Misconfigured Cloud Applications Are Putting Your Data At Risk

As more and more organisations continue to move their systems and applications to the cloud in 2023, cybercriminals everywhere hear the sound of opportunity knocking. They know that as they hunt for vulnerable systems, this increases their chances of coming across a cloud application that has been left exposed inadvertently due to misconfiguration.

The result: an open door to valuable company data including client and employee personal information, financial data, supplier agreements, et cetera. 

With cloud misconfiguration still being considered one of the biggest threats to cloud security, if not the biggest, organisations need to revisit their cloud adoption strategies and ensure their sensitive information is properly protected by prioritising cloud security.

Time To Ditch The Default

So, how do these misconfigurations occur in the first place?

There are all kinds of reasons. Some of these cloud applications are being rolled out to serve the needs of a specific department or team. Therefore, the priority is more on the business issue it is trying to resolve than the need to integrate and interact with internal systems and endpoints securely. So, to speed up the adoption and solve the issue for that department or team, the application is rolled-out with default settings which may seem sufficient at that time.

However, default settings tend to be too open and could be easily exploited by attackers. For instance, leaving a system account with a default password.

Another issue is the inconsistent approach to configuring cloud applications. Changes are made on an ad-hoc basis and not necessarily replicated across all applications and systems. This makes it more complicated when trying to fix configuration issues, and can expose data stored in these systems to breaches.

The lesson here? IT should be brought in early, even before any new cloud application is selected, to ensure the application is tested and meets the requirements of the configuration checklist defined by the organisation. A centralised approach is also necessary to ensure changes to configurations are carried out consistently across all cloud systems and properly documented.

Cloud Security Is A Shared Responsibility

The tendency to opt for default settings is closely intertwined with another important factor that can cause security gaps in cloud services: a lack of awareness that security is a responsibility shared by many parties - including the customer themselves. 

When it comes to cloud applications, there’s no such thing as “security that is 100% handled by the vendor.”

The service provider that provides the infrastructure - think here of Amazon Web Services (AWS), Microsoft Azure, or Google Cloud - is responsible for delivering a certain foundational level of security. On top of that service provider, the cloud vendor who delivers the specific application that the organisation is using, is responsible for another layer of security. But the final piece of the security puzzle is the customer.

Assuming that “it’s in the cloud, it must be protected”, it’s the wrong assumption. In fact, the customer needs to play a big part by determining which users get to access which data, what level of privileges should they have, and so on – the vendor can’t handle that aspect.

That’s why it’s critical for organisations to understand the Shared Responsibility Model, and for all key internal and external stakeholders to be clear about their roles and responsibilities.

Avoid The Gaps

Cloud adoption will only continue to gain momentum in the year ahead, which is all the more reason to ensure that cyber criminals aren’t provided with any low hanging fruit due to misconfigured cloud systems. Unfortunately, it is a matter of “when” and not “if” an organisation will be targeted by cyber criminals. So, preparation is key.

Auditing cloud applications and their configurations, as well as confirming that all parties are clear about their shared responsibilities can make a world of difference in ensuring that organisations are able to keep their sensitive data safe and out of the hands of bad actors.

Manuel Sanchez is an Information Security & Compliance Specialist at iManage

You Might Also Read: 

DMS Alerts Should Be Key To Organisations’ Security Orchestration:

 

« US Defense Contractors Don't Meet Basic Cyber Security Standards
Remote Work: Three Top Trends In 2023 »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.

Xygeni

Xygeni

Xygeni is a leader in Application Security Posture Management (ASPM). Our advanced technology detects malicious code in real-time to prevent malware infections.