Seven Cybersecurity Threats to Cloud Computing You Need to Know About

Share on facebook
Share on google
Share on twitter
Share on linkedin
cloud security
May 6, 2020

Seven Cybersecurity Threats to Cloud Computing You Need to Know About

There’s no doubt cloud computing offers many advantages when compared to purchasing and maintaining your own datacenter. Among these are lower CapEx and almost instantaneous scalability. But with these benefits come threats. Some of these threats are unique to cloud computing while others are applicable to all computing environments. What makes these threats worse for most organizations using the cloud, is that the cloud provider is a bigger target for threat actors than the organization. In other words, defending your cloud environment is even more critical.

The following are seven cybersecurity threats you need to be vigilant about when you shift to cloud-based services. More vigilant than if the assets were on your own premises.

Cyber Attack

incident response teamCyber criminals go after everyone, but they especially target the major cloud providers. And whether it’s a brute force attack or from credentials stolen during a phishing attack, gaining access to protected data can have a twofold effect.

 First, breached data exposes important information to the outside world. This can affect the integrity of your organization and the faith of your customers. Second, data breaches expose your organization to potential fines for failing to properly store customer data. The cost of the fines can easily exceed the cost of ramped up security.

Cloud Misconfiguration

There’s another way cybercriminals can gain unauthorized access to your company’s cloud data: misconfiguration. This is the result of simply failing to implement the proper security controls—as simple as requiring a password—for any external facing system such as a web application or server.

You may not think misconfiguration is common, but it is. In fact, it’s number six on OWASP’s Top 10 Web Application Security Risks. What’s the cause of this common problem? Primarily insecure default configuration settings. A problem made even worse when the systems are easily accessible in the cloud.

Denial of Service

For cloud computing to work properly, data must move to and from the cloud seamlessly. One thing a hacker can do is interrupt the movement of data by purposely flooding the network in a distributed denial-of-service (DDoS) attack. This, in effect, causes the cloud services to shut down.

With access to the cloud interrupted, your entire organization is essentially out of business until service is restored. The impact of lost time and money easily exceeds the cost to implement strategies to defend against DDoS.

Credential Mis-management

Unprotected passwords can leave an organization vulnerable. Best practices such as salting and hashing stored passwords are an essential first step in protecting cloud-based assets. But organizations can do more.

Layered security, such as two-factor authentication (in which a user’s password is matched to a single-use encrypted key) increases credential protection. Multi-factor authentication takes that one step further, using biometric identification to protect sensitive data.

Multi-Tenancy in Cloud Computing

When you use cloud computing, whether you know it or not, you’re sharing everything with the cloud computing provider’s other tenants. That means when a CPU is doing some computations on your data, that same CPU is also doing computations on other tenant’s data at the same time. The same goes for databases. You and the other tenants will frequently store you protected data in the same database. This sharing of services is called multi-tenancy and it poses a very real risk in cloud computing.

Multi-tenancy also means you could be sharing resources with a threat actor, who is one step closer to your data. A security flaw in any of the cloud providers infrastructure, platforms or applications can put your data at risk and something for which you need to account when considering your attack surface.

Cloud Vendor Security Risks

We already mentioned the risk of multi-tenancy, but there are other risks inherent in using a cloud service. Chief among them is the insider threat. A single disgruntled employee, with the proper credentials, at the cloud provider can put your company and data at risk. What makes the insider threat even worse is that it’s likely to go undetected for a long time.

It’s incumbent upon you to do your due diligence on potential cloud computing service providers. See what is their track record with regard to internal security breaches, and more importantly, how have they remedied them if they occurred?

Cloud Computing Compliance and Legal Risk

The threat of a cyber incident goes beyond losing data and business interruption. There is the legal fallout from such an incident. First, you’ll have to pay to remedy the situation and then you’ll have to pay for all the damage you caused to your stakeholders.

If you’re in a regulated industry like healthcare or banking, then you could be financially liable, even if a data breach was the cloud provider’s fault. That’s why it’s essential you understand the legal relationship between you and your cloud provider and that you get everything in writing.

If all these threats seem overwhelming, they shouldn’t be. For starters, cloud computing is maturing, and as it matures, and we begin to understand how to mitigate these threats, the risks from these threats diminish. More importantly, you don’t have to tackle cybersecurity cloud threats alone. There are professional services companies like Cyber Defense Group that specialize in helping organizations like yours put policies, processes and systems in place to minimize the threat from cyber incidents in the cloud. They currently protect over 300 companies and over $10 billion in revenue.

If you’re considering moving to the cloud and don’t know where to start with cyber protection, reach out to Cyber Defense Group for a free 30-minute consultation. 

lou@cdg.io

lou@cdg.io

Incident Response

If you have been the victim of a cyber attack, contact us right now.

  • Determining the extent of a breach
  • Performing a full-scope response from Identification to Recovery
  • Incident Response retainer services, including IR preparation for your team