• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  Security Threats in Cloud Computing
Security Threats in Cloud Computing
11 June 2017

Security Threats in Cloud Computing

Written by Seqrite
Seqrite
Security

Security Threats in Cloud Computing

More and more organizations are moving to cloud-based computing. Not only data, but even software and systems are being hosted on cloud. With the rise of remote working and ‘Bring Your Own Device’ culture, cloud computing has become the need of the hour. But cloud computing attracts unique security risks as data and application necessarily are hosted outside the organization with third-party cloud provider. This feature inherently makes systems vulnerable to attacks, downtime and other issues such as loss of Governance, lapses in authentication and authorization, isolation failures, failures in application and data protection, and malicious activities to name a few.

Threats in Cloud Environment

Here are some of the most common types of cyber threats in the cloud environment:

1. Data breaches

Cloud environment faces threats that are similar to those faced by an enterprise environment. However, as a cloud service provider is accountable for storing large amounts of data belonging to multiple enterprises, the threats are magnified by significant proportions. The severity of damage depends upon the kind of data that is breached. Data such as health records, trade secrets, and intellectual property carry the same risk of getting stolen that financial data does. When a data breach occurs, companies may incur fines, and face lawsuits and criminal charges. More than monetary impact, reputation loss can affect organizations for years.

What should be done?

It is important to adopt DLP tools as a part of your cybersecurity plan as it will help your IT department monitor and control the data sharing activity across endpoints and get alerts of any suspicious data movement.

2. Compromised credentials and broken authentication

Lax authentication policies, poor key and certification management are some of the major reasons of security breach in cloud services. Many organizations struggle with identity management. They assign unnecessary data privileges to anyone and everyone just to ease the access management. Organizations also forget to remove user access when an employee’s job function changes or they leave the organization.

What should be done?

Organizations should use multi-factor authentication, phone-based authentication, and smart cards (digital tokens) to protect the access to cloud services as these provide a barrier against attackers prying on log in ID and passwords.

3. Hacked interfaces and APIs

Almost all cloud services now provide APIs (Application Programming Interface). APIs are required by organizations to manage and interact with the cloud service they are using. Therefore, the security of the cloud service largely depends on the security of APIs. These are the most vulnerable part of the system as they are directly exposed and are accessible via the Internet.

What should be done?

Threat modelling of systems, their architecture and data flows are critical to control the risk of inadvertent access to data using APIs.

4. Account hijack

Cloud services are turning out to be a new hunting ground for phishing attacks, online scams and fraudsters. Attackers can eavesdrop on user activities, steal their personal information, misuse the stolen data or sell them on the online black market. They can also use breached applications to launch other attacks within the cloud.

What should be done?

Organizations should prohibit sharing of account credentials between users and services. Every transaction should be monitored so that it can be traced back to a human owner.

5. Malicious Insiders

An insider threat could be a current or a former
employee who is responsible for a security breach in an organization. 90% of security incidents in businesses happen due to insiders (Verizon 2015 Data Breach Investigation Report).

What should be done?

System access given to users should be restricted only to data and application that are required by a particular user to perform their job. The data responsibilities should be segregated and both the responsibilities and system access should be frequently audited.  Effective logging, monitoring, and audit administration are critical for effective security of the cloud computing system.

6. Inadequate diligence

Many organizations are embracing the cloud technology without fully understanding its environment and the myriad risks associated with it. Business owners often overestimate their need to be on cloud and in selecting the right partner for their cloud computing needs. Many times, they fail to scrutinize the contract made with their cloud partner and are not aware of the provider’s liability in case of a data breach.

What should be done?

Organizations need to be diligent with:

  • Understanding their requirements from cloud computing service.
  • Selecting the right cloud service provider.
  • Review of their contract to understand the responsibilities and liabilities.

7. Shared technology, shared dangers

Cloud computing is based on the concept of shared technology. The concept multi-tenancy comes with a danger that if vulnerability arises for one user, it arises for all. A single vulnerability or misconfiguration can lead to a security incident across the complete cloud infrastructure.

What should be done?

Organizations must not only need to place a private encryption system for their own data but also need to look at concepts such as least privilege access, network segmentation and host-based and network-based intrusion system, provided by the cloud service provider.

Cloud computing provides many benefits to organizations both large and small. However, organizations need to understand that security of a cloud infrastructure is a joint responsibility. The cloud service provider will have their own security mechanism in place but that needs to be analyzed and understood to meet the organization’s requirement. At the same time, organizations need to implement their own security on top of what is provided by cloud service provider. They need to implement data loss prevention tools which are in their control to manage not only the encryption for protection of data but also the user access control and monitoring of data and devices accessing that data.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

 Previous PostAligning Cybersecurity with Business Objectives
Next Post  Dealing with Insider Threats: A Brief Guide for CISOs
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies