As more employees opt for remote work, organizations rely on cloud computing options for easy access to corporate data and applications. This dependence on the cloud also puts a new emphasis on cloud security.  

Yet, cloud security continues to be an afterthought for many companies. Industry leaders may be confused over who is responsible for security in public or hybrid cloud formats, but in general, the cloud service provider (CSP) is responsible for securing the cloud infrastructure and physical network. You, as a security professional at an organization, are responsible for securing all of the assets in the cloud, including data, applications, user access and supporting infrastructure. 

This confusion over accountability has led to a number of high-profile breaches and cyber incidents in recent years. While cloud security should always be a shared task, businesses need to step up efforts on their end to recognize potential cloud security threats and respond with best practices and good cybersecurity hygiene. 

Know the Challenges

Before you can put cloud security best practices in place, you have to recognize where the threats are coming from and the challenges they present. Within the cloud, one of the greatest challenges is the lack of a real perimeter. Another comes from questions about who is in charge of what aspects of cloud security. 

“Although CSPs, particularly the hyperscalers like Amazon Web Services (AWS), Microsoft and Google, provide some cloud-native security controls, they might not be enough to meet your security and compliance needs,” Luis Castro, offering manager, IBM Security Services writes. “It isn’t always clear where their security responsibilities begin and end.”

Cloud computing expands your attack surface as hackers and other threat actors are quick to exploit any open ports in a cloud system. It also obscures who has access. The CSP will need access into areas to provide security to the infrastructure, but there are weak checks and balances over who has trusted credentials on both the provider and client side. The bottom line is: the less control you have over your cloud setup, the more at risk it is. 

The Threats and Best Practices of Cloud Security

You can’t fix what you don’t know. Spotting the biggest security threats to your cloud setup is the first step. Once you know what types of challenges are threatening your cloud security, you can then take steps to mitigate risk with best practices.

Data Breaches

The challenge: A data breach is an organization’s worst nightmare. It results in the compromise or loss of customer information, intellectual property and employee’s personally identifiable information (PII), which in turn hurts the company’s reputation and can lead to financial loss. It can also mean the company will fail to comply with government or industry data privacy rules or rules set out in its contracts. 

The best practice: The best protection against data breaches is encryption. The breach may still occur, but the data won’t be compromised. Micro-segmentation of the cloud also won’t prevent a data breach, but it will limit the amount of data exposed. Regular audits and checks offer assessments of potential risks and can assess the most sensitive data first.

Cloud Leakage and Misconfigurations

The challenge: Sometimes data leaks out of the cloud and ends up exposed on the internet. This is most often due to a misconfiguration in cloud storage buckets, which is considered to be the greatest threat to cloud security and a top cause of cloud-based data breaches. The buckets are left unsecure or unencrypted. Often, after someone accesses the bucket, it is not properly configured or left open, allowing data to leak.

Best practices: Recognize that misconfigurations of storage buckets are the client’s responsibility, not the CSP’s (and this is usually written in the service level agreements). Users must learn how to configure and secure storage buckets and use unique passwords and authentication. There are also security tools available that will test for risks in storage buckets.

Logins and Trusted Accounts

The challenge: Credential theft is an increasingly popular attack method because anyone with proper credentials can gain access to the cloud environment without raising any red flags. Credentials are easy to steal, too. While some credential theft may involve keylogging malware, a drive-by threat actor could simply find a username and password written on a piece of paper. Unwanted logins with authentic credentials are difficult to detect.

Best practices: Deploy identity and access management (IAM) tools that can monitor users and look for anomalies in login behaviors. Cloud security awareness training is also useful. Employees should understand how to manage their credentials securely and not share or reuse passwords. 

Account Hijacking

The challenge: Account hijacking is a malicious takeover of cloud accounts. Threat actors tend to go after highly privileged accounts, often cloud service subscriptions. Account hijacking is often used for identity theft, too. In this case, the thief uses compromised credentials, most commonly an email, to take over the cloud account. Once hijacked, the threat actor can manipulate the data and applications in the cloud. 

Best practices: Know who has access to your cloud accounts, both within your company and with your CSP. Anyone who has access to the cloud should be required to go through a screening process, even more so if that person is using it as a third-party vendor. Back up cloud data often, and have a plan in place in case the account is hijacked. Encrypt all sensitive data stored in the cloud. Require multifactor authentication for anyone using the cloud environment. 

Insider Threat

The challenge: Sometimes your company’s worst enemy is coming from inside. The threat could be malicious, or it could be a mistake. Insider threats could be behind some of the other cloud security challenges, including data breaches, credential theft and misconfigurations. Or people could fall prey to phishing attacks and other social engineered attacks that result in data compromise. They could be moving corporate data from company clouds to shadow cloud formats on their personal devices. 

Best practices: Security awareness training will help employees recognize their own cloud security mistakes and how to identify and avoid social engineering tricks. Limit access so employees can only open applications and databases they need for work projects. Restrict access when you complete a project. Deactivate accounts and access when employees leave the company or move to different departments.

Keeping Cloud Security Best Practices In Mind 

As cloud computing becomes more common and remote workers depend on the cloud for network access, the security threats will increase and new challenges will emerge. Keeping security at the front of cloud adoption will make it easier to meet those challenges as they arise, rather than reacting to them after the damage is done.

More from Cloud Security

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe. With vulnerabilities on the rise, the catastrophic impact of cloud breaches has made it clear that proper cloud security is of the utmost importance. And…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…

How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a nice feature because it allows developers and administrators to manage GCP resources without having to install or keep any software locally on their system. From…