Check Point and Cybersecurity Insiders have released their global 2020 Cloud Security Report, wherein the emphasis was placed on the cloud security challenges that business security systems face in the protection of data and workloads in their public cloud systems.
According to the report, 75% of respondents revealed that they were highly concerned about public cloud security as it continues to remain a big challenge for them.
One of the current cloud computing security issues and challenges affecting cloud security in 2020 is the problem of data breaches. The data breach has several consequences, some of which includes:
This is another of the most widespread cloud security challenges facing cloud technology in 2020. For example, a misconfigured AWS Simple Storage Service (S3) cloud storage bucket leaked accurate and sensitive data of about 123 million American families in 2017.
The dataset was owned by Experian, a credit bureau that engaged in the selling of the data to an online marketing and data analytics organization called Alteryx. The file was exposed by Alteryx. Such an incidence can have lethal consequences.
All over the world, several businesses are moving parts of their IT infrastructure to public clouds. A major issue with this migration is the incorporation of adequate security structures to tackle cyber threats.
The challenge however is that most businesses still find it almost impossible to implement this process. Datasets are vulnerable to several attacks when businesses make the assumption that cloud transition is a simple-to-execute task of just migrating their present IT system and security architecture to a cloud environment. Another contributing factor is also a lack of understanding of the shared security role model.
With cloud computing comes several changes to typical internal system management practices associated with identity and access management (IAM). Although these arent really new cloud security challenges, they are however more important challenges when working on a cloud-based environment.
This is because cloud computing has great effects on identity, credential, and access management. In both private and public cloud environments, there is a need for CSPs and cloud users to manage IAM without impairing security.
The hijacking of accounts is an issue characterized by the access to and abuse of accounts that contain extremely sensitive or private details, by malicious attackers. Usually, the accounts with the most threats in cloud environments are subscriptions or cloud service accounts.
These accounts are prone to compromise as a result of stolen credentials, exploiting cloud-based systems, and phishing attacks.
According to the 2018 Netwrix Cloud Security Report, 58% of organizations indicate insiders as the cause of security breaches. Thus, most security incidents are caused by insider negligence.
The report from the Ponemon Institutes 2018 Cost of Insider Threats study indicated that 13% of the reported insider incidents were caused by credential theft, 23% were associated with criminal insiders, and a whopping 64% was as a result of employee or contractor negligence.
Some of the cited common scenarios are: employees or other internal staff being victims of phishing emails that resulted in malicious attacks on business assets, employees saving private company data on their own poorly secure personal systems or devices, and cloud servers that have been configured inappropriately.
In order to enable consumers to manage and utilize cloud systems, cloud computing providers release a set of software user interfaces (UIs) and APIs. These APIs are the ones that determine how secure and available the overall cloud servers services will be.
From access management and authentication to activity control and encryption, it is necessary that these interfaces are designed for protection against both malicious and accidental attempts to infiltrate the security policy. The implications of insecure APIs can be the abuse or even worse the breach of a dataset.
A number of major data breaches have been caused by hacked, exposed, or broken APIs. In essence, it becomes imperative for companies to have an understanding of the security features that characterize the design and presentation of these interfaces on the internet.
The transition from the data platform to the cloud environment creates certain issues for the creation of adequate data storage and protection protocol. It is now important for the user to create fresh processes for duplicating, migrating, and storing data.
This process becomes even more complex if the user would be employing Multi-cloud. These problems should be solved by a control plane. This is because it provides the integrity and security that would complement the data plane which brings about stability and runtime of the data.
An inefficient control plane indicates that whoever is in charge either a DevOps engineer or a system architect does not have complete control over the verification, security, and logic of the data infrastructure.
In this kind of situation, major stakeholders are unaware of how data flows, the security configuration, and the positions/areas of structural weak points and blind spots. As a result of these challenges in cloud security, the company could experience data leakage, unavailability, or corruption.
Every now and then, cloud service providers reveal processes and security protocols that are needed in order to successfully integrate and safeguard their systems. In most cases, this information is disclosed via API calls and the protections are integrated into the CSPs metastructure.
The metastructure is regarded as the customer line/CSP of demarcation, also called the waterline. In this model, several levels are characterized by error possibilities. For instance, inappropriate API integration by the CSP makes it easier for attackers to hinder cloud customers through the interruption of integrity, confidentiality, of service availability.
Restricted cloud usage visibility is the outcome of the inability of a company to visualize and analyze the safety or maliciousness of the cloud service used within the organization. There are two major cloud security challenges in this concept.
The first is un-sanctioned app use. This happens when employees are making use of cloud tools and applications without the specific authorization of corporate IT and security. This, therefore, leads to a self-assistance model known as Shadow IT.
It is risky when insecure cloud services activity is not in accordance with corporate guidelines, especially when integrated with sensitive corporate data. According to forecasts made by Gartner, by 2020, of all successful security infiltration in businesses will be driven by shadow IT systems and resources.
Secondly, is sanctioned application misuse. It is usually difficult for companies to carry out analysis on how approved apps are being taken advantage of by insiders who make use of the sanctioned app.
Most often, this utilization takes place without the specific permission of the organization, or by external threat agents that target the service though methods like Domain Name System (DNS) attacks, Structured Query Language (SQL) injection, credential theft, and others.
Malicious attackers may take advantage of cloud computing resources to target cloud providers, as well as other users or organizations. It is also possible for malicious actors to host malware on cloud services.
Malware that is hosted on cloud service may appear to have higher legitimacy because the malware utilizes the domain of the CSP. In addition, cloud-based malware can utilize cloud-sharing resources like an attack vector to propagate itself the more.
According to a survey, about 60% of respondents ascertain or strongly ascertain that the launching of business services in the cloud has skyrocketed beyond their ability to effectively maintain them in a timely manner. This figure remains the same since it was reported. This means that there has been no progress in that aspect. With the increasing rate of public cloud adoption, it is safe to conclude that the ground has been lost.
The primary objective of DoS attacks is to disable a system, network, or machine so that it becomes inaccessible to its intended users. The development and growth of cryptocurrencies like Ripple and Bitcoin make it easy for DoS attacks to occur the more.
By using cryptocurrency, it is no longer a must for cybercriminals to acquire the needed skills or possess control over a botnet. All they need to do is hire another hacker via these funding options to execute the work on their behalf.
In terms of security features, Vendor Lock is identified as a risk factor. It is highly restrictive to be limited to just one compatible security solution choice for a cloud service. The impact of this can be a low ROI for security.
This is because the locked-in vendor does not need to be in competition with other vendors. They are with your company since youre their only choice if you desire a functional service without starting all over from the scratch.
Thus, it is necessary that you ascertain how effective it would be to move from a particular service provider to another when choosing cloud-based services. It is pertinent that you consider certain factors before choosing a cloud computing service in order to avoid vendor lock-in (for either your cloud service itself or your security solutions). Consider these factors:
Awareness and adequate communication of security risks is an important aspect of network security, as well as cloud security. A thorough security solution must be able to alert the respective website or app managers immediately it perceives a security threat.
Without clear and prompt communication, the appropriate entities will not be able to quickly mitigate the threat and take proper steps that will minimize the threat.
In all, although all of the issues discussed above pose a threat to cloud security, they are however not insurmountable. With the proper approach, technology, and partners, businesses can overcome the cloud security challenges and begin to enjoy the abundant benefits of cloud technology.
Read the rest here:
Cloud Security Challenges in 2020 And How to Avoid Them - TechFunnel
- How Do You Define Cloud Computing? - Data Center Knowledge [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- RCom arm in tie-up for cloud computing - Moneycontrol.com [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Roundup Of Cloud Computing Forecasts, 2017 - Forbes [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Cloud Computing Continues to Influence HPC - insideHPC [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- 5 Cloud Computing Stocks to Buy - TheStreet.com [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Adobe bets big on cloud computing for marketing, creative professionals - Livemint [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Red Hat's New Products Centered Around Cloud Computing, Containers - Virtualization Review [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Verizon sells cloud services to IBM in 'unique cooperation between ... - Cloud Tech [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Hospital CIOs see benefits of healthcare cloud computing - TechTarget [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- How Cloud Computing Is Turning the Tide on Heart Attacks - Fortune [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- What is Cloud Computing Technology?: Cloud Definition ... [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Daily Report: Cloud Computing Asserts Itself - New York Times [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- Verizon sells cloud services to IBM in 'unique cooperation between two tech leaders' - Cloud Tech [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- CIOs embrace the value of cloud computing in healthcare - TechTarget [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- Heptio's Joe Beda: Before embracing cloud computing, make sure your culture is ready - GeekWire [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- CLOUD COMPUTING Cisco Expands Cloud IoT Services with $610M Viptela Acquisition - CIO Today [Last Updated On: May 6th, 2017] [Originally Added On: May 6th, 2017]
- A prepaid wallet that helps start-ups access cloud-computing services - The Hindu [Last Updated On: May 6th, 2017] [Originally Added On: May 6th, 2017]
- Google: No to Price War Over Cloud Computing - Investopedia [Last Updated On: May 6th, 2017] [Originally Added On: May 6th, 2017]
- 3 things to know about the cloud v. data center decision - ZDNet [Last Updated On: May 8th, 2017] [Originally Added On: May 8th, 2017]
- OpenStack Foundation cites 'capabilities, compliance and cost' as Summit kicks off - Cloud Tech [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Profit From Cloud Computing Boom With This ETF - Seeking Alpha [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Autonomous Driving Market Focuses on Artificial Intelligence and ... - PR Newswire (press release) [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- The cloud computing tidal wave - BetaNews [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Aruba predicts a hybrid future for edge and cloud computing - The Internet of Business (blog) [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- China Says Draft Rules on Cloud Computing Have Been Misunderstood - Wall Street Journal (subscription) [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Oracle launches cloud computing service for India | Business Line - Hindu Business Line [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Microsoft is on the edge: Windows, Office? Naah. Let's talk about cloud, AI - The Register [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- IBM touts its cloud platform as quickest for AI with benchmark tests - Cloud Tech [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Enterprise-owned data centres still 'essential' despite cloud growth, research notes - Cloud Tech [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- You really should know what the Andrew File System is - Network World [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Microsoft launches Android app to manage its Azure cloud computing platform - Android Police [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- 3 Cloud Computing Stocks To Buy Right Now - May 10, 2017 ... - Zacks.com [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Virtustream Adds Enterprise Cloud to Global Dell EMC Partner Program - Cloud Computing Intelligence (registration) (blog) [Last Updated On: May 13th, 2017] [Originally Added On: May 13th, 2017]
- Trump signs cybersecurity executive order, mandating a move to cloud computing - GeekWire [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cloud Computing, Term of Art Complete Preakness Works - BloodHorse.com (press release) (registration) (blog) [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- IBM Announces The Defense Calculator And A Cloud Computing Service - Forbes [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Achieving compliance in the cloud - CSO Online [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Boston schools CIO Mark Racine takes hybrid approach to cloud computing - EdScoop News (press release) (registration) (blog) [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Benefit-risk 'tipping point' for cloud computing now passed, says ... - Out-Law.com [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Cloud Computing puts in work for Preakness before deluge - Daily Racing Form [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- How telecom is shifting its strategy to support cloud computing - SiliconANGLE (blog) [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Cloud computing - Simple English Wikipedia, the free encyclopedia [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- How Alphabet Views the Cloud Computing Price Wars - Market Realist [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Keying Longshot Cloud Computing in the Preakness - America's Best Racing [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Microsoft Extends Cloud-Computing Arms Race to Africa - Fox Business [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Firms Face Decelerating Cloud Spending: Analyst - Investopedia [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Is edge computing set to blow away the cloud? - Cloud Tech [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Microsoft Extends Cloud-Computing Arms Race to Africa - Wall Street Journal (subscription) [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Rested and ready: 13-1 shot Cloud Computing wins Preakness - Fairfield Daily Republic [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Watch Cloud Computing's thrilling come-from-behind finish at the Preakness Stakes - For The Win [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud Computing wins the 142nd Preakness Stakes in front of a record crowd [Photos] - Baltimore Business Journal [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- 13-1 shot Cloud Computing edges Classic Empire, springs upset in Preakness - News3LV [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud Computing Wins Preakness Stakes, and Techies Are Stoked - Fortune [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud Computing wins Preakness Stakes, dashing Always ... [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud computing, Galeria Inno and change at Deka - Delano.lu [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Roundup Of Cloud Computing Forecasts, 2017 - Enterprise Irregulars (blog) [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing Does Not Need Help From Washington - Cramer's ... - Seeking Alpha [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- CTOvision Assessment on The Megatrend of Cloud Computing - CTOvision (blog) [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing's Trainer Wins One for His Mentor at Preakness - New York Times [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Make sense of edge computing vs. cloud computing | InfoWorld - InfoWorld [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing Takes the Preakness - RFD-TV [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing takes Preakness - CNN.com [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Make Sense of Edge Computing vs. Cloud Computing - Linux.com (blog) [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- How will cloud computing and analytics affect Citrix shops? - TechTarget [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Red Hat to acquire cloud computing firm - Triangle Business Journal [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Cloud computing streamlines oil field monitoring - Williston Daily Herald [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Fans should appreciate Cloud Computing's Preakness win - ESPN [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Cray Takes the Plunge into Cloud Computing - TOP500 News [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Baidu to leverage cloud computing, artificial intelligence, in effort to ramp up behavioural analysis - South China Morning Post [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Cloud computing will change the nature of hospital IT shops - Healthcare IT News [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Microsoft's weapon in high-stakes cloud-computing battle with Amazon? Freebies - The Seattle Times [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Amazon Shares Hit $1000, Showing Dominance of E-Commerce, Cloud - The VAR Guy [Last Updated On: May 30th, 2017] [Originally Added On: May 30th, 2017]
- Oracle set to expand cloud reach with Tencent alliance - South China Morning Post [Last Updated On: May 30th, 2017] [Originally Added On: May 30th, 2017]
- Cloud Computing to Skip Belmont as Field Comes into Focus - America's Best Racing [Last Updated On: May 30th, 2017] [Originally Added On: May 30th, 2017]
- Movers: Amazon's Stock Price Hits $1000 - New York Times [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Mary Meeker: Healthcare technology is booming thanks to cloud computing and wearables - SiliconANGLE (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Will Amazon's Web Services Business Get Hurt by Cloud Computing Commodification? - HuffPost [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Box CEO Aaron Levie: Artificial intelligence to revolutionize cloud computing - MarketWatch [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cloud computing takes off as top new discipline on campus - Education Dive [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- CIOs and factors overlooked when changing your cloud - Cloud Tech [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]