Blog Posts

Top 12 Cloud Security Threats

Blog: Indium Software - Big Data

Cloud computing has transformed organizations completely and the growth of cloud has created new security challenges. Cyberattacks have proliferated. According to experts, in 2021, there will be a cyberattack once every 11 seconds, which is twice more than the rate in 2019 and four times more compared to the rate in 2016.

According to the report released by Cloud Security Alliance, the following are the top 12 threats to cloud computing. The purpose of this article is to provide information on these cloud security threats and how to overcome them. The article discusses the root cause of the threat, what would be the business impact and what the organization can do to prevent these in future.

1. Data Breaches

An unauthorized way to steal sensitive and confidential information from a person or organization. A data breach is done to steal information like financial, product details and personal information.

Root cause:

A data breach occurs when a hacker gets access to extract data and sensitive information. This will happen by getting the access to user account details or bypassing the network security remotely.

Business Impact:

Reputation – In a competitive market, the reputation is the very big challenge for companies. Even if the data breach issue fixed, the company lost the credibility of the customers.

Finances -Hackers will destroy the website and bank account details. In these scenarios, the revenue loss to the respective company is huge.

Ideas – Apart from losing money and reputation, the company’s growth will be affected when an idea is stolen.

Not to mention it could also lead to a loss of intellectual property and potentially legal liabilities.

Remediation:

2. A lack of proper cloud security architecture, strategy

The aim to reduce the time to transfer data and systems to the cloud normally is prioritized over security.

Root cause:

The organization starts operating on the cloud using the security infrastructure and strategies that were tailor-made for it.

Business Impact:

It can lead to a misalignment of company’s key goals.

Remediation:

3. Insecure Interfaces and APIs

Generally, customers use multiple interfaces and APIs to interact with cloud management. These interfaces and APIs will provide provisioning and management in the cloud. The hackers attack cloud services by malicious attempts to damage APIs and interfaces.

Root cause:

At times cloud management provides access to third parties for using APIs and interfaces without validating their authentication and authorization.

Business Impact:

APIs do not have the proper architecture to prevent the accidental and intentional attempts to access sensitive data, hence issues such as data availability, integrity and confidentiality tend to arise.

Remediation:

4. System Vulnerabilities

If cloud computing provides the access to share memory, databases and other digital resources, then there is a chance for attack.

If the hacker gets hold of any details of the enterprise that will be more vulnerable to attack.

Root cause:

By providing remote access to the network and shared memory access without any validation

Business Impact:

The impact of unpatched system vulnerabilities on information system security is costly.

Remediation:

5. Account Hijacking

The process of hijacking an individual’s email account or an organization’s account to steal critical information. It is a kind of identity attack in which hacker will do an unauthorized attack.

Root cause:

By phishing, sending spoofed emails, password guessing and other different techniques used for Account hijacking. The hacker tries to get the personal information and financial transactional details from user-provided information.

Business Impact:

Cloud account hijacking effect will be much more at the organization level. Company reputation, integrity can be destroyed and confidential data leaked which consists of personal and financial data exposed during the cloud account hijacking incidents.

Remediation:

6. Malicious Insiders

A Malicious insider is a person inside the organization performing malicious activities with their access permissions.

Root cause:

A malicious insider threat is in the form of current/former employee or other business management partners who had known about the sensitive information and intentionally misuse it.

Business Impact:

A malicious insider, intentionally misusing the access will affect the confidentiality, integrity, and reputation of the organization.

Remediation:

7. Advanced Persistent Threats

An Advanced Persistent Threat (APT) is the process of attacking the network by passing malicious data into the network.

By using APT, hackers focus on getting the data instead of damaging it. Usually where the data consists of high-level information like national defence and banking sector.

Root cause:

Direct Hacking network, spear phishing and directly accessing the physical system through devices are some possible scenarios for APTs.

Business Impact:

Advanced Persistent Threats (APTs) are capable of getting a grasp of all the network control infrastructure of target organizations from which hackers can steal information such as intellectual property.

Remediation:

8.Data Loss

Data loss occurs when the data gets corrupted, deleted, modified and made unreachable to the end customer.

Root cause:

Data stored in the cloud can be lost due to multiple reasons such as fire accidents or cyclones and files mistakenly deleted by the cloud vendors.

Business Impact:

In general, data lost will not have much effect on the organization. However, the data should not be related to financial details, marketing strategies, product information and sensitive information about the company.

Remediation:

9. Insufficient Due Diligence

This occurs when an organization adapts to cloud technologies without checking due diligence in different scenarios such as financial, accessibility, authentication and legal risks.

Root cause:

Ignoring cloud technologies and CSPs to implement the business strategies is the root cause of Insufficient Due Diligence.

Business Impact:

If an organization is using cloud services without accomplishing due diligence, then the organization will face issues with Commercial, Technical, Legal and Compliance.

Remediation:

10. Abuse and Nefarious Use of Cloud Services

Unsecured cloud deployments, cloud service free trails and malicious emails sent to the customer for sign-ups in cloud service models such as Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service are the reason for this threat.

Root cause:

Cloud service providers failing to manage the accessing and deploying of the service models such as IaaS, PaaS, and SaaS.

Business Impact:

The Hackers can reduce the customer interaction capabilities to the cloud service resources through the malicious attacks and also reduce the availability of response from the cloud service providers.

Remediation:

11. Denial of Service

Denial-of-service (DOS) is the process of preventing end users from accessing cloud services by continuous engaging by a service from attacker end.

Root cause:

Hackers intentionally consume more amounts of finite system resources such as processor power, cloud memory, and network bandwidth.

Business Impact:

Service outages arise due to Denial-of-service attack if the same issue continues from the cloud service provider consumers will move to other service providers. This will affect more on revenue of the organization.

Remediation:

12. Shared Technology

Vulnerabilities- Cloud service providers provide their services such as IaaS, PaaS, and SaaS without appropriately validating access permissions in between the services.

Root cause:

The underlying components (CPU caches, GPU, etc) that compromise the infrastructure supporting cloud service and other levels of cloud service models and this impact leads to shared technology vulnerabilities.

Business Impact:

A shared platform component not only exposes one customer rather it impacts all services and is the most treacherous threat to an organization.

Remediation:

Conclusion

Organizations have realized that cloud has both advantages and disadvantages as far as security is concerned.

According to a study conducted by Clutch, 64% of enterprises consider cloud infrastructure more secure.

However, in the past, there were many breaches as discussed in this article. Addressing these security concerns is essential as it may affect the revenue and reputation of the organization.

It is critically important for organizations to follow the standard security practices. These 12 cloud threats are mapped to the OWASP 10 compliance standard in the below table.

Is Your Application Secure? We’re here to help. Talk to our experts Now

Inquire Now

Inquire Now

Is Your Application Secure? We’re here to help. Talk to our experts Now

Mapping Cloud Top 12 Threats with OWASP Top 10:

The underlying components (CPU caches, GPU, etc) that compromise the infrastructure supporting cloud service and other levels of cloud service models and this impact leads to shared technology vulnerabilities.

OWASP Top 10 Cloud Top 12 Threats
Injection (2) Insufficient Identity, Credential and Access Management(5) Account Hijacking(7) Advanced Persistent Threats
Broken Authentication and Session Management (1) Data Breach(2) Insufficient Identity, Credential and Access Management(5) Account Hijacking(7) Advanced Persistent Threats
Cross-Site Scripting (XSS) (2) Insufficient Identity, Credential and Access Management(7) Advanced Persistent Threats
Insecure Direct Object References (2) Insufficient Identity, Credential and Access Management(7) Advanced Persistent Threats
Security Misconfiguration (1) Data Breach(2) Insufficient Identity, Credential and Access Management
Sensitive Data Exposure (1) Data Breach(2) Insufficient Identity, Credential and Access Management
Missing Function Level Access Control (1) Data Breach(7) Advanced Persistent Threats
Cross-Site Request Forgery (CSRF) (2) Insufficient Identity, Credential and Access Management
Using Components with Known Vulnerabilities (2) Insufficient Identity, Credential and Access Management(3) Insecure Interfaces and APIs
Un-Validated Redirects and Forwards (2) Insufficient Identity, Credential and Access Management

The post Top 12 Cloud Security Threats appeared first on Indium Software.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/top-12-cloud-security-threats/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×