According to a survey of 700 industry experts on security issues in the cloud industry carried out by the Cloud Security Alliance, a not-for-profit that promotes best practices for cloud computing, insufficient identity, credential, access and key management for privileged accounts is a top concern around cloud cybersecurity. The shift towards remote and hybrid working has changed how businesses and employees operate, no longer accessing office applications and productivity suites installed on their PCs at the office, but rather accessing the tools they need through software-as-a-service and cloud-based productivity suites – from any device, no matter where they are. That shift means managing access to resources and files is vital, especially when administrator or other high-level privilege access is required. But organisations are struggling to achieve this, particularly as many end users are now situated outside the company firewalls and traditional protections. The ability to access cloud tools with a username and password is proving highly beneficial for many workers and employers, but it’s also providing cyber criminals with low-hanging fruit. If hackers can breach the username and password, they have the same access as the user – and with a legitimate account, which means suspicious activity might not be detected as promptly. ZDNET SPECIAL FEATURE: SECURING THE CLOUD
Cloud computing dominates. But security is now the biggest challengeCloud computing security: Where it is, where it’s goingCloud computing security: Five things you are probably doing wrongDon’t let your cloud cybersecurity choices leave the door open for hackersWhy cloud security matters and why you can’t ignore it
But it isn’t just cyber attackers from outside the company who can take advantage of misconfigured identity, access and credential management, if it isn’t managed properly. It’s also possible for these issues to be exploited by insider threats – employees who can exploit the lack of controls to escalate their access privileges and gain access to data they shouldn’t be able to. They could be doing this just because they can, taking it with them to a rival company, or putting it up for sale to cyber criminals to exploit. While gaining access to login credentials for cloud accounts is an increasingly common technique used in cyberattacks, in some cases, the attacker doesn’t need a username or a password at all, because data stored in the cloud is being left exposed and is accessible to anyone who knows where to look. The report also warns against some other common cloud security flaws, including:
Insecure interfaces and APIsMisconfiguration and inadequate change controlLack of cloud security architecture and strategyInsecure software development
In order to improve identity and access management controls, the report recommends organisations implement a zero-trust model of cybersecurity, requiring validation at every stage of the user’s journey through the cloud environment, preventing them from using one set of credentials to gain access to things they don’t need to. Users should also be required to avoid using weak passwords, so intruders can’t use brute force attacks or guesswork to gain control of accounts. In addition, users should be equipped with multi-factor authentication to create an extra barrier against attacks.
MORE ON CYBERSECURITY
Cloud computing dominates. But security is now the biggest challengeCloud computing security: Where it is, where it’s goingDon’t let your cloud cybersecurity choices leave the door open for hackersWhy cloud security matters and why you can’t ignore it