Cloud Security Alliance (CSA) recently published its 2022 Top Threats to Cloud Computing report, the sixth installment of an industry-wide survey that aims to raise awareness of threats, vulnerabilities, and risks in cloud computing.

This year's edition identified eleven threats, ranked below in their order of importance per the survey's results. CSA calls this list the Top Threats to Cloud Computing – Pandemic Eleven!

Rather than reproduce the report's contents verbatim, I wanted to create a handy, referenceable, and actionable summary of the top cloud computing security threats for data and security practitioner folks. To that end, I've narrowed down the report's original scope to focus on the threats' essential aspects.

The remainder of this post is organized into discrete per-threat sections, with each section highlighting the following threat-specific information:

So, sit tight for a tour of the top cloud computing security threats!


Security Threat 1: Insufficient Identity and Access Management, Privileged Accounts

Identity and Access Management (IAM) encapsulates tools, policies, and processes to provision, authorize, and deprovision access to sensitive business data stored in files and databases, infrastructure resources such as physical machines and cloud virtual instances, and premises such as server rooms and data centers.

Credentials, keys, tokens, and certificates are how users and applications are granted access to a business' data, infrastructure, and premises.

Privileged accounts selectively grant elevated access rights to certain users and applications, which allows them to read, modify, delete, and destroy sensitive data, and infrastructure resources.

Insufficient management of credentials, keys, tokens, and certificates, coupled with weak authorization policies and loosely controlled privileged accounts, constitutes a threat to business in the form of malicious insiders, account takeovers, and supply chain attacks.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 2: Insecure Interfaces and APIs

As part of stack modernization, both new and rearchitected legacy apps alike are being built using microservices-based architectures. This has led to a growth surge in API usage across organizations as this paraphrased quote from a 2021 Akamai report shows:

In the previous year, Akamai delivered more than 300 trillion API requests, a 53% year-over-year increase!

At the same time, this surge in API usage has introduced new threats for organizations. Misconfigurations, weak authentication and authorization, and poor coding practices can leave APIs vulnerable to malicious insiders and outside attackers. Common issues include the following:

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 3: Misconfiguration and Inadequate Change Control

Misconfigurations result from insecure setups of data or infrastructure resources that leave them vulnerable to unintended exposure or damage by malicious insiders and external attackers.

Following are examples of security misconfigurations common in the cloud:

Inadequate change control refers to the fact that it's much harder to monitor, review, and approve configuration changes on the cloud compared to on-premises data centers. Most, if not all, cloud configuration is abstracted out as "code", supported by APIs. This makes it easy to spin up new resources, and modify existing resource settings, thus short-circuiting what used to take days, if not weeks, in static data center environments. Mistakes are easily made and get compounded further when multiple cloud providers are involved.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 4: Lack of Cloud Security Architecture and Strategy

Cloud security architecture and security strategy encompass various aspects of a runtime cloud environment. Considerations must be given to cloud service providers, cloud service models, cloud deployment models, region and availability zone determination, and failover and HA models. The decentralized, API-driven self-service model of the cloud often comes in the way of formulating a deliberate and concrete architecture and security strategy.

The absence of an architecture and security strategy leads to applications and services falling prey to vulnerabilities and cyber attacks.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 5: Insecure Software Development

Insecure software development could mean many things – poor handling of credentials, keys, and tokens, not sanitizing input values (exploited by SQL injection attacks), or zero-day vulnerabilities in 3rd party libraries and services. Cloud environments contribute additional complexity and exacerbate security problems.

Cloud service providers also simplify the problem in a way. This is due to the prevalent shared responsibility model, where the cloud provider is responsible for the security issues and vulnerabilities in the infrastructure/platform, while the application owner is responsible for the same within their application including any 3rd party libraries or services they might be using.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 6: Unsecure Third-Party Resources

Modern applications increasingly depend on 3rd party resources to get things done outside their core business logic. These 3rd party resources could be one or more of the following:

Vulnerabilities in any of an application's 3rd party resources may result in a compromise of the application itself as they become the weakest link in the "supply chain" of the service delivered by the application to its consumers and users.

According to research from Colorado State University, two-thirds of breaches are a result of supplier or 3rd party vulnerabilities.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 7: System Vulnerabilities

System vulnerabilities are flaws in a service provider's platforms, such as SaaS, DBaaS, PaaS, or IaaS, whose knowledge may be exploited by malicious users to compromise the confidentiality, integrity, and availability (CIA) of data.

Following are examples of system vulnerabilities:

IBM’s Cost of Data Breach 2021 Report shows that vulnerabilities in third-party software were responsible for 14% of the data breaches studied, while cloud misconfiguration and compromised credentials accounted for 20% and 15%, respectively.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 8: Accidental Cloud Data Disclosure

Cloud platforms make it easy to spin up new infrastructure, containers, and databases using infrastructure-as-code tools and APIs. While this makes teams more agile, it also increases the likelihood of misconfigurations and unintended data exposure.

Inventory management, which is the problem of tracking all provisioned cloud resources, including sensitive data and compute workloads, becomes more challenging. As an example, a developer may spin up a new cloud database instance on the cloud for new feature development, and populate it with a slice of production data, resulting in an unintentional spillover of sensitive customer PII from production to dev environments.

It's not uncommon for security leaders to worry about such accidental data sprawl, which leaves their businesses vulnerable to data exfiltration and disclosure attacks.

Over 55% of companies have at least one database that is currently publicly exposed to the internet.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 9: Misconfiguration and Exploitation of Serverless Workloads

Serverless platforms, such as AWS Lambda and GCP Cloud Functions, pose unique security challenges for workloads running on them. Lack of adequate knowledge of the shared responsibilities with the cloud provider can lead to insecure workloads that can be easily exploited to gain unauthorized access to sensitive data.

Serverless platforms are shared execution environments. Consequently, poor coding and configuration practices, such as storing IAM keys and database credentials in a temporary file system or shared memory, or configuring serverless containers to start-up "warm" (thus, forcing retention of program state from previous runs), can all lead to sensitive data exposure by malicious actors.

A Netskope analysis found that 4% of analyzed IAM policies had full administrative access, and 60% had the AWS AdministratorAccess role.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 10: Organized Crime, Hackers & APT

Advanced persistent threats (APTs) are an attack, where an attacker, or a group of attackers, establishes a long-term presence in an organization's environment. Often, their presence goes unnoticed for months, during which time, the attackers move laterally in incremental steps to get close to where the organization's "crown jewels" are stored.

Both APTs, and Organized Crime, may include politically motivated nation-states as well as financially motivated organized criminal gangs. They may use sophisticated tactics, techniques, and protocols (known as TTP) to gain entry to a target and infiltrate its environment.

Business impact

Mitigation measures

Recent incidents

Threat summary


Security Threat 11: Cloud Storage Data Exfiltration

Cloud storage is a class of cloud resources and includes services like blob storage (AWS S3, Azure Blob Store), file systems (AWS EFS), or even structured and semi-structured databases (AWS RDS, AWS Dynamo).

Data exfiltration involves incidents where a malicious insider, or an external attacker, gains access to sensitive data, which they can view, copy, or download. Often, due to a lack of activity logging and monitoring, exfiltration attempts go unnoticed until the attackers themselves decide to notify the victim for direct financial gain, depletion of public trust, or ransomware. Most mitigation techniques do not usually work against exfiltration for this reason.

Business impact

Mitigation measures

Recent incidents

Threat summary


Summary

Congratulations, you've made it this far!

We've examined all eleven threats from the Top Threats to Cloud Computing report. We looked into what each threat means, its business impact, potential mitigation measures against it, and some recent examples of incidents related to it. Hope you find them useful for your cloud-related projects!


Also Published Here