Monday, March 20, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Biden administration sees dangers in cloud, but users must protect perimeters

Researcher by Researcher
March 19, 2023
in Cybersecurity
0
Biden administration sees dangers in cloud, but users must protect perimeters
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The White House press conference podium.
Image: Maksym Yemelyanov/Adobe Stock

President Joe Biden’s administration, as part of its recently released National Cybersecurity Strategy, said critical sectors such as telecommunications, energy and healthcare rely on the cybersecurity and resilience of cloud service providers.

Yet, recent reports suggest the administration has concerns that major cloud service providers constitute a massive threat surface — one through which an attacker could disrupt public and private infrastructure and services.

Related articles

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023

That concern is hard to argue with given the monolithic nature of the sector. Research firm Gartner, in its most recent look at worldwide cloud infrastructure-as-a-service market share, put Amazon on top, leading with revenue of $35.4 billion in 2021, with the rest of the market share breakdown as follows:

  • Amazon: 38.9%
  • Microsoft: 21.1%
  • Alibaba: 9.5%
  • Google: 7.1%
  • Huawei: 4.6%

The Synergy Group reported that together, Amazon, Microsoft and Google accounted for two-thirds of cloud infrastructure revenues in three months ending Sept. 30, 2022, with the eight largest providers controlling more than 80% of the market, translating to three-quarters of web revenue.

Jump to:

A focus on cloud service providers?

The administration’s report noted that threat actors use the cloud, domain registrars, hosting and email providers, as well as other services to conduct exploits, coordinate operations and spy. Additionally, it advocated for regulations to drive the adoption of secure-by-design principles and that regulations will define “minimum expected cybersecurity practices or outcomes.”

Also, it will “identify gaps in authorities to drive better cybersecurity practices in the cloud computing industry and for other essential third-party services and work with industry, congress and regulators to close them,” according to the administration report.

If the administration is speaking to CSPs controlling traffic through vast swaths of the global web with an eye to regulating their security practices, it may be moot, as CSPs already have strong security protocols in place, noted Chris Winckless, senior director analyst at Gartner.

“Cloud providers appear from all evidence to be highly secure in what they do, but the lack of transparency on how they do so is a concern,” Winckless said.

See: Cloud security, hampered by proliferation of tools, has a “forest for trees” problem (TechRepublic)

However, Winckless also said there are limits to resilience, and the buck ultimately lands on the customer’s desk.

“The use of the cloud is not secure, either from individual tenants, who don’t configure well or don’t design for resiliency,  or from criminal/nation-state actors, who can take advantage of the dynamism and pay for flexibility model,” he added.

Cloud providers already offering enough

Chris Doman, chief technology officer of cloud incident response firm Cado Security, said major cloud service providers are already the best at managing and securing cloud infrastructure.

Must-read security coverage

“To question their abilities and infer that the U.S. government would ‘know better’ in terms of regulation and security guidance would be misleading,” Doman said.

Imposing “know-your-customer” requirements on cloud providers may be well intentioned, but it risks pushing attackers to use services that are further from the reach of law enforcement, he said.

The biggest threat to cloud infrastructure is physical disaster, not technology failures, Doman said.

“The financial services industry is a great example of how a sector diversifies activity across multiple cloud providers to avoid any points of failure,” said Doman. “Critical infrastructure entities modernizing towards the cloud need to think about disaster recovery plans. Most critical infrastructure entities are not in a position to go fully multicloud, limiting points of exposure.”

Cloud customers need to implement security

While the Biden administration said it would work with cloud and internet infrastructure providers to identify “malicious use of U.S. infrastructure, share reports of malicious use with the government” and “make it easier for victims to report abuse of these systems and … more difficult for malicious actors to gain access to these resources in the first place,” doing so could pose challenges.

Mike Beckley, founder and chief technology officer of process automation firm Appian, said that the government is rightly sounding the alarm over the vulnerability of government systems.

“But, it has a bigger problem, and that is that most of its software isn’t from us or Microsoft or Salesforce or Palantir, for that matter,” said Beckley. “It’s written by a low-cost bidder in custom contracts and, therefore, sneaks by most rules and constraints we operate by as commercial providers.

“Whatever the government thinks it’s buying is changing every day, based on least experience or least qualified, or even the most malicious contractor who has the rights and permissions to  upload new libraries and codes. Every single one of those custom-code pipelines has to be built up for every project and is therefore only as good as the team that is doing it.”

It’s on customers to defend against major cloud-based threats

Seeking out malefactors is a big ask for CSPs like Amazon, Google and Microsoft, said Mike Britton, chief information security officer at Abnormal Security.

“Ultimately, the cloud is just another fancy word for outside servers, and that digital space is now a commodity — I can store petabytes for pennies on the dollar,” said Britton. “We now live in a world where everything is API- and internet-based, so there are no barriers as there were in the old days.

SEE: Top 10 open-source security and operational risks (TechRepublic)

“There is a shared responsibility matrix, where the cloud provider handles issues like hardware operating system patches, but it is the customer’s responsibility to know what is public facing and opt in or out. I do think it would be good if there were the equivalent of a ‘no’ failsafe asking something like ‘Did you mean to do that?’ when it comes to actions like making storage buckets public.

“Taking your 50 terabytes in an S3 storage bucket and accidentally making it publicly available is potentially shooting yourself in the foot. So, cloud security posture management solutions are useful. And consumers of cloud services need to have good processes in order.”

Major threats to your cloud operations

Check Point Security’s 2022 Cloud Security report listed leading threats to cloud security.

Misconfigurations

A leading cause of cloud data breaches, organizations’ cloud security posture management strategies are inadequate for protecting their cloud-based infrastructure from misconfigurations.

Unauthorized access

Cloud-based deployments outside of the network perimeter and directly accessible from the public internet make unauthorized access easier.

Insecure interfaces and APIs

CSPs often provide a number of application programming interfaces and interfaces for their customers, according to Check Point, but security depends on whether a customer has secured the interfaces for their cloud-based infrastructures.

Hijacked accounts

Not a surprise, password security is a weak link and often includes bad practices like password reuse and the use of poor passwords. This problem exacerbates the impact of phishing attacks and data breaches since it enables a single stolen password to be used on multiple different accounts.

Lack of visibility

An organization’s cloud resources are located outside of the corporate network and run on infrastructure that the company does not own.

“As a result, many traditional tools for achieving network visibility are not effective for cloud environments,” Check Point noted. “And some organizations lack cloud-focused security tools. This can limit an organization’s ability to monitor their cloud-based resources and protect them against attack.”

External data sharing

The cloud makes data sharing easy, whether through an email invitation to a collaborator, or through a shared link. That ease of data sharing poses a security risk.

Malicious insiders

Although paradoxical since insiders are inside the perimeter, someone with bad intent may have authorized access to an organization’s network and some of the sensitive resources it contains.

“On the cloud, detection of a malicious insider is even more difficult,” said CheckPoint’s report. “With cloud deployments, companies lack control over their underlying infrastructure, making many traditional security solutions less effective.”

Cyberattacks as big business

Cybercrime targets are mostly based on profitability. Cloud-based infrastructure that is  accessible to the public from the internet can be improperly secured and can contain sensitive and valuable data.

Denial-of-service attacks

The cloud is essential to many organizations’ ability to do business. They use the cloud to store business-critical data and to run important internal and customer-facing applications.

Ethical hacking may secure operations in the cloud and on-premises

It’s important for organizations to secure their own perimeters and conduct a regular cadence of tests on vulnerabilities internal and external.

If you want to hone your ethical hacking skills for web pen testing and more, check out this comprehensive TechRepublic Academy ethical hacking course bundle.

Read next: How to minimize security risks: Follow these best practices for success (TechRepublic)



Source link

Tags: AdministrationBidenclouddangersperimetersprotectSeesusers
Share76Tweet47

Related Posts

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
0

A possible Chinese attack campaign on compromised unpatched SonicWall SMA edge devices stayed undetected since 2021 and could persist even...

Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
0

A new ransomware family has proven highly active over the past several months, cybersecurity firm Palo Alto Networks warns. Dubbed...

Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder

Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder

March 19, 2023
0

Chinese technology giant Huawei has replaced thousands of product components banned by the United States with homegrown versions, its founder...

How to prevent data theft by existing and departing employees

How to prevent data theft by existing and departing employees

March 19, 2023
0

Some 12% of employees take customer details, health records, sales contracts and other confidential data when leaving a company, according...

YoroTrooper Group Targets European, CIS Countries in Cyberespionage Campaigns

YoroTrooper Group Targets European, CIS Countries in Cyberespionage Campaigns

March 18, 2023
0

For the last nine months, a previously unknown Russian-speaking threat actor has been targeting government, energy, and international organizations in...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
What’s the Best Way to Sack People?

What’s the Best Way to Sack People?

March 20, 2023
Biden administration sees dangers in cloud, but users must protect perimeters

Biden administration sees dangers in cloud, but users must protect perimeters

March 19, 2023

Recent Posts

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
What’s the Best Way to Sack People?

What’s the Best Way to Sack People?

March 20, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved