Becoming the Enemy - Securing the Cloud with Attack Simulation

Becoming the Enemy - Securing the Cloud with Attack Simulation

How secure is your data when it’s stored in the cloud? As cloud storage becomes more common, for both commercial and business use- protecting the information you store in the cloud is becoming increasingly important.

Out of sight, out of mind - ?Some might say.

But only because your data isn’t physically on-site, it doesn’t mean that it’s untouchable.?

You might be familiar with the shared-responsibility model in the cloud. In its simplest terms, it denotes that cloud providers are responsible for the security of the cloud, while users should be responsible for securing their data.?

So, by this definition, security is also a shared-responsibility model.

The cloud user, as well as all the application and network configurations, are responsible for managing access to data and cloud services. For this reason, it increases the complexity of the user policies and the governance model used.

The reality is that it is more likely to find permissive policies that give more privileges to the user than those needed, increasing the impact of any compromise.?

That’s why optimising cloud security is so vital. Sometimes the only way to do this is to…

Become the enemy

*Insert evil laugh here*


Checking your Security Surface

Credential compromise is an important concern for any organisation operating in the cloud.?

The associated impacts vary widely, but ultimately this compromise can lead to access and theft of important corporate information. There are many security controls that should be enabled in your cloud accounts but, how do you know if they are working effectively?

In order to understand your security posture, it is necessary to simulate threats continuously to identify if they are detected or not.?

You can simulate the threat manually, or use a platform that allows you to automate all the processes with relative ease.

A great platform will offer predefined assessments that you can deploy at the click of a button. The scenarios are provided and, for instance, can simulate a credential theft and authorised access into confidential ‘areas’.?

All automated, and extremely efficient.?


Tracing a Breach?

Logs are needed to trace any malicious activity in your cloud account. These logs can then verify interactions carried out by a simulated scenario.?

This will inform you whether your security controls are working.?

Cloud infrastructures are continuously changing, so there is still a need to automate the process to execute your assessments periodically.

And with the right platform, this can become a regular part of your security hygiene and optimise your use of the cloud.

If you’re not sure where to start when it comes to simulating and testing your existing security systems, send me a message.

I can point you in the right direction.


Source: https://www.attackiq.com/2020/03/30/defeating-a-cloud-breach-part-1/?

Dianne Baynes, RN DC

Empowering chiropractors to create Practice Fun in 90 days: Increased ???????????????? ?????????????? and ?????????????? ?????????????????? | Founder of Doing More Business | DM me ?????? to get started

2 年

Being able to test your defences regularly is a great exercise to do by simulation to ensure that there are no gaps in the prevention of attacks.

回复
Sarah Farmer

The Executives Coach ?? For C&D Suite & Senior Leadership Teams Ready to Lead Brightly? ??Imposter Syndrome Specialist ?? EI & Leadership Skills Development ??#1 Best Selling Author?? Keynote Speaker ?? Mum ?? F1 Nut

2 年

Just because your data is stored in the cloud, never means that it is out of sight from a CyberCriminal, testing cloud environments must become a priority.

回复
Samuel Okoronkwo

Head of Chambers at Mercantile Barristers | Barrister | Construction & Engineering Law | Sports Law

2 年

Looking from an attacker's perspective can be really helpful when trying to spot flaws in your CyberSecurity.

回复

要查看或添加评论,请登录

Murray Pearce的更多文章

  • From Doubt to Evidence: The Case for Threat-Informed Defense

    From Doubt to Evidence: The Case for Threat-Informed Defense

    For years, cybersecurity strategies have centered on the mantra: patch vulnerabilities, eliminate weaknesses, and keep…

  • When Seeing Isn’t Believing: Deepfakes in Cybercrime

    When Seeing Isn’t Believing: Deepfakes in Cybercrime

    Let’s delve into a potent force getting out of hand: deepfake technology. At first a novelty for entertainment…

  • Content Filtering: Not To Be Underestimated!

    Content Filtering: Not To Be Underestimated!

    You know that saying, not all heroes wear capes? Well, it’s true. Often, the people who help us the most are the same…

    3 条评论
  • The Sherlock Holmes of Cybersecurity

    The Sherlock Holmes of Cybersecurity

    Ransomware Profiling Ever considered yourself as a modern-day cybersecurity Sherlock Holmes, solving the ever-evolving…

    3 条评论
  • Unmasking Compliance Horrors: Data Quality Nightmare

    Unmasking Compliance Horrors: Data Quality Nightmare

    Whilst Halloween has been and gone, and the world takes off its eerie costumes, a different kind of nightmare still…

  • Strengthening your Cybersecurity Strategy

    Strengthening your Cybersecurity Strategy

    To ensure the effectiveness of your security controls, continuous validation is key. Continuous validation of your…

    2 条评论
  • A Gift to Security Leaders - Positive Intelligence

    A Gift to Security Leaders - Positive Intelligence

    Cybersecurity isn't just about technology; it's about people. As a security leader, your ability to engage with…

    3 条评论
  • Navigating the Uncharted Waters of Cloud Security

    Navigating the Uncharted Waters of Cloud Security

    The rapid migration to the cloud has left many organisations sailing blindly without a clear strategy to validate their…

    1 条评论
  • Stop trying to Boil the Ocean

    Stop trying to Boil the Ocean

    Staying informed about threats is essential. However, just because a threat makes headlines doesn't necessarily mean…

    3 条评论
  • A Marathon, Not a Sprint

    A Marathon, Not a Sprint

    You’ve heard the saying before, but never has it been more accurate than when threat defence is in the picture. When it…

    5 条评论

社区洞察

其他会员也浏览了