The Technology Headlines DEMAND FORCASTING & AI | Page 8
EXPERT ANALYSIS
THE TECHNOLOGY HEADLINES
OUT IN THE OPEN - THREATS TO A CLOUD ENVIRONMENT
By Ranulf Green ,Context Information Security
Ranulf Green
CONTEXT INFORMATION SECURITY
S3 buckets are well known and have been blamed for high
profile breaches with the likes of Facebook, GoDaddy and
Verizon. However, the risks associated with exposed AMIs,
SQS queues, or mis-configured CNDs, load balancers, API
gateways and firewalls that leave cloud resources publicly
exposed are less familiar. But they are all weaknesses that
Context researchers have found with simulated attacks
during penetration testing engagements.
Here is a list of things you need to consider if you are
migrating your applications and sensitive data to the cloud.
The human factor
M
igration to the cloud shows no signs of slowing
down, with the latest figures from a market survey
by RightScale showing that adoption rates have
hit 91% of respondents. Multi- or hybrid-cloud seems to be
the primary enterprise strategy,but public cloud investment
spend has also seen a 24% increase in 2019 vs 2018.
Whatever your cloud strategy is, when deploying into the
cloud you’re putting your processes, intellectual property
and customers’ data outside of the physical and logical
boundaries of your traditional on-premise environments.
Public cloud providers are holding your assets in data
centers that you don’t controlon hardware that is most likely
shared with other companies. The secrets in the name – your
resources are in the ‘public’ cloud and if you let them be
public, they will be.
Some of the security risks of migrating to the cloud are well
documented. For example, the dangers of publicly accessible
AUGUST 2019
One successful spear-phishing attack shouldn’t be able
to bring down your entire cloud environment. How are
accounts configured, what privileges are assigned and how
are actions monitored? These are all key questions to answer
in order to know what the impact of a successful account
compromise could be.
The hybrid / multi-cloud
If you want your in-house services to be able to communicate
with the cloud via a permanent link, you have to add BGP,
overlay networking and/or site-to-site VPNs to your list of
things to think about.
If you want to diversify your estate and be able to deploy to
multiple cloud providers with the flick of a switch, how will
inter-cloud communication work if systems in one cloud
provider need to talk to systems in another cloud provider?
Will this be via the Internet, or internally using your on-
premise network as an intermediate hop? What about an
overlay network, using one subnet to bridge across multiple
8