud security isn't given. The high status of security has
to be maintained.
Then, there are quite many vulnerabilities that a hacker could exploit when planning
an attack on your cloud. Network administrators should be in the loop about the
latest developments regarding S3 bucket exploits and be very cautious regarding the
deletion of backups and other data. Only by timely addressing various cloud risks
can it be possible to create a secure model that helps businesses achieve their
goals.
However, with the array of benefits that the cloud offers, data
security is amongst the key concerns holding back enterprises from
adopting cloud solutions. To back this up, a survey found that 93%
of companies are moderately to extremely concerned about cloud
computing security risks.
In the 2020 cloud security report, there are mixed reviews of whether cloud adoption will
improve enterprises’ security.
45% of those surveyed said that both the security of cloud applications and on-premises
applications are the same. 28% of respondents said that cloud apps are more secure than on-
premises apps while 27% were concerned that cloud apps are less secure than on-premises
apps.
The same survey highlighted that 93% of respondents were extremely concentrated on public
cloud security. These data show that enterprises recognize that cloud adoption is inherently
safe but are battling with their responsibility to use it securely.
Companies, which leverage cloud technologies without being aware of the cloud security
risks open themselves up for myriad financial and technical risks. Let’s break down the top
security risks that come with adopting cloud technologies and tips to mitigate them.
10 | P a g e
Unauthorized access involves individuals accessing enterprise data, networks, endpoints,
devices, or applications, without having proper permissions. The good news is that poor
access control can be tackled through security solutions in combinations with access
management policies. Indusface’s Web Application Firewall allows blocking of access to
cloud applications based on IP, countries, GEO location, and many more. It provides
complete tracking, monitoring as well as reporting of app access, enabling enterprises to
comply with data security regulations.
Tips to prevent Poor Access Management
• Develop a data governance framework for all user accounts. All user accounts should be
connected directly to the central directory services like Active Directory that can monitor and
revoke access privileges.
• You can use third-party security tools to regularly pull lists of users, privileges, groups, and
roles from cloud service environments. Then your security team can sort and analyze it.
• You should also keep logging and event monitoring mechanisms in place to detect
unauthorized changes and unusual activity.
• Have an excess of bandwidth on your enterprise’s internet connection. The more bandwidth
you have, the more hackers must do to flood its connection.
• Discover vulnerabilities in your system – scan your network and system to determine
vulnerabilities with web application scanning tools to find vulnerabilities, which can be
exploited to execute DDoS attacks. Implement security controls to fix the detected security
issues.
• Keep a backup internet connection – a backup connection with a separate pool of IP
addresses provides an alternate path in case the primary circuit is flooded with requests.
• Configure WAF rules to filter out the malicious IPs – Configure your WAF firewall with custom
rules to monitor and filter out traffic based on your requirements.
11 | P a g e
3. Cloud Misconfiguration
Three-quarters of all enterprises on the cloud are suffering from some sort of cloud
misconfiguration, which affects security. Common weaknesses include default passwords,
inadequate access restrictions, mismanaged permission controls, inactive data encryption, and
many more. Many of these vulnerabilities result from insider threats and a lack of security
awareness.
• Get to know your Cloud – Learn all the services, settings, and permissions of your cloud
services, and never forgot to leverage the benefits of integrated security features.
• Modify credentials and permissions – thoroughly check the default credentials and set up
multi-factor authentication to ensure an extra layer of security.
• Regularly audit your cloud asset – Don’t assume that properly configured cloud settings will
remain the same for a long time. Proper auditing and monitoring can help you to identify the
sign of misconfigurations.
• Choose the right security solutions – The best cloud security service providers like Indusface
can provide a complete package of features, which includes security management, threat
detection, and intrusion prevention.
Especially this is high risks in the cloud since it is a shared environment, a single
vulnerability on the cloud opens the whole environment to be compromised leading to data
breaches and loss.
12 | P a g e
Tips to avoid the risk of Data Leaks
• Encrypt Data – Sensitive data should not be in your cloud environment without being
encrypted.
• Change Password – Store all your passwords in a safer place. Be smarter while you choose a
password and increase the frequency in which they’ve changed.
• Set Permissions – Not all employees need the same level of access to your sensitive files.
Assign permissions based on a ‘need to know’ basis to prevent the wrong people from
accessing.
• Educate your staff – Train your staff to prevent them from inadvertently leaking sensitive
information.
5. Insecure API
The adoption of APIs is advantageous for businesses, but it is a nightmare for the security
team.
Though APIs are meant to streamline cloud computing processes, they are not always black
& white. There is a gray area where APIs if left unsecured can allow hackers to exploit
private details. Insufficient API security is one of the major causes of cloud data
breaches. Gartner predicts that by 2022, APIs will be the most common vector used
frequently in cyber-attacks.
Best Practices for API security
Wrapping up
The shift to a cloud environment provides companies much need scalability and flexibility to
remain competitive in the unstable business environment. At the same time, remember, cloud
migration exposes your firm to security vulnerabilities if you don’t leverage security best
practices. Don’t let this happen to you. Be proactive to prevent them in the first attempt!
13 | P a g e
Top 15 Cloud Security Issues,
Threats and Concerns
Nearly 94% of organizations state that they are "moderately to extremely concerned"
about cloud security. Here are the main reasons why there's so much worry
surrounding cloud security:
• Many organizations have a hard time figuring out where cloud provider's
security responsibilities end and their own responsibilities begin.
• There's a lack of visibility into exactly how providers house and protect cloud-
based data and assets.
• The expansiveness of the cloud significantly increases the attack surface.
• Many tried-and-tested security controls (e.g., traditional firewalls and IDSes)
are less effective when protecting cloud workloads and assets.
Let's dive into the top cloud security risks you must plan for to stay safe while
operating in the cloud.
According to Gartner, 99% of all cloud security failures will be due to human error by
2025. Stay safe by ensuring teams understand cloud-related risks and their role in
keeping threats at bay.
Misconfiguration
Misconfigurations of cloud security settings are a leading cause of cloud
data breaches. Many organizations’ cloud security posture
management strategies are inadequate for protecting their cloud-based
infrastructure.
Unauthorized Access
Unlike an organization’s on-premises infrastructure, their cloud-based
deployments are outside the network perimeter and directly accessible
from the public Internet. While this is an asset for the accessibility of this
infrastructure to employees and customers, it also makes it easier for an
attacker to gain unauthorized access to an organization’s cloud-based
resources. Improperly-configured security or compromised credentials can
enable an attacker to gain direct access, potentially without an
organization’s knowledge.
15 | P a g e
Insecure Interfaces/APIs
CSPs often provide a number of application programming interfaces (APIs)
and interfaces for their customers. In general, these interfaces are well-
documented in an attempt to make them easily-usable for a CSP’s
customers.
Hijacking of Accounts
Many people have extremely weak password security, including password
reuse and the use of weak passwords. This problem exacerbates the
impact of phishing attacks and data breaches since it enables a single
stolen password to be used on multiple different accounts.
Lack of Visibility
An organization’s cloud-based resources are located outside of the
corporate network and run on infrastructure that the company does not
own. As a result, many traditional tools for achieving network visibility are
16 | P a g e
not effective for cloud environments, and some organizations lack cloud-
focused security tools. This can limit an organization’s ability to monitor
their cloud-based resources and protect them against attack.
While this easy data sharing is an asset, it can also be a major cloud
security issue. The use of link-based sharing – a popular option since it is
easier than explicitly inviting each intended collaborator – makes it difficult
to control access to the shared resource. The shared link can be forwarded
to someone else, stolen as part of a cyberattack, or guessed by a
cybercriminal, providing unauthorized access to the shared resource.
Additionally, link-based sharing makes it impossible to revoke access to
only a single recipient of the shared link.
Malicious Insiders
Insider threats are a major security issue for any organization. A malicious
insider already has authorized access to an organization’s network and
some of the sensitive resources that it contains. Attempts to gain this level
of access are what reveals most attackers to their target, making it hard for
an unprepared organization to detect a malicious insider.
17 | P a g e
Cyberattacks
Cybercrime is a business, and cybercriminals select their targets based
upon the expected profitability of their attacks. Cloud-based infrastructure is
directly accessible from the public Internet, is often improperly secured, and
contains a great deal of sensitive and valuable data. Additionally, the cloud
is used by many different companies, meaning that a successful attack can
likely be repeated many times with a high probability of success. As a
result, organizations’ cloud deployments are a common target of
cyberattacks.
This means that a successful Denial of Service (DoS) attack against cloud
infrastructure is likely to have a major impact on a number of different
companies. As a result, DoS attacks where the attacker demands a ransom
to stop the attack pose a significant threat to an organization’s cloud-based
resources.
Data Loss/Leakage
18 | P a g e
Cloud-based environments make it easy to share the data stored within
them. These environments are accessible directly from the public Internet
and include the ability to share data easily with other parties via direct email
invitations or by sharing a public link to the data.
The ease of data sharing in the cloud – while a major asset and key to
collaboration in the cloud – creates serious concerns regarding data loss or
leakage. In fact, 69% of organizations point to this as their greatest
cloud security concern. Data sharing using public links or setting a cloud-
based repository to public makes it accessible to anyone with knowledge of
the link, and tools exist specifically for searching the Internet for these
unsecured cloud deployments.
Data Privacy/Confidentiality
Data privacy and confidentiality is a major concern for many organizations.
Data protection regulations like the EU’s General Data Protection
Regulation (GDPR), the Health Insurance Portability and Accessibility Act
(HIPAA), the Payment Card Industry Data Security Standard (PCI DSS)
and many more mandate the protection of customer data and impose strict
penalties for security failures. Additionally, organizations have a large
amount of internal data that is essential to maintaining competitive
advantage.
Placing this data on the cloud has its advantages but also has created
major security concerns for 66% of organizations. Many organizations have
adopted cloud computing but lack the knowledge to ensure that they and
their employees are using it securely. As a result, sensitive data is at risk of
exposure – as demonstrated by a massive number of cloud data breaches.
19 | P a g e
Phishers commonly use cloud applications and environments as a pretext
in their phishing attacks. With the growing use of cloud-based email (G-
Suite, Microsoft 365, etc.) and document sharing services (Google Drive,
Dropbox, OneDrive), employees have become accustomed to receiving
emails with links that might ask them to confirm their account credentials
before gaining access to a particular document or website.
Incident Response
Many organizations have strategies in place for responding to internal
cybersecurity incidents. Since the organization owns all of their internal
network infrastructure and security personnel are on-site, it is possible to
lock down the incident. Additionally, this ownership of their infrastructure
means that the company likely has the visibility necessary to identify the
scope of the incident and perform the appropriate remediation actions.
20 | P a g e
When moving data protected by these and similar regulations to the cloud,
achieving and demonstrating regulatory compliance can be more difficult.
With a cloud deployment, organizations only have visibility and control into
some of the layers of their infrastructure. As a result, legal and regulatory
compliance is considered a major cloud security issue by 42% of
organizations and requires specialized cloud compliance solutions.
Data Sovereignty/Residence/Control
Most cloud providers have a number of geographically distributed data
centers. This helps to improve the accessibility and performance of cloud-
based resources and makes it easier for CSPs to ensure that they are
capable of maintaining service level agreements in the face of business-
disrupting events such as natural disasters, power outages, etc.
Organizations storing their data in the cloud often have no idea where their
data is actually stored within a CSP’s array of data centers. This creates
major concerns around data sovereignty, residence, and control for 37% of
organizations. With data protection regulations such as the GDPR limiting
where EU citizens data can be sent, the use of a cloud platform with data
centers outside of the approved areas could place an organization in a
state of regulatory non-compliance. Additionally, different jurisdictions have
different laws regarding access to data for law enforcement and national
security, which can impact the data privacy and security of an
organization’s customers.
21 | P a g e
effectively. For more information about leading cloud security issues and
threats, download the Cloud Security Report.
IAM manages user identities and access to cloud resources. It ensures proper
authentication, authorization, and user management to prevent unauthorized access
while providing granular control over who can access specific cloud resources and what
actions they can perform.
Network and device security reinforces cloud infrastructure and devices against
network-level attacks and ensures proper configuration. This cloud security solution –
which includes firewalls, IdPs, and VPNs – helps protect against DDoS attacks, malware,
and other external threats. Endpoint protection and mobile device management can
also help secure devices used to access cloud resources.
Continuous monitoring, detection, and alerts use tools like IdPs and SIEM systems to
provide real-time monitoring of cloud resources and help organizations respond quickly
22 | P a g e
to security threats. Security monitoring solutions also collect and analyze data from
various sources to identify potential security incidents and generate alerts.
CASBs are a type of cloud security system that acts as a gatekeeper between an
organization’s on-premises infrastructure and the cloud. They can effectively monitor
and enforce security policies across all cloud applications and services, enabling
organizations to gain visibility into cloud usage and enforce compliance with regulatory
requirements.
Data Security
Data Security protects data from unauthorized access, tampering, and loss, using
encryption, data masking, and access controls. It includes securing data at rest, in
transit, and in use. Data loss prevention (DLP) solutions, access control solutions, and
encryption solutions can be used to protect sensitive data in the cloud.
This vital solution involves planning strategies to restore cloud services during a
disaster and minimize downtime. Disaster recovery involves identifying critical data
and applications and establishing recovery time objectives (RTOs) and recovery point
objectives (RPOs) to ensure that data and applications can be restored within
acceptable timeframes.
Legal Compliance
Legal compliance ensures that cloud services comply with legal and regulatory
requirements, including data privacy and protection. Compliance with regulations such
as HIPAA, GDPR, and CCPA is critical for organizations that handle sensitive data. Legal
compliance involves implementing appropriate controls to protect data privacy and
ensuring that cloud services meet regulatory requirements.
Governance
Governance establishes policies and procedures to govern cloud service usage and
ensure proper risk management and compliance reporting. It ensures that cloud
services comply with industry regulations and standards. Governance involves
identifying and managing risks associated with cloud services and establishing
appropriate controls to mitigate them. It also involves establishing policies and
procedures for data classification, access control, and incident response.
23 | P a g e
cloud security tips and best practices to protect their assets against attacks and data
breaches.
Some of the most reliable tips from cloud security resources include:
• Implement a strong password policy and multi-factor authentication.
• Encrypt data both in transit and at rest.
• Regularly back up data and test the recovery process.
• Implement security monitoring and logging to detect and respond to threats.
• Keep systems and software current with the latest patches and updates.
• Limit access to sensitive data and applications to only authorized personnel.
• Conduct regular security audits and risk assessments.
• Establish a clear security incident response plan.
• Train employees on security best practices and make them aware of potential threats.
• Choose a reliable cloud service provider with a good security track record.
A CASB service provides four key types of cloud security system management:
• Visibility. This is a consolidated view of an organization’s cloud service landscape,
including details about users accessing data in cloud services from any device or
location.
• Data Security. Some CASBs provide the ability to enforce data security policies to
prevent unwanted activity. Policies are applied through data loss prevention (DLP)
controls such as audit, alert, block, quarantine, delete and view only.
• Threat Protection. CASBs provide adaptive access controls to prevent unwanted
devices, users, and certain versions of apps from accessing cloud services. Cloud app
access can be changed based on signals observed during and after login.
• Compliance. CASBs help organizations demonstrate that they are governing the use
of cloud services. CASBs assist efforts to conform to data residency and
regulatory compliance requirements.[2]
A study of more than 1,000 cloud service tenants with over 20 million user accounts
found over 15 million unauthorized login attempts in the first half of 2019 alone. More
than 400,000 of these attempts resulted in successful logins. About 85% of tenants were
targeted by cyber-attacks, and 45% had at least one compromised account in their
environment.[3]
24 | P a g e
Cyber criminals tend to target popular SaaS applications like Microsoft Office 365 and
Google G Suite. Just about everyone at your company uses these applications, which
hold the key to business communication and vital data. Attackers use a variety of
techniques and exploit several vulnerabilities to compromise cloud account credentials
and take advantage of vulnerable users, including:
25 | P a g e
• Compliance Risks: Cloud-based systems must comply with various regulations and
standards, such as HIPAA, PCI-DSS, and GDPR. Failure to comply with these
regulations can result in legal and financial penalties.
Today’s attacks target people, not technology. This is just as true for the cloud as it is on-
premises. As businesses move their messaging and collaboration platforms from the
corporate network to the cloud, they become vulnerable to attack.
It’s worth repeating: Cyber criminals tend to target people, not technology, with popular
cloud-delivered SaaS applications such as Microsoft Office 365 or Google G Suite. A
CASB with a broad complement of cloud security solutions offers the best defense
against today’s people-centric threats.
Another vital strategy hinges on access controls, particularly limiting access to cloud
resources to users who require it. This can include implementing role-based access
controls, where users are granted permissions based on their role within the
organization, or using network segmentation to restrict access to specific cloud
resources.
Data backups are a cloud security best practice for data recovery in case of a data leak
or security breach. Backups should be performed regularly and stored in a secure
location separate from your primary data storage. In addition to helping you recover
26 | P a g e
from a data loss, backups also help you comply with regulatory requirements and
ensure business continuity.
Keeping software and systems up to date is an essential security control that helps
mitigate the risk of known vulnerabilities. This includes applying security patches and
updates as soon as they become available, as well as regularly updating antivirus and
other security software.
Monitoring is an essential security control that lets you quickly detect and respond to
security incidents. This can include monitoring network traffic, system logs, and user
activity to identify suspicious behavior and potential security threats.
Stay in Compliance
As your employees, contractors and partners share more data in the cloud, the risk of a
breach increases. You need risk-aware cloud security that connects the dots to detect
and prevent such breaches. In addition, compliance with government regulations and
industry mandates is essential. These include the following: personally identifiable
information (PII) such as Social Security numbers or date of birth; consumer payment
card information (PCI); and protected health information (PHI) such as medical records.
Given the proliferation of cloud-delivered apps, governance of the use of those apps is
essential. The average enterprise has an estimated 1,000 cloud apps, and some have
serious cloud security gaps. They can violate data residency regulations, such as GDPR.
In addition, attackers often use third-party add-ons and social engineering to trick
people into granting broad access to your approved SaaS apps.
In addition to these tips, a CASB with a broad complement of cloud security solutions
with robust detection, remediation, and risk-based authentication capabilities offers the
27 | P a g e
best defense against today’s people-centric threats, including brute-force attacks,
phishing attacks, and malicious file shares.
These elements, along with maintaining confidentiality, integrity, and availability (CIA),
are fundamental to establishing a resilient cloud security architecture that prevents
cyber-attacks and employs targeted action when and where needed.
28 | P a g e
Forrester Vice President and Principal Analyst Andras Cser agreed. “Identity and access in a
CSP’s platforms are everything,” he says. “If you have the keys to the kingdom, you can’t just
enter it but reconfigure it—a major threat to operational stability and security of any
organization.”
“Attackers no longer try to brute-force their way into enterprise infrastructure,” adds Hank
Schless, a senior manager for security solutions at Lookout, a provider of mobile phishing
solutions. “With so many ways to compromise and steal corporate credentials, the preferred
tactic is to pose as a legitimate user in order to avoid detection.”
As more organizations migrate their applications to the cloud, identity management continues
to be a hot button issue, asserts Tushar Tambay, vice president of product development for data
protection solutions at Entrust, a digital security and credential issuance company. “With many
companies still working remotely as well, IT teams have to verify the identities of employees
working from anywhere at any time on any device,” he says. “Additionally, businesses are
engaging with customers and partners in the cloud.”
Tambay adds that key management needs to be prioritized, too. “Strong key management can
keep data secure and help ensure that trusted parties only have access to data that is absolutely
necessary,” he says. “Unfortunately, securing data through encryption can often cause a bit of a
key management headache due to the growing number of keys.”
Identity management is almost entirely on the user to manage properly, says Daniel Kennedy,
research director for information security and networking at 451 Research. “The cloud
providers provide help, but the flexibility of cloud platforms come with a requirement to
effectively manage user and system access and privileges,” he says. “It’s one of the primary
responsibilities of the enterprise leveraging cloud in a shared responsibility model, and thus
figures prominently in their assessment of risk.”
Key takeaways about access and identity management identified in the report include:
• Discrete user and application-based isolation is required to achieve a robust zero trust-
layer beyond simple authentication.
• Advanced tools are only part of the story, such as cloud infrastructure entitlement
management (CIEM). Operational policies and structured risk models are also vital.
• Trust is more than giving keys and codes. It’s earned. User objects must be given risk
scores that dynamically adjust as the business requires.
29 | P a g e
2. Insecure interfaces and APIs
APIs and similar interfaces potentially include vulnerabilities due to misconfiguration, coding
vulnerabilities, or a lack of authentication and authorization among other things, the report
stated. These oversights can potentially leave them vulnerable to malicious activity.
It added that organizations face a challenging task in managing and securing APIs. For
example, the velocity of cloud development is greatly accelerated. Processes that took days or
weeks using traditional methods can be completed in seconds or minutes in the cloud. Using
multiple cloud providers also adds complexity, it continues, as each provider has unique
capabilities that are enhanced and expanded almost daily. This dynamic environment requires
an agile and proactive approach to change control and remediation that many companies have
not mastered.
• The attack surface provided by APIs should be tracked, configured, and secured.
A serious problem with misconfiguration errors is they can be magnified by the cloud. “One of
the biggest advantages of the cloud is its scalability and the way it enables us to create
interconnected services for smoother workflows,” Schless says. “However, this also means that
one misconfiguration can have magnified ramifications across multiple systems.”
30 | P a g e
Key takeaways about misconfiguration and inadequate change control include:
2. Change management approaches must reflect the unceasing and dynamic nature of
continuous business transformations and security challenges to ensure approved
changes are made properly using real-time automated verification.
Those problems can be compounded when multiple cloud providers are involved. “Leveraging
cloud providers is certainly no longer novel, but the security product space continues to emerge
and evolve around the cloud,” Kennedy says. “As examples, early on we saw cloud workload
security emerge as an approach to provide common third-party security functions.”
“Most security folks looking after cloud security must consider what mix of default controls
from the cloud provider, premium controls from the same, and what third-party security
product offerings address their specific risk profile, and sometimes that profile is different at
the application level. It introduces a lot of complexity in the face of emerging threats,”
Kennedy adds.
Key takeaways about the lack of cloud security architecture and strategy include:
• Companies should consider business objectives, risk, security threats, and legal
compliance in cloud services and infrastructure design and decisions.
• Given the rapid pace of change and limited centralized control in cloud deployments,
it’s more important, not less, to develop and adhere to an infrastructure strategy and
design principles.
• Adopters are advised to consider due diligence and vendor security assessment
foundational practices. They should be complemented with secure design and
integration to avoid the kinds of systemic failures that occurred in the, SolarWinds,
Kaseya and Bonobos breaches.
31 | P a g e
5. Insecure software development
While the cloud can be a powerful environment for developers, organizations need to make
sure developers understand how the shared responsibility model affects the security of their
software. For example, a vulnerability in Kubernetes could be the responsibility of a CSP,
while an error in a web application using cloud-native technologies could be the responsibility
of the developer to fix.
• By leveraging shared responsibility, items like patching can be owned by a CSP rather
than the business.
• CSPs place an importance on security and will provide guidance on how to implement
services in a secure fashion.
• You can’t prevent vulnerabilities in code or products you didn’t create, but you can
make a good decision about which product to use. Look for the products that are
officially supported. Also, consider those with compliance certifications, that openly
speak about their security efforts, that have a bug bounty program, and that treat their
users responsibly by reporting security issues and delivering fixes quickly.
• Identify and track the third parties you are using. You don’t want to find out you’ve
been using a vulnerable product only when the list of victims is published. This
includes open source, SaaS products, cloud providers, and managed services, and
other integrations you may have added to your application.
32 | P a g e
• Perform a periodic review of the third-party resources. If you find products you don’t
need, remove them and revoke any access or permissions you may have granted them
into your code repository, infrastructure or application.
• Don’t be the weakest link. Penetration-test your application, teach your developers
about secure coding, and use static application security testing (SAST) and dynamic
application security testing (DAST) solutions.
7. System vulnerabilities
These are flaws in a CSP that can be used to compromise confidentiality, integrity and
availability of data, and disrupt service operations. Typical vulnerabilities include zero days,
missing patches, vulnerable misconfiguration or default settings, and weak or default
credentials that attackers can easily obtain or crack.
• System vulnerabilities are flaws within system components often introduced through
human error, making it easier for hackers to attack your company’s cloud services.
• Security risks due to system vulnerabilities can be greatly minimized through routine
vulnerability detection and patch deployment combined with rigorous IAM practices.
• What is effectively exposed from the cloud environment? Choose exposure engines
that have full visibility of your cloud environment to identify any routing or network
33 | P a g e
services that allow traffic to be exposed externally. This includes load balancers,
application load balancers, content delivery networks (CDNs), network peering, and
cloud firewalls.
• Assess external exposure from a Kubernetes cluster. The exposure engine must factor
in many Kubernetes networking components, including cluster IPs, Kubernetes
services, and ingress rules.
• Reduce access exposure by ensuring that the database is configured to the least-
privileged IAM policy, and that assignments of this policy are controlled and
monitored.
While some of that responsibility can be offloaded to a CSP through the use of serverless and
containerized workloads, for most organizations, lack of control of cloud infrastructure limits
mitigation options for application security issues and the visibility of traditional security
tooling. That’s why the report recommended building strong organizational practices around
cloud hygiene, application security, observability, access control, and secrets management to
reduce the blast radius of an attack. Key takeaways about misconfiguration and exploitation of
serverless and container workloads include:
• Investments should be made into cloud security training, governance processes, and
reusable secure cloud architecture patterns to reduce the risk and frequency of
insecure cloud configurations.
• Development teams should put extra rigor around strong application security and
engineering best practices before migrating to serverless technologies that remove
traditional security controls.
Advanced persistent threat (APT) groups typically focus their thieving ways at data acquisition.
Those groups are closely studied by threat intelligence outfits, who publish detailed reports on
the groups’ methods and tactics. The CSA report recommended organizations use those reports
34 | P a g e
to stage “red team” exercises to better protect themselves from APT attacks, as well as perform
threat-hunting exercises to identify the presence of any APTs on their networks.
• Understand any relevant APT groups and their tactics, techniques and procedures
(TTPs).
• Conduct offensive security exercises to simulate the TTPs of these APT groups.
• Ensure security monitoring tools are tuned to detect TTPs of any relevant APT
groups.
While the cloud can be a convenient place to store data, the report continued, it also offers
multiple ways to exfiltrate it. To protect against exfiltration, organizations have begun turning
to a zero-trust model where identity-based security controls are used to provide least privileged
access to data.
• To detect and prevent attacks and data exfiltration, apply the CSP’s best practices
guides, monitoring and detection capabilities.
• If not limited by business, client-side encryption can provide protection from external
attackers or CSP malicious insiders. Overall, encryption is not always feasible, due to
implementation considerations. Classifying data can help in setting different controls,
and if exfiltration happens, assessing the impact and recovery actions required.
1. Zero-Day Exploits
2. Advanced Persistent Threats
3. Insider Threats
4. Cyberattacks
36 | P a g e
1. Zero-day exploits
Cloud is “someone else’s computer.” But as long as you’re using computers and
software, even those run in another organization’s data center, you’ll encounter
the threat of zero-day exploits.
APTs aren’t a quick “drive-by” attack. The attacker stays within the environment,
moving from workload to workload, searching for sensitive information to steal
and sell to the highest bidder. These attacks are dangerous because they may
start using a zero-day exploit and then go undetected for months.
3. Insider threats
4. Cyberattacks
There are so many specific attacks; it’s a challenge to protect against them all.
But here are three guidelines to use when protecting your cloud assets from
these threats and others.
37 | P a g e
4 cloud security challenges
Challenges are the gap between theory and practice. It’s great to know you need
a cloud security strategy. But where do you start? How do you tackle cultural
change? What are the daily practical steps to make it happen?
What are four cloud security challenges every company faces when
embracing the cloud?
Traditional data center security models are not suitable for the cloud.
Administrators must learn new strategies and skills specific to cloud computing.
Cloud may give organizations agility, but it can also open up vulnerabilities for
organizations that lack the internal knowledge and skills to understand security
challenges in the cloud effectively. Poor planning can manifest itself in
misunderstanding the implications of the shared responsibility model, which lays
out the security duties of the cloud provider and the user. This misunderstanding
could lead to the exploitation of unintentional security holes.
Identity and Access Management (IAM) is essential. While this may seem
obvious, the challenge lies in the details.
It’s a daunting task to create the necessary roles and permissions for an
enterprise of thousands of employees. There are three steps to a holistic IAM
strategy: role design, privileged access management, and implementation.
Begin with a solid role design based on the needs of those using the cloud.
Design the roles outside of any specific IAM system. These roles describe the
work your employees do, which won’t change between cloud providers.
Next, a strategy for privileged access management (PAM) outlines which roles
require more protection due to their privileges. Tightly control who has access to
privileged credentials and rotate them regularly.
Finally, it’s time to implement the designed roles within the cloud provider’s IAM
service. This step will be much easier after developing these ahead of time.
38 | P a g e
3. Shadow IT
The adoption of DevOps complicates matters. Cloud and DevOps teams like to
run fast and without friction. However, obtaining the visibility and management
levels that the security teams require is difficult without hampering DevOps
activities. DevOps needs a frictionless way to deploy secure applications and
directly integrate with their continuous integration/continuous delivery (CI/CD)
pipeline. There needs to be a unified approach for security teams to get the
information they need without slowing down DevOps. IT and security need to find
solutions that will work for the cloud — at DevOps’ velocity.
4. Cloud compliance
Organizations have to adhere to regulations that protect sensitive data like PCI
DSS and HIPAA. Sensitive data includes credit card information, healthcare
patient records, etc. To ensure compliance standards are met, many
organizations limit access and what users can do when granted access. If
access control measures are not set in place, it becomes a challenge to monitor
access to the network.
EXPERT TIP
Stay up to date with the most common cloud security frameworks meant to
protect your environments and all sensitive data that lives within.
• Keep all cloud services, VMs, and containers up to date with the latest
security patches.
• Use multi-factor authentication (MFA) for all user accounts.
• Use enterprise password management to centralize credential handling and
ensure everyone in the organization uses strong passwords.
• Define and enforce company-wide cloud security policies. Remember to
regularly review and update policies to adapt to evolving threats.
• Implement zero-trust security and the principle of least privilege (PoLP) to
restrict access to cloud-based data and assets.
39 | P a g e
• Regularly review and revoke unnecessary access.
• Encrypt data both at rest and in transit with strong encryption algorithms.
Also, ensure the team follows key management best practices.
• Set up robust logging and cloud monitoring to ensure teams detect security
incidents promptly.
• Regularly back up all your data and configurations, plus occasionally test
backups to ensure there's no file corruption.
• Regularly assess the security practices of your cloud service provider and
ensure the vendor meets your current security requirements.
• Protect APIs with advanced authentication and authorization mechanisms.
• Regularly review and update all API security policies.
• Maintain an up-to-date inventory of cloud assets and resources to ensure the
security team has a complete overview of what they are protecting.
• Remember to decommission and archive unused resources.
• Carefully assess and manage the security risks associated with third-party
tools, integrations, and services.
• Run regular vulnerability assessments to proactively find flaws and exploits in
cloud systems.
• Perform occasional penetration tests to see how your cloud environment and
security team respond to realistic attack simulations.
40 | P a g e
spawned an alarming surge of cyber threats that continually challenge our collective security
measures.
When it comes to cloud infrastructure, these threats predominantly take two forms: assaults
targeting data and attacks aimed at the cloud services themselves. Within the sphere of data-
focused cyber threats, the dangers are primarily in the form of:
• Data breaches
• Data losses
Data breaches transpire when nefarious actors manage to penetrate the system and gain
unauthorized access to sensitive data. The fallout from such breaches can lead to the unwanted
disclosure of pivotal data, spanning from individual user details to proprietary business
intelligence, potentially causing significant reputational damage and financial fallout. On the
contrary, data loss refers to incidents where data is inadvertently deleted or permanently
misplaced due to unforeseen circumstances like natural disasters or system malfunctions.
Although not always a result of malicious actions, data loss can hinder business operations and
continuity, emphasizing the criticality of resilient data recovery mechanisms and comprehensive
backup strategies.
Threats targeting cloud-based services primarily aim to hamper the service’s operational
efficiency. For example, in the case of service traffic hijacking, a malevolent individual diverts the
cloud service traffic, misguiding users into deceptive websites. Such actions could pave the way
for additional data breaches or harm the credibility of the cloud service provider.
Additionally, distributed denial of service (DDoS) attacks emerge when malefactors inundate
the service with an overload of requests, restricting access for authentic users. Such aggressive
cyber attacks can incapacitate the service, hinder its regular functions, and might result in both
financial and reputational setbacks. Adding another layer of complexity to the cloud security
landscape are insider threats, insecure interfaces, and misconfigured cloud storage. Insider
threats refer to the potential for individuals within an organization, who have authorized system
access, to misuse this access either accidentally or with malicious intent. Insecure interfaces and
APIs, often the gateways to cloud services, present another potential vulnerability if they are
not adequately secured. Misconfigured cloud storage, an issue stemming from human error or
lack of understanding, can leave data unprotected and easily accessible to attackers. These
aspects further underscore the need for comprehensive and multi-faceted measures to guard
against cloud security threats.
41 | P a g e
some key strategies that enterprises can employ to bolster the security of their cloud-based
assets and operations.
42 | P a g e
10. Automated security management: The incorporation of automation can significantly
uplift cybersecurity provisions within the cloud infrastructure. Tools designed for
automated security management are beneficial in perpetually monitoring the network,
pinpointing and rectifying security gaps, managing software patches, and ensuring
system alignment with established security policies. Such automation aids in lessening
the burden of manual oversight and mitigates the likelihood of mistakes stemming from
human involvement.
11. Secure DevOps practices (DevSecOps): The amalgamation of security protocols within
the DevOps process (DevSecOps) is instrumental in the creation and deployment of
secure applications within a cloud environment. This strategy dictates that security
considerations take precedence at each phase of the software development lifecycle,
from initial design through to deployment, instead of being an afterthought. Practices
encompassed within DevSecOps could comprise code assessments, automated testing
procedures, and continuous monitoring and auditing, among other techniques.
Conclusion
The surge in the adoption of cloud infrastructure by businesses worldwide is linked to
escalating demand for robust and efficient cybersecurity measures. These are required to
counteract the threats that loom over the cyber landscape. By taking a proactive stance and
deploying formidable security strategies such as data encryption, identity and access
management (IAM), the construction of a secure cloud architecture, effective disaster recovery
plans, routine security audits, and cultivating a pervasive culture of security consciousness,
organizations can drastically mitigate their risk exposure and protect the security of their data
and services. Encryption, for instance, serves as the first line of defense by scrambling data into
an unreadable format, thus preventing unauthorized access. On the other hand, IAM systems
control and monitor user access, reducing the risk of internal threats and data breaches.
A secure cloud architecture that involves implementing secure virtual networks, firewalls, and
intrusion detection systems can provide a robust security perimeter, protecting the cloud
environment from potential cloud security threats. Meanwhile, an effective disaster recovery
plan is vital to ensure business continuity and data recovery in the face of unforeseen incidents.
Regular security audits, inclusive of penetration testing, can help identify system vulnerabilities
and ensure adherence to security policies.
Finally, promoting a culture of security awareness among employees can mitigate the risk of
breaches caused by human error. It’s crucial for businesses to recognize that cybersecurity isn’t
a set-and-forget effort but a persistent and iterative process that necessitates ongoing
vigilance, updates, and training. An organization’s cybersecurity landscape is dynamic and ever-
evolving, reflecting the changing threat landscape. Therefore, it requires constant monitoring
and refinement to stay ahead of potential threats. Adopting a proactive approach, armed with
the right tools and mindset, organizations can harness the immense benefits that cloud
infrastructure offers, all while minimizing their cybersecurity risks. By integrating cybersecurity
43 | P a g e
into the core of their business strategy, organizations can ensure they are well-equipped to
navigate the digital landscape safely and efficiently.
6. Lack of staff with the skills to manage security for cloud applications
SaaS cloud security issues are naturally centered around data and access because
most shared security responsibility models leave those two as the sole responsibility
for SaaS customers. It is every organization’s responsibility to understand what data
they put in the cloud, who can access it, and what level of protection they (and the
cloud provider) have applied.
44 | P a g e
It is also important to consider the role of the SaaS provider as a potential access
point to the organization’s data and processes. Developments such as the rise of
XcodeGhost and GoldenEye ransomware emphasize that attackers recognize the
value of software and cloud providers as a vector to attack larger assets. As a result,
attackers have been increasing their focus on this potential vulnerability. To protect
your organization and its data, make sure you scrutinize your cloud provider’s
security programs. Set the expectation to have predictable third-party auditing with
shared reports and insist on breach reporting terms to complement technology
solutions.
1. Cloud workloads and accounts being created outside of IT visibility (e.g., shadow IT)
45 | P a g e
Top 5 Private Cloud Security Issues
1. Lack of consistent security controls spanning over traditional server and virtualized
private cloud infrastructures
3. Lack of staff with skills to manage security for a software-defined data center (e.g.,
virtual compute, network, storage)
4. Incomplete visibility over security for a software-defined data center (e.g., virtual
compute, network, storage)
At the same time, organizations should consider that maintaining fine-tuned control
creates complexity, at least beyond what the public cloud has developed into.
Currently, cloud providers take on much of the effort to maintain infrastructure
themselves. Cloud users can simplify security management and reduce complexity
through abstraction of controls. This unifies public and private cloud platforms above
and across physical, virtual, and hybrid environments.
46 | P a g e
means that even the most experienced security professional cannot keep up.
Automation that removes mundane tasks and augments human advantages with
machine advantages is a fundamental component of modern IT operations.
Finally, when trade-off decisions must be made, better visibility should be the No. 1
priority, not greater control. It is better to be able to see everything in the cloud, than
to attempt to control an incomplete portion of it.
Cloud attacks can have serious consequences, such as data breaches, data loss,
unauthorized access to sensitive information, and disruption of services.
As more organizations and individuals rely on cloud computing for storing and
processing data, there is a corresponding increase in the number of potential targets
for attackers. Many organizations may not be aware of the risks and vulnerabilities
associated with cloud computing, or may not have sufficient measures in place to
protect against these threats.
47 | P a g e
revealing their login credentials or by exploiting a vulnerability in a system or
application used by the user.
This differs from account hijacking, which involves an attacker gaining unauthorized
access to an account through means such as password cracking or exploiting
vulnerabilities in the cloud infrastructure.
There are several ways in which attackers can inject malware into cloud resources,
including:
5. Insider Threats
6. Side-Channel Attacks
A side-channel attack involves exploiting information that is leaked through the
physical implementation of a system, rather than through its logical interfaces. This
information can include details about how the system is implemented or about the
data being processed by the system.
7. Cookie Poisoning
Cookie poisoning in cloud applications refers to the unauthorized modification or
injection of malicious content into a cookie, which is a small piece of data that is
stored on a user’s computer by a website or web application.
Cookies are used to store information about a user’s preferences and browsing
history, and are often used to personalize the user’s experience or to track their
48 | P a g e
activity. In SaaS and other cloud applications, cookies often contain credential data,
so attackers can poison cookies to access the applications.
8. Security Misconfiguration
9. Insecure APIs
Insecure APIs have vulnerabilities that can be exploited by attackers to gain
unauthorized access to systems or data, or to disrupt the operation of the API.
Examples include:
• Shadow APIs: APIs that are not properly documented or authorized, and may not be
known to the organization that owns the API. These APIs can be created by
developers or other users within the organization, and can expose sensitive data or
functionality to unauthorized parties.
• API parameters: The inputs and outputs of an API, which can be vulnerable to
injection attacks if they are not properly validated and sanitized.
The attack took down the company’s SaaS servers and affected on-premise virtual
SAN appliances (VSA) used by Kaseya customers in 10 countries. Kaseya was
proactive in responding to the attack and alerted customers immediately. Later, the
company deployed a VSA detection tool to allow its customers to analyze VSA
services and identify signs of vulnerabilities.
49 | P a g e
Facebook
In April 2021, Facebook reported a vulnerability affecting hundreds of millions of user
records, which were exposed on servers hosted by Amazon Web Services (AWS).
Facebook said the problem was identified and quickly fixed.
The incident was sparked by the disclosure of records by two third-party developers
employed by Facebook. The exposed databases contained personal information that
could be used for social engineering and targeted phishing attacks.
Cognyte
In May 2021, cybersecurity analytics giant Cognyte made the mistake of leaving its
cloud-based database unprotected without authentication. This paved the way for
cyber attackers, exposing the records of 5 billion users. The leaked information
included user credentials such as names, email addresses, passwords, and
information about vulnerabilities within customer systems, which could be highly
valuable to attackers.
The information was made public and indexed by search engines—this included
Cognyte’s threat intelligence data, which contained information about historic
security breaches. It took Cognyte 4 days to secure the data and remove it from the
public domain.
Verizon
Verizon Communications, a telecommunications giant, experienced a series
of cloud-related security incidents. In 2017, Verizon partner Nice Systems
accidentally exposed user data due to a flaw in its Amazon S3 storage configuration.
Then in 2020, Verizon experienced 29,207 security incidents, of which 5,200 were
confirmed compromises.
The attacks included DDoS, social engineering, and client-side web application flaws
that led to compromise of server-side systems. Verizon said most of these attacks
were due to the “human element”, as a result of remote work during the COVID-19
crisis.
Raychat
In February 2021, the online chat app Raychat experienced a massive cyberattack.
A cloud database managed by Raychat was compromised, giving hackers free
access to 267 million usernames, emails, passwords, metadata, and encrypted
chats. Shortly thereafter, a targeted bot attack wiped out the company’s data.
50 | P a g e
Encrypt All Data in the Cloud
Encrypting data is important in the cloud because it helps protect sensitive and
confidential information from unauthorized access, even if the data is stolen or
accessed by an unauthorized party. When data is encrypted, it is converted into a
format that is unreadable to anyone without the proper decryption key. This means
that even if an attacker gains access to the data, they will not be able to read or
make sense of it.
Here are a few examples of how restricting access can help prevent cloud attacks:
• Limiting access to cloud storage resources can prevent attackers from being able to
access and steal sensitive data.
• Restricting access to cloud-based applications can prevent unauthorized users from
launching a denial-of-service attack against the application, which could make it
unavailable to legitimate users.
• By controlling access to cloud-based infrastructure, organizations can prevent
unauthorized users from compromising virtual machines, which could lead to data
breaches.
• By controlling access to cloud services, organizations can prevent privileged insiders
from misusing their access and stealing or damaging data.
• Security: APIs are the main entry point for clients to access cloud applications and
data, so it is crucial to ensure that these APIs are secure and that only authorized
clients can access them. This helps to prevent unauthorized access to data and
51 | P a g e
resources, as well as to protect against various types of attacks, such as injection
attacks, cross-site scripting, and other malicious activities.
• Authentication and authorization: Secure APIs can use various mechanisms such
as token-based authentication, multi-factor authentication, and role-based access
controls to ensure that only authorized clients can access the cloud application and
its resources.
• Data validation: By using secure APIs, organizations can validate the data received
from clients before processing it. This ensures that the data is in the correct format
and does not contain malicious payloads.
• Asset management: A CSPM solution can help organizations identify and inventory
their cloud assets, including the systems and applications running on the cloud, the
data stored in the cloud, and the users and groups that have access to the cloud.
This can help organizations better understand their cloud environment and identify
potential vulnerabilities that could be exploited by attackers.
• Compliance: By providing visibility into the security posture of cloud assets, a CSPM
solution can help organizations identify and remediate any compliance issues that
could expose them to risk.
• Threat detection: By monitoring cloud assets for unusual activity or potential
vulnerabilities, a CSPM solution can help organizations identify and mitigate threats
before they can cause damage.
52 | P a g e
Research shows cloud
security vulnerabilities grow
Recent research shows the number of cloud security incidents are
growing. Here are the biggest contributors to the complicated cloud
threat landscape facing modern enterprises.
The 2019 SANS State of Cloud Security survey reported "a significant
increase in unauthorized access by outsiders into cloud environments or to
cloud assets." Nineteen percent of the surveyed organizations reported
experiencing such incidents, compared to 12% in 2017.
Cybersecurity experts said neither the statistics nor the fallout from
breaches is surprising, as cloud brings both business benefits and new
risks in equal measure.
53 | P a g e
"With all of the positive aspects that come with the digital economy, it can
also be a double-edged sword bringing about significant security threats to
CIOs, CISOs and enterprises if they are not adequately armed to protect
their data," said Satish Thiagarajan, vice president and global head of
cybersecurity at Tata Consultancy Services Ltd.
The 2019 SANS report looked at what issues were most commonly involved in successful attacks.
▪ credential hijacking, with 49% of survey respondents experiencing this type of attack;
▪ shadow IT (29%);
▪ several other issues, including cloud provider vulnerabilities, each cited by less than 25% of
respondents.
54 | P a g e
• unauthorized access through misuse of employee credentials and
improper access controls (46%);
He noted that business units can -- and often do -- deploy SaaS options
without consulting IT or security, potentially exposing the organization to
risk as a result.
But the business side isn't the only group unwittingly exposing the
organization to risk, he said. IT, with its focus on agility and speed, also
inadvertently introduces vulnerabilities in its use of cloud by exposing
encryption keys, passwords or other sensitive data.
"Some of the core tech spend has moved out of IT and into business units,
so that means business leaders are making decisions about the technology
sourcing and cloud solutions," Buffomante said. "There's a risk of confusion
over who is responsible [for which security pieces] if the IT organization
55 | P a g e
isn't aware of some of these cloud usages or isn't involved in negotiating
contracts with the cloud providers."
"The security team can't just use one process, one tool or one technology
to lock down the critical data and to manage and monitor that going
forward," Buffomante added. "That makes it harder to see individual
security gaps and more difficult to see vulnerabilities."
56 | P a g e
57 | P a g e
58 | P a g e
6 cloud computing security best
practices to follow
• Biometric logins
• Security questions
• Personal PINs
• Temporary codes
• Authenticator apps
60 | P a g e
4. Don’t share personal information
Some of your personal information may seem unimportant, but if it
falls into the wrong hands, it could compromise your identity. Always
avoid publicly providing information that may be used to
answer a security questions, like:
• Your birthdate
• Your mother's maiden name
• The name of the street you grew up on
• The name of your first pet
• The city where you met your significant other
Some providers allow you to choose your own questions to answer for
verification. If you have the option, use questions and answers that
you can remember but that most people wouldn't easily be able to
learn about you, such as an embarrassing childhood nickname or
where you went on your first date.
61 | P a g e
Never keep racy pictures or intimate interactions with partners in the
cloud, and if you are sensitive about items such as diet progress
pictures, avoid storing those as well.
6. Do your research
Before deciding to move your personal or professional data to the
cloud, it’s important to do your research. You need to understand the
ins and outs of the CSP you've chosen to help mitigate the chances of
you becoming a victim of today’s cloud security risks. You should
know who has access to your information, who’s in charge of
data security, and the current cloud network
security protocols in place.
62 | P a g e
what are cloud security threats and vulnerabilities to cloud data. Elaborate each and how to
mitigate them?
1. Misconfigurations:
Mitigation:
2. Data breaches:
Data breaches involve the unauthorized access and theft of sensitive data,
such as customer information, financial data, or intellectual property. Cloud-
based data is particularly vulnerable to breaches due to its accessibility and
potential for large volumes of data storage.
Mitigation:
63 | P a g e
• Encrypt sensitive data both at rest and in transit to protect it from
unauthorized access. Use strong encryption algorithms and key
management practices.
3. Insecure APIs:
APIs are used to connect applications and services. Insecure APIs can be
exploited to gain unauthorized access to cloud resources, steal sensitive
data, or manipulate system behavior.
Mitigation:
4. Unauthorized access:
Mitigation:
64 | P a g e
• Implement strong identity and access management (IAM) controls to
manage user access to cloud resources. Use strong passwords,
multi-factor authentication (MFA), and least privilege principles.
DDoS attacks aim to overwhelm cloud resources with traffic, making them
unavailable to legitimate users. These attacks can disrupt business
operations and cause significant financial losses.
Mitigation:
6. Malicious insiders:
Mitigation:
65 | P a g e
• Implement strong access controls and role-based access controls
(RBAC) to restrict access to sensitive data and resources.
. Unauthorized Access
66 | P a g e
• Misconfigured access policies: Access policies that are too
permissive or contain errors can grant unauthorized access to
sensitive data or resources. For example, a policy that grants all
users access to a data storage bucket instead of limiting access to
specific users or groups would allow unauthorized individuals to
access the data.
Mitigation Strategies:
2. Privilege Escalation
Mitigation Strategies:
3. Data Exfiltration
68 | P a g e
• Embedding data in emails or documents: Attackers may embed
sensitive data in emails or documents and then send them to external
parties.
Mitigation Strategies:
Mitigation Strategies:
69 | P a g e
• Implement DDoS mitigation solutions: DDoS mitigation solutions can
detect and filter malicious traffic before it reaches cloud resources.
These solutions can also help to absorb the impact of an attack and
keep cloud services available to legitimate users.
Mitigation strategies:
• Implement data loss prevention (DLP): DLP solutions prevent sensitive data
from being accidentally or intentionally shared or exported outside authorized
channels. Utilize DLP tools to define data protection policies and monitor data
transfers.
70 | P a g e
management, secure data handling practices, and reporting suspicious
activity.
• Implement access control lists (ACLs): ACLs define specific permissions for
users or groups to access and modify cloud resources. Use ACLs to restrict
access to sensitive data and resources based on the principle of least
privilege.
• Utilize cloud security monitoring tools: Employ cloud security monitoring tools
to gain visibility into cloud activity and identify potential threats. Use these
tools to detect anomalous behavior, unauthorized access attempts, and
misconfigured access policies.
Now, let us briefly understand each step of the risk management process in cloud computing.
1. Identify the risk - The inception of the risk management process starts with the
identification of the risks that may negatively influence an organisation's strategy or
compromise cloud system security. Operational, performance, security, and privacy
requirements are identified. The organisation should uncover, recognise and describe
71 | P a g e
risks that might affect the working environment. Some risks in cloud computing
include cloud vendor risks, operational risks, legal risks, and attacker risks.
2. Analyze the risk - After the identification of the risk, the scope of the risk is
analyzed. The likelihood and the consequences of the risks are determined. In cloud
computing, the likelihood is determined as the function of the threats to the system,
the vulnerabilities, and consequences of these vulnerabilities being exploited. In
analysis phase, the organisation develops an understanding of the nature of risk and its
potential to affect organisation goals and objectives.
3. Evaluate the risk - The risks are further ranked based on the severity of the impact
they create on information security and the probability of actualizing. The
organisation then decides whether the risk is acceptable or it is serious enough to call
for treatment.
4. Treat the risk - In this step, the highest-ranked risks are treated to eliminate or
modified to achieve an acceptable level. Risk mitigation strategies and preventive
plans are set out to minimise the probability of negative risks and enhance
opportunities. The security controls are implemented in the cloud system and are
assessed by proper assessment procedures to determine if security controls are
effective to produce the desired outcome.
5. Monitor or Review the risk - Monitor the security controls in the cloud
infrastructure on a regular basis including assessing control effectiveness,
documenting changes to the system and the working environment. Part of the
mitigation plan includes following up on risks to continuously monitor and track new
and existing risks.
1. Data Breach - Data breach stands for unauthorized access to the confidential data of
the organisation by a third party such as hackers. In cloud computing, the data of the
organisation is stored outside the premise, that is at the endpoint of the cloud
service provider(CSP). Thus any attack to target data stored on the CSP servers may
affect all of its customers.
2. Cloud Vendor Security Risk - Every organisation takes services offered by different
cloud vendors. The inefficiency of these cloud vendors to provide data security and
risk mitigation directly affects the organisation's business plan and growth. Also,
migrating from one vendor to another is difficult due to different interfaces and
services provided by these cloud vendors.
3. Availability - Any internet connection loss disrupts the cloud provider's services,
making the services inoperative. It can happen at both the user's and the cloud service
provider's end. An effective risk management plan should focus on availability of
services by creating redunadancy in servers on cloud such that other servers can
provide those services if one fails.
72 | P a g e
4. Compliance - The service provider might not follow the external audit process,
exposing the end user to security risks. If a data breach at the cloud service provider's
end exposes personal data, the organisation may be held accountable due to improper
protection and agreements.
Apart from these risks, cloud computing possesses various security risks bound under 2 main
categories.
73 | P a g e
Above discussed risks are the primary security concern for individuals, businesses, and
organisations. If actualized, some risks may cause a business to close. These risks need to be
treated proactively by implementing risk management strategies. By implementing a risk
management plan and considering the various potential risks or events before they occur, an
organisation may save money and time and protect its future. This is because a robust risk
management plan will help an organisation establish procedures to prevent potential threats
and minimise their impact if they occur. This ability to understand and control risks allows
organisations to be more confident in their business decisions. Moreover, effective risk
management helps organisations to understand the processes deeply and provide information
that can be used to make informed decisions to provide increased levels of security and
ensure that the business remains profitable. In cloud computing, the organisation sets risk
management plans which help them to identify appropriate cloud vendors and service
providers, make proper service-level agreements and set up better budgeting plans.
74 | P a g e
with these regulations, the enterprise must provide different solutions, which increase the
workload and redundancy for IT operations.
1. Choose the cloud service provider wisely - Perform cloud vendor risk assessment
for contract clarity, availability, security, ethics, compliance, and legal liabilities.
Make sure, the cloud service provider(CSP) has service providers that can deliver the
services accordingly.
2. Deploy Technical Safeguards such as Cloud Access Security Broker - Cloud
Access Security Broker (CASB) are on-premise or cloud-based software which acts
as intermediary between cloud service providers and consumers, to monitor the
activities and enforce organisation security policy for accessing cloud applications.
3. Establish controls based on risk treatment - After identification, analysis, and
evaluation of the risk. Dedicated measures need to be taken to mitigate risks and drive
the business processes to improve. Organisations should delete unwanted data from
the hosted cloud.
4. Optimized cloud service model - Adopt a cloud service model that promotes
achieving a business solution, minimizes risks, and optimizes cloud investment cost.
5. Strategize Availability of Services - Create redundancy of servers by regions and
zones. In this way, if one connection fails, it will not stop the operation of the
services.
Conclusion
• With the boost in cloud deployments by organisations, risk management in cloud
computing helps to identify and mitigate the risks and protect organisation assets.
• Risk management in cloud computing follows a process that involves identification,
analysis, evaluation, treatment, and monitoring of the risks.
• Cloud computing involves a high risk of data breaches, availability and cyberattacks.
• Risk management in cloud computing helps organisations to derive a better business
solution while forecasting and minimizing maximum risk factors.
• Good practices such as better availability, CSP selection, and technical safeguards
deployment should be followed to minimize cloud-based risks.
• cloud computing
ADD COMMENT FOLLOW SHARE EDIT
1 Answer
75 | P a g e
0
919views
written 5.1 years ago by
teamques10 ★ 59k
Cloud computing is recognized as the most promising computing paradigm of the
last several years . Actually, a lot of Cloud computing models have arisen, each one
offering different characteristics or services, at different degrees of flexibility and
involving distinct risks.
Given the fact that Cloud computing encompasses new technologies such as
virtualization, there are both new risks to be determined and old risks to be re-
evaluated. According to the risk management standard of the Institute of Risk
Management (IRM) a risk can be defined as 2 the combination of the probability of an
event and its consequences In general, in all types of businesses there are events
which represent opportunities for benefit or threats to success, i.e. positive and
negative aspects of risks, respectively.
Thus, and in contrast to traditional risk avoidance strategies, accepting some risks
leads to obtain remarkable benefits.
The Risk Management is the process whereby organizations treat, in a methodical
way, risks related with their activities. The main goal is to obtain benefits and
sustainable values within each activity and across all of them.
Actually, it is a fundamental part of any organization’s strategic management.
Entering in detail in its core sub process, i.e. risk assessment, there are three primary
methods according to: qualitative, which uses simple calculations and thus it is not
needed to determine the numerical value of all assets at risk and threat frequencies;
quantitative, which assigns numerical values to both impact and likelihood of risks;
semi-quantitative (or hybrid), which is less numerically intensive than quantitative
methods and classifies (prioritizes) risks according to consequences and foreseen
probabilities.
Risk management in cloud involves the following tasks
• risk identification
• risk analysis and evaluation
• selection of counter measures
• deployment of suitable counter measures
• continuous monitoring to assess effectiveness of the solution
76 | P a g e
8 Pillars of Risk Management in
Cloud Computing
Over the last few years, cloud computing technology has grown at an
migration and usage owing to the loss of control over their outsourced
As a result, a cloud provider must manage the risks associated with the
The benefits of migrating from old in-house systems to the cloud are
organizations to operate at a faster and more agile pace than their present
settings.
77 | P a g e
However, although mobile technologies provide us with tremendous power
and convenience, they also pose significant security and privacy problems.
of worries.
• Multiple tenancies
• Data retention
78 | P a g e
• Measurable service
The debate is no longer "to cloud or not to cloud," but rather "when will
the transition occur" and "which operations will migrate to the cloud." In
exercise.
79 | P a g e
Furthermore, minimizing the risks associated with cloud migration
2. Cybersecurity
incidents.
challenges, and prepare for threats they have not yet seen, it is
80 | P a g e
3. Regulatory compliance
Read this document on: “Managing the 5 Key Cloud Computing Risks”
edged sword that is depending on the cloud provider's rules, which may
Watch this video on: Cloud Computing Risk Management - Is Data really
safe?
81 | P a g e
While keeping your company's goals in mind at all times, there are a
security plan.
6. Platform support
the platforms and apps you use on such cloud settings are properly up
to date.
testing.
82 | P a g e
The same cannot be true for cloud providers owing to a lack of
Read this document to explore more on: “Managing Risk in the cloud”
7. Vendor Management
(FedRAMP).
solutions into this approach. You may also establish and enforce
cloud.
8. Cloud Migration
83 | P a g e
The process of transferring apps, data or even the whole corporate IT
allows for the acceptance of any workload, and the simplicity with
which new services may be added allows for rapid response to changing
business demands.
no initial expenditure.
84 | P a g e
This can happen when you access cloud-based databases, apps, and
services. If you have apps that require fast answers, even a delay of
To eliminate latency issues, you must first identify their root causes,
85 | P a g e
cloud estates spanning across multiple clouds, accounts,
workloads, and applications, the sheer scale of the cloud makes
proper security a challenge.
86 | P a g e
The danger is attackers will jump from one identity to the next to
accumulate a toxic combination of permissions that can give
them the power to disrupt applications, delete infrastructure, or
wipe your cloud clean. A risk assessment should find identity
risks like overprivileging, unused identities, insecure access keys,
lateral movement opportunities and more.
Detect Compromise
Performing a cloud risk assessment is not the same as auditing
your cloud for signs of compromise, but it is an opportunity to
come across variances from what the normal baseline looks like.
This could be logging revealing that access controls were
changed on an object storage service or an identity accessing
an asset from a location they never have before. These are signs
of potential compromise and may help you catch onto an
attacker’s activity.
Remain Compliant
A lot of compliance standards require audits or assessments of
cloud environments to ensure risks are accounted for. Cloud
87 | P a g e
Service Providers follow requirements like ISO/IEC 27001, ISO/IEC
27002, and NIST SP 800-53, which all require risk assessments –
not to mention an organization’s own internal standards or
industry requirements.
Vulnerability Identification
88 | P a g e
Cloud Security Risk Analysis
Preventative Controls
89 | P a g e
Detective Controls
Corrective Controls
90 | P a g e
Conducting cloud security risk assessments are critical to
revealing risks, gaps in your current security procedures, and
implementing new controls to fix issues. Aside from sufficient
controls around platform configurations, workload security, and
network access, a major priority in risk assessment should be
around identity and access.
FAQs
What’s a cloud security risk assessment?
A cloud security risk assessment is an analysis of an
organization’s cloud infrastructure to determine its security
posture or potential security risks.
91 | P a g e
Why do I need a cloud security risk assessment?
Cloud security risk assessments are a critical process that
reveals present risks and identifies gaps in security coverage.
The result is finding potential points of entry, finding evidence of
potential compromise, and future controls to better protect
critical assets.
What key components should be considered during one?
Cloud security risk assessments should consider access
controls, misconfigurations, vulnerability management, identity
and access permissions, and compliance standards.
How often should an assessment be conducted?
How often Cloud risk assessments should be conducted
depends on industry and internal standards or relevant
compliance frameworks. It is recommended at least annually or
every 2 years.
1. Vision—What is the business vision and who will own the initiative?
2. Visibility—What needs to be done and what are the risks?
3. Accountability—Who is accountable and to whom?
4. Sustainability—How will it be monitored and measured?
92 | P a g e
Based on BMIS, these 10 principles of cloud computing risk provide a
framework for cloud computing migration which is presented here in a
case study.
The business benefit of placing this function in the cloud is that it will allow
branches, call centres, brokers and other channels to use the same code
base and avoid replicating the calculations in multiple places. The use of
the cloud will also reduce paper handling and host system access and the
associated security required. There is also a potential business driver for
allowing customers access to their own data if placed on the public cloud.
93 | P a g e
Once the vision is articulated and the risk management organisation is in
place, the next step in the road map is to ensure visibility of what needs to
be done and the risk of doing it. There are three principles related to
ensuring visibility:
In the case study, the home loan mortgage insurance calculation process
uses sensitive data such as customer identity, date of birth and taxable
income. The CIA rating of the business data is an average of high, based on
the assessment provided in figure 6.
94 | P a g e
study, management decided that the process should be considered for
migration to a private cloud. In this type of deployment, the calculation can
be made accessible to the various stakeholders with their heterogeneous
client devices, but still provide an acceptable level of security over the data.
A key consideration would be the limited scalability or agility that a private
cloud would offer compared to a public cloud. In this case, the retail
banking executive decides to deploy to a private cloud until customer
access becomes a compelling requirement.
As the next step, the risk associated with a cloud implementation must be
assessed against the risk associated with the incumbent in-house system,
and also against the option of acquiring a new internally operated system.
The framework for assessment could be used for each of these options, to
assess risk areas such as deficient vendor or internal support, application
complexity, and application reliability. In the case study, an assessment of
the existing loan mortgage insurance application identified an aging
application with overreliance on a single vendor and limited disaster
recovery.
The risk profile for the business process after moving it to a private cloud
(using the combined ISO 9126 and COBIT assessment framework) is
shown in figure 8. A similar risk assessment (as well as an assessment of
relative business value) should be conducted on the other option—an
internally operated and hosted system.
95 | P a g e
The third step in the cloud computing road map is accountability. In the
case study, the business owner works with the operational risk manager to
develop a matrix of roles and responsibilities, shown in figure 9.
The final phase in the cloud computing road map is sustainability, and
there are two related principles:
96 | P a g e
reporting of information risk and be supported by well-documented and
communicated monitoring and escalation processes. This is related to the
enabling and support dimension of BMIS. In the case study, the retail
banking operational risk manager and departmental IT risk manager work
together to develop an ongoing cloud risk and security monitoring, reporting
and escalation process. Ideally, this process includes regular information
and escalations from the cloud service provider.
Conclusion
This article has reviewed some of the existing guidance to keep in mind
when considering cloud computing, suggested ISO 9126 as a valuable
standard for a more structured and coherent assessment of cloud
offerings, and proposed ten principles of cloud computing risk loosely
based on BMIS and cloud assessment road map consisting of four guiding
principles: vision, visibility, accountability and sustainability.
97 | P a g e
Understanding Cloud Information
Security Risk Assessment
Many firms are now shifting to cloud-based solutions. Statistics demonstrate a consistent
and striking increase in the use of cloud solutions, which is attributable to the advantages
that come with their adoption. On-demand self-service, extensive network access, resource
pooling, quick elasticity, and measured service are a few of these advantages. However,
cloud computing services have a cost, even if that cost is not always monetary. The
outsourcing aspect, in which a third party is trusted to manage the data, is what puts security
at more risk than it is with traditional on-premises systems. The multi-tenancy, wherein the
resources are shared, is another worry. This is where Cloud Information Risk Assessment
comes in.
• Determine the cloud infrastructure of the company’s weak points and entrance
points
• Examine the network to look for signs of exploitation
• Describe ways to stop upcoming attacks
The following areas are often the focus of a cloud security assessment:
• Conducting interviews and reviews of the documentation to assess the overall
security posture of the cloud infrastructure
• Access management and control: Reviewing identity and management, including
user access, roles, and management
• Network security: Reviewing the firewall policies and network segmentation for
typical misconfigurations
• Storage security: Evaluate the state of the cloud system storage, taking into
account associated snapshots, block-level storage, and object-level storage
• Incident management: Reviewing the cloud infrastructure incident response
strategy, including the responsibilities and processes connected to an issue
• Security for platform services: Examine the security settings for the advanced
service options offered by cloud system providers
• Security for workloads: Examine the security of server-hosted containers,
virtualized servers, functions, and server-less containerized workloads
98 | P a g e
What Advantages Does a Cloud Information Security Assessment Offer?
A cloud information security assessment assures businesses that their assets and network are
properly set up, safe, and not under constant attack. In addition to evaluating the
organization’s network workings, the audit will point out any access points or other
architectural vulnerabilities and provide comprehensive recommendations on how to bolster
security and enhance capabilities going forward. Benefits of a cloud information security
assessment in particular include:
99 | P a g e
Review
Review of the documentation and interviews aid in the assessment team’s comprehension of
the cloud architecture, business goals, and upcoming modifications to the client’s
environment. The testing team uses specific tools to gather data about the cloud
environment, spot misconfigurations, and breaches in comparison to the ideal design, and
assess potential attack chains.
Generating Recommendations
The security assessment team formulates suggestions for every discovery based on the
review.
Presentation
The team consults with internal stakeholders of the client to present findings and respond to
inquiries about both specific technical advice and advanced recommendations.
• Data Loss: Cloud data breaches are a major threat due to the use of
misconfigured and insecure cloud storage to hold sensitive and valuable
data. Identifying configuration errors that could lead to a potential data
breach is a vital part of a cloud security risk assessment.
With complex, multi-cloud environments, it’s easy for security issues to slip
through the cracks. A cloud security risk assessment is a good way for an
organization to identify holes in its cloud security and get useful
recommendations for remediation.
102 | P a g e
Unauthorized Access to Business Data
Cloud computing services manage data from thousands of companies. Each
company using a cloud service, however, increases the value of that service as a
potential target for cyber attackers – and the risk is concentrated at a single point of
failure (the cloud service provider). As a result, a cyberattack at a cloud provider
could affect all of its customers.
No business is safe in this scenario. Attackers may target small businesses because
those companies typically have weaker controls and may be easier to breach.
Alternatively, some attackers prefer to target larger companies because of the lure
of hefty payouts.
Many small businesses know little about the technology behind the cloud services
they use. As a result, your reputation no longer depends only on the integrity of
your company: it now also relies on the integrity of the cloud provider’s company.
And that’s a risk of cloud computing.
Due to the ease of access to IaaS (infrastructure as a service), there has been a
proliferation of innovative SaaS (software as a service) startups providing cloud
services. Some offer unique features that traditional providers have left unmet.
Some of these providers, however, may lack the expertise required to meet
stringent control requirements. Their products may also be unsustainable for large
organizations that need to exchange increasing amounts of data.
103 | P a g e
Compliance Risks
Legal or compliance risks arise from non-compliance with various industry
regulations or regulatory requirements, such as the Health Insurance Portability
and Accountability Act (HIPAA), Sarbanes-Oxley Act (SOX), Gramm-Leach-
Bliley Act (GLBA), or the European Union’s General Data Protection Regulation
(GDPR).
When a data breach in a cloud service provider exposes personal data, your
company may be held accountable if it does not have proper protections in place.
In other words, a cloud service provider suffers a breach of your data, and you will
still suffer the consequences. Proper legal contracts to place as much of that
responsibility back upon the cloud provider are vital.
Operational Control
When an organization manages its own IT infrastructure such as enterprise tools,
documents, computing resources, and processes, it has direct control over these
elements (along with responsibility for their care). When outsourcing to a vendor
cloud environment, the control resides with the cloud provider – not you.
Availability Risks
If your Internet access is lost, you will be unable to access your provider’s cloud
service. You’ll have to wait until the Internet is back up and running if you need to
use the cloud service to process customer payments or access sensitive data. You
don’t have this problem when operating on a local server.
Another risk associated with the cloud is that the service provider may fail. The
service can become unresponsive due to various factors, including adverse
weather, distributed denial of service (DDoS) assaults, or some other system
breakdown.
• Carefully select your cloud service provider (CSP). Conduct supplier risk
evaluations for contract clarity, ethics, legal liability, viability, security,
compliance, availability, and business resilience, among other things.
Determine whether or not the CSP itself has service providers it can rely on
to deliver its solutions and adjust the scope accordingly.
105 | P a g e
third-party security audits, such as those specified by the International
Organization for Standardization (ISO).
Consider building a public cloud strategy that includes security criteria for
suitable SaaS usage to avoid security risks.
107 | P a g e
▪ Timely incident response – Any potential or suspicious activities are
addressed immediately via our dedicated incident response and
incident management framework.
▪ Comprehensive root cause analysis – To prevent these same issues
from recurring in the future, we uncover the underlying problem and
put an end to it for good.
▪ Ongoing regulatory compliance – Maintaining compliance with
applicable regulations helps you avoid costly fines while also
preserving the integrity of your cloud ecosystem.
By combining our MDR services with our comprehensive cloud risk
assessment, you’ll ensure the security of your cloud, along with all personnel
and clientele for whom it is essential.
1. Data breaches: Data breaches are one of the most serious risks associated
with cloud computing. CSPs store large amounts of sensitive data on behalf of
their customers, and this data is a prime target for hackers. Data breaches
can result in financial losses, reputational damage, and legal liabilities.
Protection measures:
Protection measures:
• Use a cloud governance platform to help you provision and configure cloud
resources securely.
108 | P a g e
• Implement a cloud security policy to outline the security controls that must be
implemented in your cloud environment.
• Regularly audit your cloud environment for misconfigurations.
3. Insider threats: Insider threats are a risk in any organization, but they can be
particularly problematic in cloud environments. Cloud environments can make
it easier for insiders to access and steal sensitive data, and they can also
provide insiders with opportunities to disrupt or sabotage cloud services.
Protection measures:
• Implement a least privilege access control model to give users only the
access they need to do their jobs.
• Monitor user activity to identify suspicious behavior.
• Educate employees about the risks of insider threats.
4. Insecure APIs: APIs are used to connect applications and services in the
cloud. However, insecure APIs can be exploited by attackers to gain access
to sensitive data or systems.
Protection measures:
5. Vendor lock-in: Vendor lock-in can occur when an organization becomes too
reliant on a particular CSP's services. This can make it difficult and expensive
to switch to another CSP in the future.
Protection measures:
Protection measures:
109 | P a g e
• Understand the compliance requirements that apply to your organization.
• Choose a CSP that can help you comply with these requirements.
• Implement a compliance program to monitor and manage your compliance
risks.
7. Outages: Outages can occur in any cloud environment, and they can have a
significant impact on businesses. Outages can result in lost
revenue, productivity losses, and reputational damage.
Protection measures:
8. Data sovereignty: Data sovereignty refers to the laws and regulations that
govern the storage and processing of data. Organizations need to be aware of
the data sovereignty laws in the jurisdictions in which they operate to ensure
that their data is handled in compliance with these laws.
Protection measures:
Protection measures:
• Assess the security risks of third-party vendors before using their services.
• Include security requirements in your contracts with third-party vendors.
• Monitor the security practices of third-party vendors on an ongoing basis.
110 | P a g e
Protection measures:
• Stay up-to-date on the latest regulatory changes that affect cloud computing.
• Work with a compliance consultant .
111 | P a g e
With so many obvious security issues (and a lot more can be added to the list),
we need to enumerate some steps that can be used to secure virtualization in
cloud computing.
After thoroughly enhancing physical security, it's time to check security on the
inside. A well-configured gateway should be able to enforce security when any
virtual machine is reconfigured, migrated, or added. This will help prevent VM
sprawls and rogue VMs. Another approach that might help enhance internal
security is the use of third-party validation checks, preformed in accordance with
security standards.
In the above figure, we see that the service provider and cloud provider work
together and are bound by the Service Level Agreement. The cloud is used to
run various instances, where as the service end users pay for each use instant
the cloud is used. The following section tries to explain an approach that can be
used to check the integrity of virtual systems running inside the cloud.
Checking virtual systems for integrity increases the capabilities for monitoring
and securing environments. One of the primary focuses of this integrity check
should the seamless integration of existing virtual systems like VMware and
virtual box. This would lead to file integrity checking and increased protection
against data losses within VMs. Involving agentless anti-malware intrusion
detection and prevention in one single virtual appliance (unlike isolated point
security solutions) would contribute greatly towards VM integrity checks. This
will greatly reduce operational overhead while adding zero footprints.
A server on a cloud may be used to deploy web applications, and in this scenario
an OWASP top-ten vulnerability check will have to be performed. Data on a cloud
should be encrypted with suitable encryption and data-protection algorithms.
Using these algorithms, we can check the integrity of the user profile or system
profile trying to access disk files on the VMs. Profiles lacking in security
protections can be considered infected by malwares. Working with a system
112 | P a g e
ratio of one user to one machine would also greatly reduce risks in virtual
computing platforms. To enhance the security aspect even more, after a
particular environment is used, it's best to sanitize the system (reload) and
destroy all the residual data. Using incoming IP addresses to determine scope on
Windows-based machines, and using SSH configuration settings on Linux
machines, will help maintain a secure one-to-one connection.
The security model prescribed here is purely host-side architecture that can be
placed in a cloud system "as it is" without changing any aspect of the cloud. The
system assumes the attacker is located in any form within the guest VM. This
113 | P a g e
system is also asynchronous in nature and therefore is easier to hide from an
attacker. Asynchronicity prevents timing analysis attacks from detect this
system. The model believes that the host system is trustworthy. When a guest
system is placed in the network, it's susceptible to various kinds of attacks like,
viruses, code injections (in terms of web applications), and buffer overflows.
Other lesser-known attacks on clouds include DoS, keystroke analysis, and
estimating traffic rates. In addition, an exploitation framework like metasploit
can easily attack a buffer overflow vulnerability and compromise the entire
environment.
The above approach basically monitors key components. It takes into account
the fact that the key attacks would be on kernel and middleware. Thus integrity
checks are in place for these modules. Overall, the system checks for any
malicious modifications in the kernel components. The design of the system
takes into consideration attacks from outside the cloud and also from sibling
virtual machines. In the above figure the dotted lines stand for monitoring data
and red lines symbolize malicious data. This system is totally transparent to the
guest VMs, as this is a totally host-integrated architecture.
The implementation of this system basically starts with attaching few modules
onto the hosts. The following are the modules along with their functions:
Interceptor: The first module that all the host-traffic will encounter. The
interceptor doesn't block any traffic and so the presence of a third-party security
system shouldn't be detected by an attacker; thus, that the attacker's activities
can be logged in more detail. This feature also allows the system to be made
more intelligent. This module takes the responsibility of monitoring suspicious
guest activities. This also plays a role in replacing/restoring the affected modules
in the case of an attack.
Warning Recorder: The result of the interceptor's analysis is directly sent to this
module. Here a warning pool is created for security checks. The warnings
generated are prioritized for future reference.
Evaluator and hasher: This module performs security checks based on the
priorities of the warning pool created by the warning recorder. Increased
warning will lead to a security alert.
Actuator: The actuator actually makes the final decision whether to issue a
security alert or not. This is done after receiving confirmation from Evaluator,
hasher, and warning recorder.
114 | P a g e
This system performs an analysis on the memory footprints, and checks for both
abnormal memory usages and connection attempts. This kind of detection of
malicious activity is called an anamoly based detection. Once any system is
compromised the devious malware tries to affect other systems in the network
until the entire unit is owned by the hacker. Targets of this type of attack also
include the command and control servers, as in case of Botnets. In either case,
there is an increase in memory activity and connection attempts that occur from
a single point in the environment.
Current Implementation:
This approach has been followed by two of the main open-source cloud
distributions, namely Eucalyptus and OpenECP. In all implementation, this
system remains transparent to the guest VM and the modules are generally
attached to the key components of the architecture.
Performance Evaluation:
The system claims to be CPU-free in nature (as it's asynchronous)and has shown
few complex behaviors on I/O operations. It's reasoned that this characteristic is
due to constant file-integrity checks and analysis done by the warning recorder.
In this article, we have seen a novel architecture design that aims to secure
virtualization on cloud environments. The architecture is purely host-integrated
and remains transparent to the guest VMs. This system also assumes
trustworthiness of the host, and assumes attacks originate from the guests. As
in security, the rule of thumb says: Anything and everything can be penetrated
with time and patience. But an intelligent security consultant can make things
difficult for an attacker by integrating transparent systems so that they remain
invisible and that it takes time for hackers to detect these systems under normal
scenarios.
• Server virtualization.
• Desktop virtualization.
• Storage virtualization.
• Network virtualization.
• Application virtualization.
• Granular Access Control: IT teams and admins have much more control over
network access than with a legacy hardware-based infrastructure. Teams can
use micro-segmentation techniques to grant user access to specific applications
or resources at the workload level.
• Application Isolation: A key security benefit of virtualization is the ability to
isolate applications from one another on the network. Keeping apps isolated can
protect data from being shared across them, or from malware or viruses that
may have infected other parts of the system. Isolation is often accomplished via
containerization and sandboxing.
• Increased Control Over Desktop and Application Updates: Operating
systems (OSs) and applications are constantly going through security patches,
but your employees might not be keeping up with these updates on their
116 | P a g e
devices. By virtualizing desktops, IT will have full control to ensure OSs and
applications are updated.
• Virtual Machine (VM) Isolation: Running several virtual machines on a single
server allows for a high level of isolation. If security is compromised within one
server, this separation provides protection for the other virtual servers.
• Network Isolation and Segmentation: Independent workloads or apps on a
network can be divided and shared across segmented virtual networks that are
isolated from each other. This ensures that information and access aren’t shared
across the entire network.
• Hypervisor Maintenance: Hypervisors that create and run VMs typically require
fewer resources than hardware-based solutions, giving them a smaller attack
surface. Plus, hypervisors usually update automatically.
117 | P a g e
Your organization’s cloud infrastructure could also introduce inherent network
security risks—compounding the risks associated with virtualization.
1. Make sure your hosts are running the latest firmware and that all software is
updated regularly.
2. Ensure firmware for all active network elements is up to date.
3. Set up automatic updates for all OSs with installation and reboots scheduled for
off-hours.
4. Install virtualization antivirus and antimalware software and ensure it’s kept
updated.
5. Clearly divide administrator privileges to easily track who has changed what
across the system, and follow the principle of least privilege (PoLP) for each
admin.
6. Make sure that all network traffic is encrypted.
7. Have a clear user policy and train employees on best practices for password
security.
8. Ensure that all VMs have a clear purpose. Delete all unused VMs.
9. Schedule regular backups for your VMs and physical servers, as well as full
system backups.
10. Review and deploy VMware best practices for security.
118 | P a g e
The Virtual Machine (VM), Virtual Memory Manager (VMM), and hypervisor
or host OS are the minimum set of components needed in a virtual
environment.
Virtualization Types:
Some threats to virtualized systems are general in nature, as they are inherent
threats to all computerized systems (such as denial-of-service, or DoS,
attacks). Other threats and vulnerabilities, however, are unique to virtual
machines. Many VM vulnerabilities stem from the fact that vulnerability in one
VM system can be exploited to attack other VM systems or the host systems,
as multiple virtual machines share the same physical hardware.
120 | P a g e
Some of the vulnerabilities exposed to any malicious-minded individuals
regarding security in virtual environments:
VM monitoring from the host — because all network packets coming from
or going to a VM pass through the host, the host may be able to affect the VM
by the following:
121 | P a g e
Virtual machine monitoring from another VM — Usually, VMs should not
be able to directly access one another’s virtual disks on the host.
Virtualization security management in the cloud is the process of planning, implementing, and
operating virtualization security controls in a cloud environment. This process is critical for
safeguarding virtual machines (VMs) and the sensitive data they contain from unauthorized access,
utilization, disclosure, disruption, modification, or destruction.
Cloud-based virtualized environments, while offering enhanced flexibility and scalability, present
unique security challenges compared to traditional physical environments. The increased complexity
of virtualized environments, the ease with which VMs can be copied and migrated, and the shared
nature of cloud resources make them more vulnerable to cyberattacks.
. Access Control:
2. Data Encryption:
Protect sensitive data stored within VMs by employing encryption at both rest and in
transit. Data at rest encryption ensures that data remains protected even if the VM is
compromised. Data in transit encryption safeguards data during transmission across
the network. Employ strong encryption algorithms like AES 256-bit or higher to
provide robust protection.
3. Vulnerability Management:
Regularly scan VMs for known vulnerabilities using vulnerability scanning tools.
Prioritize patching critical vulnerabilities promptly to minimize the window of
opportunity for attackers to exploit them. Implement automated patching
mechanisms to ensure timely remediation. Utilize vulnerability management
solutions that provide clear remediation guidance and track patch status.
122 | P a g e
Establish continuous monitoring of VMs and the underlying networks to detect and
respond to suspicious activities promptly. Implement logging mechanisms to capture
events and activities within the virtualized environment. Utilize security analytics
tools to analyze logs and identify anomalies that may indicate potential attacks. Set
up alerts and notifications to trigger timely responses to suspicious events.
5. Incident Response:
Develop a well-defined incident response plan that clearly outlines procedures for
identifying, isolating, and remediating virtualization security breaches. Clearly define
roles and responsibilities for incident response teams. Conduct regular training and
simulations to ensure preparedness. Implement incident management tools to
facilitate efficient and organized response processes.
123 | P a g e
TRUSTED COMPUTING BASE (TCB)
What is a trusted computing base?
The components of the TCB are the only components in the computing
system that operate at a very high level of trust. But "trusted" does not
necessarily mean "secure." It simply means that the components in the TCB
are critical to the system's security.
Before the TCB is used, systems administrators usually test it or validate its
qualities. By installing the TCB, system admins or IT managers can define
user access to the trusted communication path. Doing this ensures secure
communication between the TCB and its users. To enable the TCB's
features, it's important to first install the operating system.
124 | P a g e
The TCB achieves system security by means of:
The various components that constitute the TCB should work well together
to maintain the system's security. Moreover, these components should only
be part of the TCB if they are specifically designed to be part of the
mechanisms governing the TCB's security, capabilities and performance.
These mechanisms should take into account the human security factor in
order to ensure that user weaknesses, mistakes or malicious behaviors
don't affect the TCB's security posture.
TECHTARGET
Trusted computing bases secure individual computers and the networks
they are connected to by addressing issues around provisioning, privileges,
authorization, authentication, backups and antivirus/antimalware.
125 | P a g e
Characteristics or guiding principles of a trusted computing base
Among its several functions, the TCB is responsible for monitoring a variety
of system activities, including:
126 | P a g e
status information are invoked. Such actions may lead to the compromise
or loss of sensitive data, so they must be monitored by the TCB.
Reference monitor. The TCB acts as the reference monitor that works at the
boundary between the trusted and untrusted domains of a computing
system. It functions as a barrier between those domains and validates
access to objects by authorized subjects.
127 | P a g e
security functions and resist attacks. These enforcement and control
mechanisms are themselves located inside the security perimeter.
The TCB is not the same as a trusted platform module (TPM). A TPM
usually refers to a specific chip or specification, while TCB is a security
architecture term that refers to all components in a computing system that
are critical for establishing and maintaining its overall security.
TECHTARGET
Unlike a trusted computing base, which covers all components in a
computing system, a trusted platform module often refers to specific
components or specifications. The above table offers trusted platform
module types used in internet of things devices.
The components included in the TCB can vary from one system to another.
But in general, every system with security properties has a TCB.
128 | P a g e
• Cloud computing infrastructures enable companies to cut costs by
outsourcing computations on-demand. However, clients of cloud
computing services currently have no means of verifying the
confidentiality and integrity of their data and computation.
• Two components :
A trusted co-ordinator.
129 | P a g e
Why do we need the trusted cloud?
As digitization has picked up speed over the last decades, the word “trust”
has become more and more important and taken on a whole new meaning in
the era of cloud computing. Business needs drive companies to transfer as
many processes as possible to the digital space inevitably creating millions
of petabytes of data. To handle data loads of such size, businesses rely on
the cloud. But, handling such massive amounts of data, varying widely in
type and source, is a huge challenge for today’s cloud environments. This
challenge combined with security incidents making headlines every day
makes companies rightfully skeptical about the cloud and how their
customers and enterprise data is managed. Most importantly they ask: How
secure is my data when stored in the cloud ?
130 | P a g e
Data ownership
The data always belongs to the customer, even if they decide to transfer to any
other service.
Transparency
The customers shall be able to identify where data is stored and who has access
to it any time.
These guidelines are pretty hard to check (and enforce) by the customer
because most of them are internal policies put in place by the providers and
invisible to users. Although there are several different certification
standards like ISO27001 and audit rights are in place, the customer still
needs to trust the provider that they are executing everything as outlined in
the user agreement.
Why should you think about going beyond the trusted cloud?
131 | P a g e
comes down to the old concept of you trusting your business partner —
considering what’s at stake, that just might not be enough.
Although advancements in this area are a step forward and help increase trust,
handling sensible customer data like health records requires thinking out of the
box.
The basic principles for the current encryption and security algorithms are
generally pretty old and widely used by technical experts and security engineers.
Nevertheless, effectively applying those techniques to end user data and to the
cloud often fails due to the inherent complexity of using cryptography.
Only the use of mathematically secure algorithms could overcome the lack of
trust in public clouds. Let us call clouds that use end-to-end encryption while
transferring and storing data Crypto Clouds. Only a Crypto Cloud allows you to
know that your data is secure like it never left your device providing ultimate
assurance to the customer.
132 | P a g e
Crypto Clouds, ensuring security via advanced algorithms
Crypto Clouds by definition are not able to gain access to your data at any time!
From a technical perspective it is impossible to unpack your sealed customer
and enterprise data.
One example of such a Crypto Cloud is Bdrive, designed and built in partnership
by neXenio and the German federal mint. As Crypto Clouds and the used client
software can tend to lack in user acceptance, user friendliness is key and Bdrive
tackles this challenge by executing Security by Design in a tight collaboration
with UX experts and users themselves.
Using Crypto Clouds you can handle your data with the highest possible level of
security. Your data is encrypted with private keys (keys unique to your device)
and the confidentiality of these is as crucial as the data itself. Access to your
data is limited to those devices with the right private key. However, encrypting
data also has its limitations in terms of feasible operations. As of today, Crypto
Clouds cannot be used to outsource analytics or other computations. This might
change in the future. Current research on homomorphic encryption shows that
simple operations can also be executed.
Trusted clouds give you policies and procedures that secure your data from
external access. Crypto Clouds go several steps further and secure your data
using cryptography. In this way it becomes technically impossible to access your
data because the effort for an attacker goes far beyond simply gaining access to
data stored in the clouds.
133 | P a g e
Are you interested in using or creating secure software with us? We are
always looking for customers, partners and motivated engineers. Get in
touch at nexenio.com.
134 | P a g e
cloud provider is taking adequate steps to protect their sensitive data and
systems.
135 | P a g e
6. Customer control: Cloud providers should give customers control over
their data and security settings. This allows customers to customize their
cloud environment to meet their specific security requirements.
136 | P a g e
• Reduced IT costs: Organizations can offload IT infrastructure and
management tasks to the cloud provider, saving on the costs of
hardware, software, and personnel.
• Data sovereignty: Ensure that the cloud provider can store and process
data in the jurisdictions required by the organization.
137 | P a g e
• Scalability and performance: Evaluate the cloud provider's ability to
scale up or down to meet changing demands and ensure that it can
provide the performance required for the organization's applications and
workloads.
• Microsoft Azure
• IBM Cloud
• Alibaba Cloud
138 | P a g e
a
139 | P a g e