GDT Webinar Series – How to Fail at Security? Reserve Your Spot

The Top Cloud Security Threat Comes from Within

One of the biggest cloud security threats your company faces isn’t malicious. In fact, it originates from inside your IT organization.

Accidental misconfigurations pose one of the leading security vulnerabilities IT organizations contend with in the cloud. According to a recent study, 79% of companies had experienced a cloud data breach in the past 18 months—and 67% of respondents had identified security misconfiguration as the top security threat.

Despite incredible advances in cloud security, misconfigurations tend to happen more often in the cloud than on-premises, leading to leaked data, service disruptions, and other costly troubles. This article explores some of the most common misconfiguration risks and how you can address them to tighten up cloud security.

Why misconfigurations happen

Misconfigurations occur for various reasons. Although today’s cloud is more secure than ever, it also has more settings and protocols to be aware of, especially in a multi-tenant environment. Simple oversights such as not ticking a box can have major repercussions. In fact, Gartner estimates 99% of cloud security failures will be the customer’s fault—at least through 2025. 

One reason is that, as data and workloads shift to the cloud, necessary skillsets become much more specialized. Most established IT professionals have far more experience with on-premises security and much less experience and training in the cloud, increasing the chances of accidental misconfiguration. Meanwhile, while newer, less tenured FTEs may be more accustomed to publishing data to the cloud, they’re not necessarily accustomed to dealing with security, leading to configuration missteps.

Furthermore, when data and workloads reside on-premises, a firewall provides an extra layer of protection. So even when a setting gets misconfigured, there’s a lower chance of exposure outside the firewall. But if something gets misconfigured in the cloud, the risk is much higher.

Common cloud misconfiguration gotchas

As with many things, prevention begins with awareness. Be on the lookout for these common cloud misconfiguration gotchas.

Overly permissive access privileges

Overly permissive access policies and privileges enable expanded access to far more assets than needed. You may think user credentials are limited only to find out later that they were unlimited.

Storage misconfiguration

Misconfiguration opportunities abound when it comes to cloud storage. Confidential or regulated assets can inadvertently get mislabeled and find their way to external audiences. Furthermore, weak encryption can further expose assets.

Insufficient or misconfigured logging and monitoring

Monitoring and logging play a foundational security role in threat detection and mitigation. When monitoring and logging are compromised, it makes it difficult to detect events and changes and where they originated.  

Not securing inbound and outbound ports

Ports provide opportunities for bad actors. Minimizing unnecessary inbound and outbound ports is half the battle. Restricting access is the other half.

Default system credentials

If a new server is spun up and it doesn’t have a default credential, it may have all-encompassing access. Ensure all systems have default credentials.

Development settings in production

Imagine making changes in development, only to log off and realize you were in production, potentially breaking the application or locking users out. Misconfigured development settings are often the culprit in such scenarios.

Minimizing misconfiguration risk

In addition to awareness, organizations can enhance security practices and policies to help minimize misconfigurations. This includes ensuring clear infrastructure visibility as well as implementing strategies such as automation, targeted training, and regular security audits.

To eliminate many of the traditional misconfiguration concerns of the public cloud, consider leveraging HPE GreenLake in a privatized custom-built cloud, either on-premises or in the cloud. Furthermore, HPE GreenLake Management Services provides managed security services, including security monitoring, privileged access management, vulnerability management, and security hardening.

GDT can help your organization make the most of HPE solutions to improve your cloud security posture. Contact the security experts at GDT to learn more.

Author

Share this article

You might also like:

The advent of artificial intelligence (AI) brings transformative potential across industries while also introducing significant data security challenges. As AI systems become integral to operational and decision-making processes, safeguarding sensitive information against sophisticated threats is paramount. This exploration sheds light on the complexities of AI and data security and proposes

Transport layer security (TLS) is one of the most common tools for keeping users safe on the internet. When automated, TLS certification management can help organizations ensure more reliable and consistent use of TLS, reducing the need for human intervention and risk of human error. In fact, over the years,

As the head of GDT’s security practice and an industry veteran, Jeanne Malone and her team help customers worldwide advance their cybersecurity posture. One of the biggest cybersecurity game-changers is artificial intelligence (AI). We asked Jeanne to weigh in on leveraging AI and machine learning in cybersecurity to improve intrusion