Working in the cloud has many advantages. But to handle your information safely, you should know how to defend against the common problem of misconfigurations leaving cloud data open to thieves. 

What are the Benefits of Cloud Computing?

Many groups are expanding their use of the cloud. In November 2019, Gartner announced its prediction that the worldwide public cloud service market would grow 17% to $266.4 billion by the end of 2020. It went on to forecast this market would continue to gain steam and reach $354.6 billion over the next couple of years.

Gartner’s estimates reflect the benefits of cloud computing. Those who migrate to the cloud can save money by not needing to purchase more equipment for supporting their ever-growing IT systems. In addition, it enables organizations to scale up their systems and grant workers remote access easily.

That said, Gartner’s suggestions collide with an important caveat for cloud data: misconfiguration events. Here, discover what cloud misconfigurations are and see why they count as a threat. We’ll also provide tips on how you can harden your security in the cloud.

What Does Misconfiguration Mean for Your Cloud Data?

Cloud misconfigurations come about when a user or team specifies settings that fail to provide adequate security for their cloud data. In the absence of strong security measures, attackers can leverage those misconfigurations in an effort to steal cloud data.

These types of security misconfigurations may take the form of organizations allowing unrestricted outbound access by accident. This enables all applications and servers to communicate with one another — even those that don’t require that privilege. Therefore, digital attackers can abuse that misconfiguration to view their target’s network and move laterally throughout the network once they’ve established a foothold and steal cloud data.

Similar threats result from open access to non-HTTP/HTTPS ports and open Internet Control Message Protocol (ICMP) access. In the former, malicious actors can use that access to conduct brute force attacks in an attempt to gain access to cloud data. As for the latter, they can use the ICMP Echo diagnostic tool to check out a target’s network or even launch a distributed denial-of-service (DDoS) attack by flooding a server with pings.

Cloud Misconfigurations in Context

Misconfigurations in the cloud aren’t rare events. A survey from Fugue found that every organization they surveyed running within the cloud had seen a misconfiguration incident at some point in the past. Most (73%) admitted to having over 10 misconfiguration incidents a day, followed by more than 100 (36%) and more than 500 (10%). The remaining three percent had no idea what their misconfiguration rate was.

The truth is, misconfigurations are not always easy to detect. Indeed, McAfee learned in a separate survey that just 1% of internet-as-a-service misconfigurations are reported. This suggests that many cloud users could be leaking data without even knowing it.

And misconfigurations can produce hefty price tags. DivvyCloud found they were the primary cause of 198 separate cloud breaches between 2018 and 2019. Those incidents exposed more than 33 billion records and cost companies a combined loss of $5 trillion.

Defending Your Cloud Data Against Misconfigurations

To enhance cloud protection strategies, defend yourself against cloud misconfigurations. A critical part of this is having the right tools that apply security controls to cloud data in particular. First, consider creating a secure configuration management (SCM) program. With this, you can create secure baselines for cloud data and monitor for problems.

But, don’t stop there. To be truly protected, invest in network monitoring tools capable of scanning the network for suspicious activity. A strange event in the cloud environment could be evidence of a malicious actor using a misconfiguration to their advantage. Network monitoring tools with threat intelligence streams can also help keep cloud data safe.

More from Cloud Security

How I got started: Cloud security engineer

3 min read - In today’s increasingly cloud-focused business environment, cloud security engineers are pivotal in protecting an organization’s critical data and infrastructure. As experts in cloud security, they leverage their expertise to ensure that the ever-expanding amount of cloud data is safe from emerging threats and vulnerabilities. Cloud security professionals combine their passion for technology with a deep understanding of security principles to design and implement robust cloud security strategies. What experience do these security experts have, and what led them to the…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Lessons learned from the Microsoft Cloud breach

3 min read - In early July, the news broke that threat actors in China used a Microsoft security flaw to execute highly targeted and sophisticated espionage against dozens of entities. Victims included the U.S. Commerce Secretary, several U.S. State Department officials and other organizations not yet publicly named. Officials and researchers alike are concerned that Microsoft products were again used to pull off an intelligence coup, such as during the SolarWinds incident. In the wake of the breach, the Department of Homeland Security…

What you need to know about protecting your data across the hybrid cloud

6 min read - The adoption of hybrid cloud environments driving business operations has become an ever-increasing trend for organizations. The hybrid cloud combines the best of both worlds, offering the flexibility of public cloud services and the security of private on-premises infrastructure. We also see an explosion of SaaS platforms and applications, such as Salesforce or Slack, where users input data, send and download files and access data stored with cloud providers. However, with this fusion of cloud resources, the risk of data…