Topics In Demand
Notification
New

No notification found.

 Cloud Computing Security Issues
 Cloud Computing Security Issues

101

0

 

The popularity of cloud computing has skyrocketed in recent years, thanks to major players like Amazon, Google, and Microsoft offering comprehensive cloud platforms. While cloud computing has revolutionized how organizations store, share, and use information, it has also become a prime target for cybercriminals. In fact, cloud cyber-attacks accounted for a significant portion of all cyberattacks in 2020, making cloud computing platforms the third most-targeted cyber environment.

A cloud cyber-attack is any malicious activity targeting off-site service platforms that provide storage, computing, or hosting services via their cloud infrastructure. This includes attacks on service platforms that utilize service delivery models like SaaS, IaaS, and PaaS.

Major Cloud Attacks in Recent Years

  • CAM4 (2020): A massive data breach exposed 10.8 billion sensitive entries, including email addresses, IP addresses, payment logs, and more.
  • Advanced Info Service (AIS) (2020): A leaked database contained 8.3 billion network flow logs and DNS query logs of AWN customers.
  • Keepnet Labs (2020): A leaky ElasticSearch database exposed entries from various data breaches worldwide.
  • Microsoft (2019): A misconfigured network server led to the exposure of 250 million entries, including email addresses, IP addresses, and support case details.

The causes of cloud cyber-attacks could be due to misconfiguration, compromised user accounts, API vulnerabilities or malicious insider activity.

To prevent such threats on the cloud, some of below steps may be taken:

  • Implement Strong Security Measures: Adopt robust security practices, including encryption, access controls, and regular vulnerability assessments.
  • Educate Employees: Train employees on cloud security best practices and the risks associated with phishing attacks and social engineering.
  • Monitor and Respond: Continuously monitor your cloud environment for suspicious activity and respond promptly to incidents.
  • Stay Updated: Keep your cloud platforms and security software up-to-date with the latest patches and updates.

By understanding the risks and taking proactive steps to prevent cyber attacks on cloud, organizations can protect their sensitive data and maintain business continuity.

Sources:

 


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


Current Focus Areas: IT Services, AIOps, 5G, Cloud, Project Management. Also specialises in Application Rationalization, Cost Optimization, Benchmarking, Report writing, and Market Research.

© Copyright nasscom. All Rights Reserved.