Cloud security is too important to leave to cloud providers

As cloud rises to encompass to more corporate applications, data and processes, there’s potential for end-users to outsource their security to providers as well. 

The need to take control of security and not turn ultimate responsibility over to cloud providers is taking hold among many enterprises, an industry survey suggests. The Cloud Security Alliance, which released its survey of 241 industry experts, identified an “Egregious 11” cloud security issues

The survey’s authors point out that many of this year’s most pressing issues put the onus of security on end user companies, versus relying on service providers. “We noticed a drop in ranking of traditional cloud security issues under the responsibility of cloud service providers. Concerns such as denial of service, shared technology vulnerabilities, and CSP data loss and system vulnerabilities — which all featured in the previous ‘Treacherous 12’ —  were now rated so low they have been excluded in this report. These omissions suggest that traditional security issues under the responsibility of the CSP seem to be less of a concern. Instead, we’re seeing more of a need to address security issues that are situated higher up the technology stack that are the result of senior management decisions.” 

This aligns with another recent survey from Forbes Insights and VMware, which finds that proactive companies are resisting the temptation to turn security over to their cloud providers — only 31% of leaders report turning over many security measures to cloud providers. (I helped design and author the survey report.) Still, 94% are employing cloud services for some aspects of security.  

The latest CSA report highlights this year’s leading concerns: 

1. Data breaches. “Data is becoming the main target of cyber attacks,”.the report’s authors point out. “Defining the business value of data and the impact of its loss is essential important for organizations that own or process data.” In addition, “protecting data is evolving into a question of who has access to it,” they add. “Encryption techniques can help protect data, but negatively impacts system performance while making applications less user-friendly.” 

2. Misconfiguration and inadequate change control. “Cloud-based resources are highly complex and dynamic, making them challenging to configure. Traditional controls and change management approaches are not effective in the cloud.” The authors state “companies should embrace automation and employ technologies that scan continuously for misconfigured resources and remediate problems in real time.”

3. Lack of cloud security architecture and strategy. “Ensure security architecture aligns with business goals and objectives. Develop and implement a security architecture framework.” 

4. Insufficient identity, credential, access and key management. “Secure accounts, inclusive to two-factor authentication and limited use of root accounts. Practice the strictest identity and access controls for cloud users and identities.” 

5. Account hijacking. This is a threat that must be taken seriously. “Defense-in-depth and IAM controls are key in mitigating account hijacking.” 

6. Insider threat. “Taking measures to minimize insider negligence can help mitigate the consequences of insider threats. Provide training to your security teams to properly install, configure, and monitor your computer systems, networks, mobile devices, and backup devices.” The CSA authors also urge “regular employee training awareness. Provide training to your regular employees to inform them how to handle security risks, such as phishing and protecting corporate data they carry outside the company on laptops and mobile devices.”

7. Insecure interfaces and APIs. “Practice good API hygiene. Good practice includes diligent oversight of items such as inventory, testing, auditing, and abnormal activity protections.” Also, “consider using standard and open API frameworks (e.g., Open Cloud Computing Interface (OCCI) and Cloud Infrastructure Management Interface (CIMI)).” 

8. Weak control plane. “The cloud customer should perform due diligence and determine if the cloud service they intend to use possesses an adequate control plane.”

9. Metastructure and applistructure failures. “Cloud service providers must offer visibility and expose mitigations to counteract the cloud’s inherent lack of transparency for tenants. All CSPs should conduct penetration testing and provide findings to customers.” 

10. Limited cloud usage visibility. “Mitigating risks starts with the development of a complete cloud visibility effort from the top down. Mandate companywide training on accepted cloud usage policies and enforcement thereof.  All non-approved cloud services must be reviewed and approved by the cloud security architect or third-party risk management.” 

11. Abuse and nefarious use of cloud services. “Enterprises should monitor their employees in the cloud, as traditional mechanisms are unable to mitigate the risks posed by cloud service usage.”

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Striking Graphs That Show Humanity’s Domination of the Earth thumbnail

Striking Graphs That Show Humanity’s Domination of the Earth

The numbers don’t lie: Humans are ruining this planet. Atmospheric carbon levels and ocean temperatures are going up. Arctic sea ice and biodiversity levels are going down—and no, the skyrocketing number of chickens doesn’t count toward biodiversity. To comprehend and tackle those problems, scientists and policymakers need data—precise figures that show how Homo sapiens has transformed…
Read More

Why Niantic anticipates legal challenges from OOH companies and brands as it develops immersive AR activations

As software development company Niantic experiments with increasingly immersive augmented reality activations, the Pokémon Go developer is girding itself for a potential wave of unprecedented legal challenges.At the moment, the augmented reality space is a bit of a wild west, with creators using Niantic’s technology to virtually modify privately owned locations in the physical world
Read More
声を出さずにボイスコマンドを発動する「顎カメラ」とは thumbnail

声を出さずにボイスコマンドを発動する「顎カメラ」とは

私「…………」Siri「ブリトニーのベストヒットを再生します」人工アシスタントって便利ですよね。音声認識でタスク頼めるのって、アシスタント感が強くて慣れるとすっごく楽ちんです。が、しゃべれないシーンってけっこうありません? 単純に隣で誰か寝てるとか、リモート会議中だとか。あとは、周りに秘密で頼みたいこととか…。もしかしたら、喋らなくてもボイスコマンドが使える日が来るかもしれません。コーネル大学が開発する「顎カメラ」があればね。顎の動きから発声を読み取るコーネル大学のアシスタントプロフェッサーCheng Zhang氏と博士課程学生Ruidong Zhang氏が研究開発を行なっている「SpeeChin」は、首からさげるカメラです。ぶら下がったカメラは上向き、つまり顎の方を向いており、タスクを声に出さずとも口パクする顎の動きを読み取ってコマンドを発動するという仕組みになっています。カメラで顔を写し口の動きを読むのと何が違うのか? まさにSpeeChinのユニークさはそこにあり、下から顎の動きを読むので顔をキャプチャせずにすむ=プライバシに配慮できるというわけ。SpeeChinの実験には20人が参加。10人は英語で54の簡単なフレーズ(数字や人工アシスタントの基本タスクなど)を試し、残り10人は中国語で44のフレーズを実験。結果、トレーニング期間を経て、SpeeChinの精度は英語で90.5%、中国語で91.6%まであがりました。ただ、座ってじっとしての無言コマンドでの精度であり、歩きながらなど動作がからむとSpeeChinの精度は著しく落ちてしまうとのこと。まだまだ研究は初期段階で、問題は山積みなのでしょうが、面白い&もしかしたらSiriやAlexaがより便利になるかもしれない研究ですね。SpeeChin(声を出さずにボイスコマンドを使う技術) ほしい?
Read More
Google wants to prevent climate deniers from making advertising money thumbnail

Google wants to prevent climate deniers from making advertising money

I nye retningslinjer for annonsører, utgivere og folk som lager YouTube-videoer, varsler Google at de vil forby det å tjene penger på innhold som bryter med «veletablert vitenskapelig konsensus rundt eksistensen og årsakene» til klimaendringene, heter det i en uttalelse fra selskapet. - Dette omfatter innhold som omtaler klimaendringer som tøys eller svindel, påstander som…
Read More

Twitter Got Fined $US350,000 for Delaying a Search of Trump’s Account in the Jan. 6 Prosecution

The special counsel investigating Donald Trump’s attempt to overturn the 2020 election tried, failed, and ultimately succeeded in accessing the former president’s Twitter account, documents published Wednesday show. According to the courts, Twitter was late in producing all the information investigators wanted on Trump’s pre-Jan. 6 activities because it objected to not being able to
Read More
Apple’s Mac Studio maxes out at $9,999 in Canada thumbnail

Apple’s Mac Studio maxes out at $9,999 in Canada

Apple’s new Mac Studio will run you a cool $10,000 in Canada. Well, $9,999 to be exact, but at that point what’s another loonie? Besides, that $9,999 price is just the maxed-out Mac Studio. Want a monitor? Keyboard? A mouse? Maybe some software to make use of all that power? Yup, you’ll need to open up that…
Read More
Index Of News
Total
0
Share