SmartStateIndia
News

Cloud Services Under Attack: Closing the Virtual Open Doors to Cyber Crime

Cloud-Security

With the new hybrid-working model we see organizations increasingly moving more of their workload settings to the cloud. While this transformation offers great agility and scalability benefits, it comes with inherent and increased risks to security and compliance. A simple configuration error can result in your entire organization being exposed to threat actors who no longer need to break into your data center to access your critical data or conduct ransomware attacks.

Gartner predicts that by 2025, 99% of cloud security issues will be a result of human error when configuring assets and security in the cloud. At a time when organizations are becoming increasingly dependent on third-party cloud vendors such as AWS, Microsoft Azure, IBM and Google Cloud Platform to securely manage their data, concern around misconfigurations and other vulnerabilities in the cloud is likely to amplify quickly. What’s more, many of the organizations finding themselves at risk have had to accelerate their digital transformation initiatives at an uncomfortable pace over the past two years, resulting in knowledge and talent gaps that only add to their fears around cloud security.

Under the shared responsibility model – a security framework designed to ensure accountability for compromised data and other incidents – the cloud provider will offer basic cloud security, but it’s up to businesses themselves to secure their own data within the cloud. To put it another way, if cloud providers ensure the town gates are locked and the perimeter is well guarded, it’s still up to businesses to ensure their own doors are locked. That’s no mean feat, particularly when you consider that many large enterprises now rely on three or four cloud platforms as part of a multi-cloud strategy.

Attacks on cloud service providers are ramping up

As outlined in our 2022 Security Report, the previous year has seen a tidal wave of attacks that exploit flaws in the services of industry-leading cloud providers. For the cybercriminals involved, the end goal is to gain full control over an organization’s cloud infrastructure or, worse, an organization’s entire IT estate, including its proprietary code and customer records. Needless to say, this can have a devastating impact on the businesses affected and they’re quite right to be concerned.

The kinds of flaws we’re talking about here aren’t logic or permission-based flaws derived from an organization’s control policy that threat actors might use to gain unauthorized access and escalate privileges. This could at least be pinpointed and dealt with by the organization in question. Instead,

these flaws tend to be critical vulnerabilities within the cloud infrastructure itself that can be much more difficult to guard against.

Take the OMIGOD flaw, for example, which broke the floodgates when it came to attacking cloud services in 2021. In September, four critical vulnerabilities were discovered in the Microsoft Azure software agent that enabled users to manage configurations across remote and local environments. An estimated 65% of Azure’s customer base was made vulnerable by this exploit, putting thousands of organizations and millions of endpoint devices at risk. Through this OMIGOD flaw, threat actors were able to execute remote arbitrary code within an organization’s network and escalate root privileges,

effectively taking over the network. As part of its September 2021 update, Microsoft addressed the issue but the automatic fix that it released appeared ineffective for several days. Further flaws were exposed

in Microsoft Azure’s cloud services throughout the year, including the “ChaosDB” vulnerability which allowed cybercriminals to retrieve several internal keys used to obtain root privileges that would eventually enable them to manage the databases and accounts of targeted organizations. Businesses made vulnerable by this particular “open door” included Coca-Cola, Skype and even security specialist, Symantec.

It’s likely that there will be many more cloud provider vulnerabilities in 2022 but fortunately there are things within an organization’s control that can mitigate the risk.

Locking the doors and bolstering internal security

Tightening cloud security isn’t just about having the right products and services in place, it’s also about nurturing a security-first mentality within an organization as a whole. Regardless of what a service level agreement between an organization and cloud provider might say, the onus ultimately falls on the

organization to make sure its customers’ records and other important data are protected.

So, before moving mission-critical workloads into the cloud, organizations must ensure that the “doors” to their applications and data are firmly locked. That means getting identity and access management finely tuned, implementing the principle of “least privilege” so that data is only accessed by humans and applications on a strictly need-to-know basis. It also means better segmentation of networks and use of firewall technology to ensure that sensitive data can be appropriately siloed and guarded where necessary.

Cloud security is complex, and with multi cloud environments it gets even more complex. So, think about consolidating all your cloud security across all cloud vendors into one solution that monitors all malicious

activity and reduces the workload by automating common tasks like policy updates. In an ideal world this would mean a ‘single pane of glass’ approach to security management across all your cloud assets so that you can keep a closer eye on security incidents and focus your effort on those of greatest concern.

Any cloud security solution is only as good as the intelligence engine behind it so ask your vendor how they stay on top of emerging and Zero-day threats. At Check Point we have the ThreatCloud which monitors millions of network nodes across the world and uses over 30 AI technologies to identify threats in real time so that they can be blocked before they get onto your cloud, or indeed on-prem network or end user devices.

And finally introduce security at the earliest stage of application development. You do not want security checks to slow down your DevOps unduly and delay application rollout but equally you cannot afford to cut corners on security. A DevSecOps approach that allows you to scan code for misconfigurations or even malware as part of the DevOps process will ensure that you don’t ‘bake in’ vulnerabilities at the outset.

The shift to the cloud is only going to accelerate as organizations realize the benefits it brings in terms of competitive advantage, agility and resilience so now is the time to take a responsible approach to security and compliance and scale up your cloud security. It’s a challenging and complex task but the good news is that there are solutions to not only lock down your cloud network but also ways, using AI and automation, to reduce the workload of detecting and preventing threats, even the ones that have yet to be devised. Finally, this can be done at speed…. it’s all in the cloud!

Related posts

Orange and Google Cloud to form strategic partnership in data, AI and edge computing services

SSI Bureau

Eka Software Records Significant Cloud Momentum in 2021

SSI Bureau

Accenture hosts Applied Intelligence Hackathon

SSI Bureau

20 comments

Sfmvtm March 8, 2024 at 8:29 pm

purchase atorvastatin without prescription order atorvastatin 40mg without prescription atorvastatin where to buy

Reply
Khdoii March 17, 2024 at 11:42 pm

ciplox brand – trimox 500mg price
buy erythromycin 500mg generic

Reply
Exslwd March 20, 2024 at 3:38 am

ivermectin oral – sumycin usa purchase sumycin online

Reply
Uatcdx March 23, 2024 at 2:36 am

furosemide 40mg sale – furosemide brand buy captopril paypal

Reply
Ngppcs March 25, 2024 at 11:29 pm

order glucophage 1000mg online – buy cipro 1000mg online cheap lincomycin 500mg tablet

Reply
Erkpve March 28, 2024 at 8:36 am

order clozapine pills – generic glimepiride purchase pepcid sale

Reply
Otsyxe March 31, 2024 at 2:08 am

clomipramine price – how to buy tofranil doxepin 25mg tablet

Reply
Ygiuua April 4, 2024 at 4:26 am

order amoxiclav sale – ethambutol 600mg cheap ciprofloxacin 1000mg tablet

Reply
Coyjig April 12, 2024 at 7:48 pm

stromectol 3 mg – buy cefaclor 500mg pills order cefaclor online

Reply
Crksny April 12, 2024 at 9:41 pm

how to get ventolin without a prescription – albuterol inhaler theo-24 Cr usa

Reply
Airgvd April 15, 2024 at 6:52 am

order desloratadine 5mg generic – buy beclomethasone sale albuterol for sale online

Reply
Xagxpb April 17, 2024 at 8:02 am

order glyburide 2.5mg online cheap – micronase drug pill dapagliflozin 10mg

Reply
Eafvdu April 19, 2024 at 7:50 am

repaglinide 1mg cheap – where can i buy prandin generic empagliflozin

Reply
Ngpkyl April 19, 2024 at 10:23 pm

buy metformin 500mg generic – acarbose over the counter buy precose 25mg for sale

Reply
Dbvttj April 22, 2024 at 11:57 pm

cost semaglutide 14mg – order generic glucovance purchase DDAVP without prescription

Reply
Wauceq April 24, 2024 at 4:27 am

nizoral 200mg oral – cost butenafine buy generic sporanox over the counter

Reply
Grpyri April 26, 2024 at 1:00 am

order famvir 250mg pills – order acyclovir for sale order valaciclovir 1000mg generic

Reply
Afddis April 26, 2024 at 6:00 am

buy digoxin pills – furosemide 100mg over the counter buy lasix 40mg for sale

Reply
Bbfbdd April 28, 2024 at 7:58 am

order hydrochlorothiazide 25 mg for sale – bisoprolol cost bisoprolol pills

Reply
Iipoia April 29, 2024 at 4:37 am

brand metoprolol 100mg – buy telmisartan 20mg for sale buy adalat online

Reply

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More