Cyber Security Risks Of Cloud Computing

The global cloud market is expected to grow to $190+ billions by 2020. Cloud computing has brought the advantage of lower cost of ownership of IT applications, super-fast time to market, and unmatched surges in employee productivity.

From storage to data analytics, applications of all scales and sizes are operating on the cloud. Employees are bringing their own cloud based apps to work, furthering a culture of Bring Your Own Cloud (BYOC).

It’s fair to say, right from SMEs to large enterprises, all organisations are using dozens of cloud computing based tools, and will continue to do so.

However, does this increased cloud adoption not call for better understanding and mitigation of common cloud cyber security threats? This guide helps you understand the most common of these cyber security issues that threaten cloud computing applications.

Loss of Intellectual Property

An analysis done by Skyhigh revealed that more than 20% of the data kept on cloud by enterprises contains sensitive information, including but not limited to intellectual property. Now, most enterprises use multi-tenancy cloud services, wherein their data is kept in servers that are also used to deliver similar services, to other organisations.

Also, there are several entry level cloud based storage solution providers out there who are behind the security game, and lacking the state of the art data protection and security means. Any security breach faced by the cloud service provider compromises your sensitive data. Also, there are cloud storage vendors who misuse circuitous terms and conditions to establish ownership of the uploaded data!

Violations of Compliance and Regulatory Norms

There are several regulatory and compliance requirements facing enterprises in all kinds of markets and geographies. For instance, there’s HIPAA guidelines for private health information, and FERPA for student information. This means that enterprises need to ensure that their cloud storage and application service providers take care of these regulatory norms.

Also, for enterprises that promote the Bring Your Own Device and Bring Your Own Cloud concepts, ensuring compliance to these norms becomes a lot more challenging. Any security breaches and data leakages can lead to severe penalties and loss of brand equity.

Compromised Credentials and Authentication Breaches

Poor certificate and key management, weak passwords, and lax authentication are causes of frequent data breaches in cloud hosted applications.

• Enterprises struggle with identity management issues as they map permissions and privileges with user roles.
• Another huge problem area is when enterprises don’t remove or change user access when he/she quits or changes role.
• Lack of multifactor authentication is attributed as the reason behind the compromising of 80 million customer records in the Anthem breach, and several cloud applications still continue to lack this authentication.

Furthermore, developers are often guilty of leaving crypto-graphic keys and credentials within open source codes, which makes them free to grab at portals like GitHub.

Enterprises looking to federate identify management with a cloud provider need to be aware of all these issues, and how the vendor ensures protection.

Threats to APIs

Most cloud solution providers offer their APIs to enterprise IT teams to help them with cloud provisioning, orchestration, management, and monitoring. This makes the security and availability of cloud solutions dependent on the API security. Re Weak API interfaces expose cloud applications to risks of accountability, confidentiality, integrity, and availability.

For most enterprises, such APIs continue to be the most vulnerable layers because they’re fairly easily accessible via the open Internet. Rigorous penetration testing and security focused code reviews are key enablers of sustainable protection of these APIs from cyber-attacks.

Hijacking of Accounts

Surprising as it sounds, software exploits, fraud, and phishing are still prevalent everywhere you see. Cloud services are also vulnerable to these disruptive cyber-attacks, because cyber criminals have more means to monitor the activities of users on shared clouds.

The two most effective preventive means for a business to protect its cloud data and applications are:

• ensure there is no sharing of passwords and account details among users;
• ensure there are multifactor authentication schemes in place, wherever possible.

Prevention of account details loss is the first step to keeping cloud applications safe from phishing and other violations.

Abuse of Cloud Services

Cloud services can be misused to commit nefarious cyber-crimes, right from usage of cloud resources to access encryption keys, to launching DDoS attacks on an enterprise’s servers. Use of an enterprise’s cloud resources for such cyber-crimes has the following impacts:

• low availability of the cloud systems
• exposure to legal liabilities in form of lawsuits from impacted parties
• severe loss of reputation

Ensure your cloud service provider offers a mechanism of reporting abuse quickly to help avoid and control such issues.

Adotas.com

You Might Also Read:

Cloud Portability Is Still Science Fiction:

Cloud Security Analysed For Management (£)

 

« HBO Offers Hackers $250,000 'bug bounty'
You Might Need To Hire AI Expertise Sooner Than You Think »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Tenable

Tenable

Organizations around the world rely on Tenable to help them understand and reduce cybersecurity risk across their attack surface—in the cloud or on-premises, from IT to OT and beyond.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.