{"id":28157,"date":"2019-05-15T08:55:35","date_gmt":"2019-05-15T14:55:35","guid":{"rendered":"https://www.webroot.com/blog/?p=28157"},"modified":"2020-01-22T12:09:27","modified_gmt":"2020-01-22T19:09:27","slug":"cloud-services-in-the-crosshairs-of-cybercrime","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/05\/15\/cloud-services-in-the-crosshairs-of-cybercrime\/","title":{"rendered":"Cloud Services in the Crosshairs of Cybercrime"},"content":{"rendered":"\n<p>It&#8217;s a familiar story in\ntech: new technologies and shifting preferences raise new security challenges.\nOne of the most pressing challenges today involves monitoring and securing all\nof the applications and data currently undergoing a mass migration to public\nand private cloud platforms.<\/p>\n\n\n\n<p>Malicious actors are\nmotivated to compromise and control cloud-hosted resources because they can gain\naccess to significant computing power through this attack vector.&nbsp;These\nresources can then be exploited for a number of <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-tesla-amazon-cloud\/\">criminal money-making schemes<\/a>, including\ncryptomining, DDoS extortion, ransomware and phishing campaigns, spam relay,\nand for issuing botnet command-and-control instructions.&nbsp;For these reasons\u2014and\nbecause so much critical and sensitive data is migrating to cloud platforms\u2014it\u2019s\nessential that talented and well-resourced security teams focus their efforts\non cloud security.<\/p>\n\n\n\n<p>The cybersecurity risks\nassociated with cloud infrastructure generally mirror the risks that have been\nfacing businesses online for years: malware, phishing, etc. A common\nmisconception is that compromised cloud services have a less severe impact than\nmore traditional, on-premise compromises.&nbsp;That misunderstanding leads some\nadministrators and operations teams to cut corners when it comes to the\nsecurity of their cloud infrastructure. In other cases, there is a na\u00efve belief\nthat cloud hosting providers will provide the necessary security for their\ncloud-hosted services.<\/p>\n\n\n\n<p>Although many of the leading cloud service providers are beginning to build more comprehensive and advanced security offerings into their platforms (often as extra-cost options), <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/resources\/checklists\/cloud-based-vs-on-premises-solutions\">cloud-hosted services<\/a> still require the same level of risk management, ongoing monitoring, upgrades, backups, and maintenance as traditional infrastructure.\u00a0For example, in a cloud environment, egress filtering is often neglected. But, when egress filtering is invested in, it can foil a number of attacks on its own, particularly when combined with a proven web classification and reputation service. The same is true of management access controls, two-factor authentication, patch management, backups, and SOC monitoring.\u00a0Web application firewalls, backed by commercial-grade <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/threat-intelligence\/internet\/ip-reputation\">IP reputation services<\/a>, are another often overlooked layer of protection for cloud services.<\/p>\n\n\n\n<p>Many midsize and large\nenterprises are starting to look to the cloud for new wide-area network (WAN)\noptions. Again, here lies a great opportunity to enhance the security of your\nWAN, whilst also achieving the scalability, flexibility, and cost-saving\noutcomes that are often the primary goals of such projects.&nbsp; When selecting these types of solutions, it\u2019s\nimportant to look\nat the <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/threat-intelligence\">integrated security options<\/a> offered by vendors.<\/p>\n\n\n\n<h2>Haste makes waste<\/h2>\n\n\n\n<p>Another danger of the\ncloud is the ease and speed of deployment.&nbsp;This can lead to rapidly\nprototyped solutions being brought into service without adequate oversight from\nsecurity teams.&nbsp;It can also lead to complacency, as the knowledge that a\ncompromised host can be replaced in seconds may lead some to invest less in upfront\nprotection.&nbsp;But it\u2019s critical that all infrastructure components are\nproperly protected and maintained because attacks are now so highly automated\nthat significant damage can be done in a very short period of time. This\napplies both to the target of the attack itself and in the form of collateral\ndamage, as the compromised servers are used to stage further attacks.<\/p>\n\n\n\n<p>Finally, the utilitarian\nvalue of the cloud is also what leads to its higher risk exposure, since users\nare focused on a particular outcome (e.g. storage) and processing of large\nvolumes of data at high speeds. Their solutions-based focus may not accommodate\na comprehensive end-to-end security strategy well.&nbsp;The dynamic pressures\nof business must be supported by newer and more dynamic approaches to security that\nensure the speed of deployment for applications can be matched by automated\nSecOps deployments and engagements.<\/p>\n\n\n\n<h2>Time for action<\/h2>\n\n\n\n<p>If you haven\u2019t recently\nhad a review of how you are securing your resources in the cloud, perhaps now\nis a good time. Consider what\u2019s allowed in and out of all your infrastructure\nand how you retake control. Ensure that the solutions you are considering have\nintegrated, actionable threat intelligence for another layer of defense in this\ndynamic threat environment. <\/p>\n\n\n\n<p>Have a question about\nthe next steps for securing your cloud infrastructure? Drop a comment below or reach\nout to me on Twitter at <a href=\"https:\/\/twitter.com\/zerobiscuit\">@zerobiscuit<\/a>.\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s a familiar story in tech: new technologies and shifting preferences raise new security challenges. One of the most pressing challenges today involves monitoring and securing all of the applications and data currently undergoing a mass migration to public and private cloud platforms. Malicious actors are motivated to compromise and control cloud-hosted resources because they [&hellip;]<\/p>\n","protected":false},"author":155,"featured_media":28163,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[24451,24453],"yst_prominent_words":[4725,24455,24459,24469,24461,10621,3769,24463,5019,17411,24465,23231,6361,24467,3479,23673,3947,5025,24457,21241],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28157"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=28157"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28157\/revisions"}],"predecessor-version":[{"id":29605,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28157\/revisions\/29605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/28163"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=28157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=28157"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=28157"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=28157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}