UPDATED 13:38 EST / NOVEMBER 23 2023

SECURITY

Cloud security continues to give IT managers headaches. Here’s why

Cloud security continues to vex corporate information technology managers, and new research indicates that the problems are both widespread and not easily fixable, thanks to a number of weak areas.

In many cases, the procedures to secure cloud workloads has been well-known for years but aren’t always applied consistently or reliably. Some old chestnuts, such as cross-site scripting and SQL injection attacks on web servers, still account for almost half of today’s cloud vulnerabilities, for example.

The problems cover the waterfront and aren’t just structural issues. Secondary issues such as security alerts take too much time to resolve, and risky behaviors fester without any real accountability to prevent or change.

SiliconANGLE examined four cloud security reports that address these issues:

  • Illumio Inc.’s Cloud Security Index, which was a survey of 1,600 security managers across eight different countries in September, with the results published last week.
  • Palo Alto Networks Inc.’s Unit 42’s Cloud Threat Report, which examined their customers’ telemetry along with public data during all of 2022, showing the longevity of some issues.
  • Datadog Inc.’s State of Cloud Security that came out last week and looked at data over the course of the last 12 months from thousands of their customers’ cloud accounts across all three major cloud platforms.
  • IBM Corp.’s X-Force security consultancy’s annual 2023 Cloud Threat Landscape Report, which came out in September and is based on several threat intelligence sources collected from June 2022 to June 2023.

Best security practices ignored

The reports show that despite reams of details on best security practices, organizations don’t do well with their implementation, follow-through or consistent application. For example, consider well-known practices such as the usage of complex and unique passwords, collection of access logs and avoidance of hard-coded credentials.

Unit 42 states what should be obvious by now, that “hard-coded credentials pose significant security risks because adversaries can use them to bypass most of the defense mechanisms.” Yet it found that more than 80% of organizations still used them.

A similar majority of accounts analyzed in its report doesn’t turn on the logging and auditing features across Amazon Web Services’ CloudTrail, the Microsoft Azure key vault audit logging and Google Cloud Platform Storage Bucket logging services.

The situation is slightly better when it comes to enforcing another best-practice safeguard: multifactor authentication. Even for cloud-oriented businesses, MFA has been slowly adopted within organizations. Datadog’s research found that 45% of AWS organizations had one or more users authenticate their main command consoles without using MFA.

Worse, only 20% of Azure organizations had all of their Azure Active Directory users authenticate with MFA. Unit 42’s research concurs, with these findings: “At least three-quarters of organizations don’t enforce MFA for console users, and more than half of organizations don’t enforce MFA for root/admin users.” All of these numbers are pretty dismal, given the widespread dictums for MFA that have appeared – along with the numerous breach statistics of accounts that relied on less secure methods.

Speaking of security credentials, Datadog’s report found that static, long-lived credentials still cast a long shadow, and eliminating them has proven difficult. It found that across the three major cloud providers, roughly half of access keys are more than a year old, and more than one in 10 are more than three years old. “This demonstrates that access keys tend to live for longer than they should, and many access keys aren’t being used and still haven’t been deprovisioned,” the authors wrote.

IBM’s X-Force team agreed with these statistics: It discovered plain-text credentials located on user endpoints in 33% of engagements involving cloud environments.

Datadog’s report identified two other major issues:

  • Securely configuring user roles, access and privileges within cloud resources is also inadequate. As an example, nearly one in four AWS EC2 compute instances have administrator or highly sensitive account permissions, which it said was too high and a security risk.
  • On top of this, 7% of AWS EC2 instances, 3% of Azure instances and 13% of Google Cloud instances were found to be publicly exposed to the internet. The range of different service types across the three platforms are summarized in the above graph. Although these numbers were low, they still represent risks. Unit 42’s report found much higher percentages of publicly exposed services in their telemetry from 2022 and it cited from this data that these services are typically scanned and attacked within minutes of their discovery.

Difficult to enforce

When these technical challenges are combined with bad behaviors, cloud security becomes more difficult to enforce. As Illumio’s report said, “The vast majority of organizations that use cloud-based services need more efficiency, visibility and capabilities to reduce risks in their environment and the survey found that nearly half the data breaches suffered over the past year originated in the cloud.”

Part of the problem, according to Unit 42’s research, is the difference between cloud and on-premises security: “Traditional digital forensics and incident response techniques are not designed to handle these types of events because the tooling, processes, and data sources necessary for investigating security incidents are very different between on-premises and cloud environments.”

Illumio’s report contains some dire language: “Today’s cloud security solutions are continuing to fail when it comes to safeguarding companies against cybercriminals who regularly cause massive disruption by exfiltrating data and demanding exorbitant ransoms.”

Two solid recommendations come from the IBM report: “Engage in adversary simulation exercises using cloud-based scenarios to train and practice effective cloud-based incident response. And use AI capabilities to help scrutinize digital identities and behaviors, verify their legitimacy and deliver smarter authentication.”

Images: estherpoon/Adobe Stock, Datadog

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU