Check Point and Cybersecurity Insiders have released their global 2020 Cloud Security Report, wherein the emphasis was placed on the cloud security challenges that business security systems face in the protection of data and workloads in their public cloud systems.
According to the report, 75% of respondents revealed that they were highly concerned about public cloud security as it continues to remain a big challenge for them.
One of the current cloud computing security issues and challenges affecting cloud security in 2020 is the problem of data breaches. The data breach has several consequences, some of which includes:
This is another of the most widespread cloud security challenges facing cloud technology in 2020. For example, a misconfigured AWS Simple Storage Service (S3) cloud storage bucket leaked accurate and sensitive data of about 123 million American families in 2017.
The dataset was owned by Experian, a credit bureau that engaged in the selling of the data to an online marketing and data analytics organization called Alteryx. The file was exposed by Alteryx. Such an incidence can have lethal consequences.
All over the world, several businesses are moving parts of their IT infrastructure to public clouds. A major issue with this migration is the incorporation of adequate security structures to tackle cyber threats.
The challenge however is that most businesses still find it almost impossible to implement this process. Datasets are vulnerable to several attacks when businesses make the assumption that cloud transition is a simple-to-execute task of just migrating their present IT system and security architecture to a cloud environment. Another contributing factor is also a lack of understanding of the shared security role model.
With cloud computing comes several changes to typical internal system management practices associated with identity and access management (IAM). Although these arent really new cloud security challenges, they are however more important challenges when working on a cloud-based environment.
This is because cloud computing has great effects on identity, credential, and access management. In both private and public cloud environments, there is a need for CSPs and cloud users to manage IAM without impairing security.
The hijacking of accounts is an issue characterized by the access to and abuse of accounts that contain extremely sensitive or private details, by malicious attackers. Usually, the accounts with the most threats in cloud environments are subscriptions or cloud service accounts.
These accounts are prone to compromise as a result of stolen credentials, exploiting cloud-based systems, and phishing attacks.
According to the 2018 Netwrix Cloud Security Report, 58% of organizations indicate insiders as the cause of security breaches. Thus, most security incidents are caused by insider negligence.
The report from the Ponemon Institutes 2018 Cost of Insider Threats study indicated that 13% of the reported insider incidents were caused by credential theft, 23% were associated with criminal insiders, and a whopping 64% was as a result of employee or contractor negligence.
Some of the cited common scenarios are: employees or other internal staff being victims of phishing emails that resulted in malicious attacks on business assets, employees saving private company data on their own poorly secure personal systems or devices, and cloud servers that have been configured inappropriately.
In order to enable consumers to manage and utilize cloud systems, cloud computing providers release a set of software user interfaces (UIs) and APIs. These APIs are the ones that determine how secure and available the overall cloud servers services will be.
From access management and authentication to activity control and encryption, it is necessary that these interfaces are designed for protection against both malicious and accidental attempts to infiltrate the security policy. The implications of insecure APIs can be the abuse or even worse the breach of a dataset.
A number of major data breaches have been caused by hacked, exposed, or broken APIs. In essence, it becomes imperative for companies to have an understanding of the security features that characterize the design and presentation of these interfaces on the internet.
The transition from the data platform to the cloud environment creates certain issues for the creation of adequate data storage and protection protocol. It is now important for the user to create fresh processes for duplicating, migrating, and storing data.
This process becomes even more complex if the user would be employing Multi-cloud. These problems should be solved by a control plane. This is because it provides the integrity and security that would complement the data plane which brings about stability and runtime of the data.
An inefficient control plane indicates that whoever is in charge either a DevOps engineer or a system architect does not have complete control over the verification, security, and logic of the data infrastructure.
In this kind of situation, major stakeholders are unaware of how data flows, the security configuration, and the positions/areas of structural weak points and blind spots. As a result of these challenges in cloud security, the company could experience data leakage, unavailability, or corruption.
Every now and then, cloud service providers reveal processes and security protocols that are needed in order to successfully integrate and safeguard their systems. In most cases, this information is disclosed via API calls and the protections are integrated into the CSPs metastructure.
The metastructure is regarded as the customer line/CSP of demarcation, also called the waterline. In this model, several levels are characterized by error possibilities. For instance, inappropriate API integration by the CSP makes it easier for attackers to hinder cloud customers through the interruption of integrity, confidentiality, of service availability.
Restricted cloud usage visibility is the outcome of the inability of a company to visualize and analyze the safety or maliciousness of the cloud service used within the organization. There are two major cloud security challenges in this concept.
The first is un-sanctioned app use. This happens when employees are making use of cloud tools and applications without the specific authorization of corporate IT and security. This, therefore, leads to a self-assistance model known as Shadow IT.
It is risky when insecure cloud services activity is not in accordance with corporate guidelines, especially when integrated with sensitive corporate data. According to forecasts made by Gartner, by 2020, of all successful security infiltration in businesses will be driven by shadow IT systems and resources.
Secondly, is sanctioned application misuse. It is usually difficult for companies to carry out analysis on how approved apps are being taken advantage of by insiders who make use of the sanctioned app.
Most often, this utilization takes place without the specific permission of the organization, or by external threat agents that target the service though methods like Domain Name System (DNS) attacks, Structured Query Language (SQL) injection, credential theft, and others.
Malicious attackers may take advantage of cloud computing resources to target cloud providers, as well as other users or organizations. It is also possible for malicious actors to host malware on cloud services.
Malware that is hosted on cloud service may appear to have higher legitimacy because the malware utilizes the domain of the CSP. In addition, cloud-based malware can utilize cloud-sharing resources like an attack vector to propagate itself the more.
According to a survey, about 60% of respondents ascertain or strongly ascertain that the launching of business services in the cloud has skyrocketed beyond their ability to effectively maintain them in a timely manner. This figure remains the same since it was reported. This means that there has been no progress in that aspect. With the increasing rate of public cloud adoption, it is safe to conclude that the ground has been lost.
The primary objective of DoS attacks is to disable a system, network, or machine so that it becomes inaccessible to its intended users. The development and growth of cryptocurrencies like Ripple and Bitcoin make it easy for DoS attacks to occur the more.
By using cryptocurrency, it is no longer a must for cybercriminals to acquire the needed skills or possess control over a botnet. All they need to do is hire another hacker via these funding options to execute the work on their behalf.
In terms of security features, Vendor Lock is identified as a risk factor. It is highly restrictive to be limited to just one compatible security solution choice for a cloud service. The impact of this can be a low ROI for security.
This is because the locked-in vendor does not need to be in competition with other vendors. They are with your company since youre their only choice if you desire a functional service without starting all over from the scratch.
Thus, it is necessary that you ascertain how effective it would be to move from a particular service provider to another when choosing cloud-based services. It is pertinent that you consider certain factors before choosing a cloud computing service in order to avoid vendor lock-in (for either your cloud service itself or your security solutions). Consider these factors:
Awareness and adequate communication of security risks is an important aspect of network security, as well as cloud security. A thorough security solution must be able to alert the respective website or app managers immediately it perceives a security threat.
Without clear and prompt communication, the appropriate entities will not be able to quickly mitigate the threat and take proper steps that will minimize the threat.
In all, although all of the issues discussed above pose a threat to cloud security, they are however not insurmountable. With the proper approach, technology, and partners, businesses can overcome the cloud security challenges and begin to enjoy the abundant benefits of cloud technology.
Excerpt from:
Cloud Security Challenges in 2020 And How to Avoid Them - TechFunnel
- Roundup Of Cloud Computing Forecasts, 2017 - Forbes [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- RCom arm in tie-up for cloud computing - Moneycontrol.com [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- How Do You Define Cloud Computing? - Data Center Knowledge [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- 5 Cloud Computing Stocks to Buy - TheStreet.com [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Cloud Computing Continues to Influence HPC - insideHPC [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Red Hat's New Products Centered Around Cloud Computing, Containers - Virtualization Review [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Adobe bets big on cloud computing for marketing, creative professionals - Livemint [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Verizon sells cloud services to IBM in 'unique cooperation between ... - Cloud Tech [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- How Cloud Computing Is Turning the Tide on Heart Attacks - Fortune [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Hospital CIOs see benefits of healthcare cloud computing - TechTarget [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Trends In Cloud Computing - Business Solutions Magazine [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- A deeper dive into cloud security as a service: Advantages and issues - Cloud Tech [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- OpenText buys cloud computing firm for US$103 million - TheRecord.com [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Belfast IT firm celebrates cloud computing success in 57 countries ... - Belfast Telegraph [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Meet The Cloud Wars Top 10: The World's Most-Powerful Cloud-Computing Vendors - Forbes [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- How to approach cloud computing and cyber security in 2017 - Information Age [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- CFOs have discovered the big stick of cloud computing - InfoWorld [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Belmont Stakes Odds 2017: Latest Vegas Betting Lines Before Post Positions Draw - Bleacher Report [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Cloudistics Announces New Cloud Computing Program That Enables High Margin Reoccurring Revenue Models for ... - Marketwired (press release) [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- CloudCheckr, cloud computing company expects rapid growth in Rochester - WXXI News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- IBM Losing Facebook's WhatsApp as Cloud Customer, says CNBC - Barron's [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- What My Father Taught Me About Cloud Computing - Virtualization Review [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Workday Phenomenon Goes Global As Cloud Computing Goes Mainstream - Forbes [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- New Cloud Computing and IT Outsourcing Requirements in the Financial Sector - JD Supra (press release) [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- 3 Things You Should Know About Cloud Computing Right Now - Fortune [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Learning in the Sky: Collaborative Robots Embrace Cloud Computing - Machine Design [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Best Practices To Manage Your Hybrid Cloud - Forbes [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Here's how venture capitalists are thinking about cloud computing companies and technologies - GeekWire [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Amazon is helping veterans find jobs in cloud computing - Marketplace - Marketplace.org [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- New Cloud Computing and IT Outsourcing Requirements in the Financial Sector - Lexology (registration) [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Growing Patent Claim Risks in Cloud Computing - Lexology (registration) [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- The benefits of cloud computing, Rust 1.18, and intelligent tracking prevention in WebKit SD Times news digest ... - SDTimes.com [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Edge Computing Is New Cloud Computing Tech Investors Should Track - GuruFocus.com [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Real Estate Weekly: Digital Realty Becomes A Cloud Computing Giant - Seeking Alpha [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Virtualization admin? Pivot -- pivot now -- to a cloud computing career - TechTarget [Last Updated On: June 10th, 2017] [Originally Added On: June 10th, 2017]
- Why isn't Cloud Computing in the 2017 Belmont Stakes? - FanSided [Last Updated On: June 11th, 2017] [Originally Added On: June 11th, 2017]
- Cloud Computing Companies Move Into Medical Diagnosis (GOOG, IBM) - Investopedia [Last Updated On: June 11th, 2017] [Originally Added On: June 11th, 2017]
- China's cloud industry moving to new era with emergence of unicorns - TechNode (blog) [Last Updated On: June 12th, 2017] [Originally Added On: June 12th, 2017]
- Terry Crews Is On Crackdown 3 Trailer, No Cloud Computing For Single Player - EconoTimes [Last Updated On: June 12th, 2017] [Originally Added On: June 12th, 2017]
- The Risks and Perquisites of Cloud Computing - DATAQUEST [Last Updated On: June 12th, 2017] [Originally Added On: June 12th, 2017]
- Alibaba Cloud announces launch of data centres in India and Indonesia - Cloud Tech [Last Updated On: June 12th, 2017] [Originally Added On: June 12th, 2017]
- Indonesia banks have yet to implement cloud computing - Jakarta Post [Last Updated On: June 13th, 2017] [Originally Added On: June 13th, 2017]
- 'Sweden is heaven for cloud computing': Amazon Nordic chief - The ... - The Local Sweden [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- Amazon.com to open second government cloud-computing region ... - The Seattle Times [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- Shadow raises $57 million for its cloud computing service for ... - TechCrunch [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- Amazon Still Leads Cloud Rankings, But Competition Is Coming On Strong - Fortune [Last Updated On: June 16th, 2017] [Originally Added On: June 16th, 2017]
- Alibaba to enter European cloud computing market in mid-2017 | Air ... - Air Cargo World (registration) [Last Updated On: June 17th, 2017] [Originally Added On: June 17th, 2017]
- Alibaba to enter European cloud computing market in mid-2017 - Air Cargo World (registration) [Last Updated On: June 17th, 2017] [Originally Added On: June 17th, 2017]
- Pressing Tech Issue: Enterprise Software Vs. Cloud Computing? - Credit Union Times [Last Updated On: June 17th, 2017] [Originally Added On: June 17th, 2017]
- 7 Tips for Securely Moving Data to the Cloud - Government Technology (blog) [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- Chinese tech giant Alibaba joins key open-source cloud computing foundation - GeekWire [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- Microsoft Could Surpass Amazon in Cloud Computing This Year (AMZN, MSFT) - Investopedia [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- GDS Holdings Limited (GDS) Announces Strategic Partnership with Tencent Cloud - StreetInsider.com [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- Cloud first - Philippine Star [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- Three Considerations for Reducing Risk in Cloud Computing - CIOReview [Last Updated On: June 21st, 2017] [Originally Added On: June 21st, 2017]
- Cloud Computing and Digital Divide 2.0 - CircleID - CircleID [Last Updated On: June 21st, 2017] [Originally Added On: June 21st, 2017]
- Microsoft will ride artificial intelligence, cloud computing to higher ... - CNBC [Last Updated On: June 21st, 2017] [Originally Added On: June 21st, 2017]
- Cloud-Computing Business Lifts Oracle's Profit -- Update - Fox Business [Last Updated On: June 21st, 2017] [Originally Added On: June 21st, 2017]
- Report affirms continued cloud spend for US businesses in 2017 - Cloud Tech [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- Catching up with an interconnected federal cloud - GCN.com [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- Cloud-Computing Business Lifts Oracle's Profit -- 2nd Update - Fox Business [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- Cisco adapts to the rise of cloud computing - The Economist [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- Amazon accuses Walmart of bullying in cloud computing clash - BBC News [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- Companies plan to spend more on cloud computing services this year, higher prices among drivers: Clutch - Canadian Underwriter [Last Updated On: June 23rd, 2017] [Originally Added On: June 23rd, 2017]
- Survey: businesses ramp up spending on cloud computing DC ... - DC Velocity [Last Updated On: June 24th, 2017] [Originally Added On: June 24th, 2017]
- Morgan Stanley: Cloud computing is at 'an inflection point' but how big will it get? - GeekWire [Last Updated On: June 26th, 2017] [Originally Added On: June 26th, 2017]
- How the cloud has changed education and training - TNW [Last Updated On: June 26th, 2017] [Originally Added On: June 26th, 2017]
- Cloud computing key to 4th industrial revolution - News VietNamNet - VietNamNet Bridge [Last Updated On: June 26th, 2017] [Originally Added On: June 26th, 2017]
- Lady Eli, Cloud Computing Among Workers for Brown - BloodHorse.com (press release) (registration) (blog) [Last Updated On: June 26th, 2017] [Originally Added On: June 26th, 2017]
- Microsoft signs cloud-computing partnership with Box - The Seattle Times [Last Updated On: June 27th, 2017] [Originally Added On: June 27th, 2017]
- Microsoft Signs Cloud Computing Partnership with Box - CIO Today [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- US action on Microsoft email case could devastate cloud computing - Irish Times [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- Cloud computing challenges today: Planning, process and people - TechTarget [Last Updated On: July 2nd, 2017] [Originally Added On: July 2nd, 2017]
- Five podcasts to catch up on the latest trends in cloud computing - TechTarget [Last Updated On: July 2nd, 2017] [Originally Added On: July 2nd, 2017]
- Microsoft reportedly set to lay off thousands as part of massive sales reorganization - GeekWire [Last Updated On: July 3rd, 2017] [Originally Added On: July 3rd, 2017]
- VMware to surge more than 20 percent because the Amazon cloud ... - CNBC [Last Updated On: August 25th, 2017] [Originally Added On: August 25th, 2017]
- Google Unveils Custom Hardware Chip for Cloud - Investopedia [Last Updated On: August 25th, 2017] [Originally Added On: August 25th, 2017]
- Cloud Computing Confirmed for Travers | TDN | Thoroughbred Daily ... - Thoroughbred Daily News [Last Updated On: August 25th, 2017] [Originally Added On: August 25th, 2017]
- Why 2017 Is The Year To Understand Cloud Computing - Nasdaq [Last Updated On: August 25th, 2017] [Originally Added On: August 25th, 2017]
- Biz Cloud Computing - Four States Homepage [Last Updated On: August 25th, 2017] [Originally Added On: August 25th, 2017]