Hey, You! Get Off of My Cloud.
Garett Moreau ????
World-Class Managed IT; Leader in CySec; Forensics Examiner; IT Polymath; Information Dominance
The cloud is a way of storing data on remote servers rather than on a local computer or on-premises device.?While cloud storage offers some benefits such as outsourcing the liability of access and continuity, it also poses some major security risks.
As we've seen since the beginning of 2023, cloud hosting can expose you and your data to additional attack vectors and be housed in locations that garner greater attention from often higher-skilled attackers.?
These attacks can have serious consequences, and once outsourced to “the cloud,” you often have no say in how it is stored, managed, or protected. ?This loss of control complicates risk analysis, and often ends in more frequent data breaches, data loss, unauthorized access to sensitive information, and disruption of services.?
Not to mention these attacks can take months (sometimes years) to detect. The risks here can greatly outweigh the benefits.? There are incredibly few scenarios where full-cloud makes the most sense.? And it often hinges on whether or not you have access to adequate talent.
--------------------------------------------------------------------------------------------------------
Last week CISA revealed that they have developed a new tool that provides detecting signs of hacking activity in Microsoft cloud services. ?It's called "Untitled Goose Tool" and can dump telemetry information from Azure Active Directory, Microsoft Azure, and Microsoft 365 services. ?This obviously only pertains to outsider-threats, whereas insider threats (launched from within the cloud host) would go completely unnoticed.?
And for the record, over the past couple of years, the number of cloud breaches has surpassed on-premises breaches in number, vastness, and criticality.
As our friend Alexandre Blanc likes to say: "cloud = leak, abuse, lies, theft!" Remember, most of your favorite sites and tools (even ChatGPT) are cloud-based!
It is only to their demise that in 2023 many organizations are not even aware of the risks and vulnerabilities associated with cloud computing.? Further, most institutions still lack sufficient talent, defenses, or even awareness to protect against these pernicious threats (is your CRO or Chief Risk Officer even involved in these discussions?).
领英推荐
What do you think is the leading cause of breaches in the cloud? ?Well, believe it or not, even in “the cloud,” it’s still phishing! ?CISOs push zero trust as a top priority, believing it mitigates the fact that identities are the #1 cloud target.?
However, zero trust has its own problems - like the hidden dangers of excessive permissions. ?Excessive permissions can erode zero trust efforts and open your organization to further breaches, that can further complicate matters by being difficult to detect.
As more organizations and individuals rely on cloud computing for storing and processing data, there is a corresponding increase in the number of potential targets for attackers. ?Further, these cloud providers hold such tremendous value (your data, and the data of other millions of institutions), that they attract the most sophisticated attackers, whose favorite and often most fruitful attack vector is a placed insider threat. ?And they get more creative in their tactics every day.
Here are a few simple best practices for keeping your data safe and secure:?
By following these best practices, you can do your part to help ensure that your data remains relatively safe and secure.? Again, there is no replacement for capable and wiling talent.? Capable talent is out there, as is willing talent. ?The real results ensue when you find both.
Beta-tester at Parrot Security* Polymath*
1 年Stones are grateful ;-) TY Garett Moreau ????
Hey (Hey), you (You), get off of my cloud...
1 年No fair using my tag line...?? ???§?¥€¢£
★ I create value by turning complex info into actionable insights using technology & Maths. MBA, Global E-Commerce Champion
1 年Many good, commonsense points. Given the size of the target pool for cyber-criminals, following these points will remove organisations from the low-hanging-fruit category. From the perspective of a devastated cyber-crime victim 2009-current, I need to add - 2FA/MFA may backfire as text messages to your phone can be blocked, your Internet access DOS-ed - Avoid tech you can. Not even air-gaps or Faraday Cages protect systems any more*. No one has any idea about the actual range of tech capabilities in criminal hands. Australian #OrganisedCrime-types have had risk-free/on-demand access to agency-grade tech for more than a decade, remote-weapons-grade tech since 2019 at least. - Assume being hacked, anything you type on a non-purely-mechanical device being spied on, all your data in any database exposed: check your finances frequently for unusual activities. Financial institutions no longer blanket-cover cyber-related losses. - Privacy loss should be the least of your worries. See the 'about' section of my profile/my 'perfect crimes' article. - Have hammer/box-cutter equivalents in your car. Car electronics' hacking is traumatic enough for you to lose dexterity. * Known by 2022: https://blog.avast.com/exploiting-air-gaps-avast
Looking for ways to gain education between semesters and between jobs to keep myself active and up to date with keeping our country safe. I am also into keeping oceans clean, and PADI open water trained diver,
1 年From a project I did in my cybersecurity 101 class, I did Cloud leaks and hacks and I found it not just dangerous for the leaks but also how much is stored on the cloud and honestly I fully agree with you. The negatives greatly outweigh the positives, I learned of at least two companies (I know there has to be more) that lost millions if not billions of dollars in leaks.