Suspicious Cloud Storage Activities

 Suspicious Cloud Storage Activities 

According to the 2022 Verizon Data Breach Investigations Report (DBIR), a staggering 82% of breaches involve a “human element,” with “miscellaneous errors” on the rise due to misconfigured cloud storage. The Sensitive Data in the Cloud report also found that the majority of security and IT professionals (67%) are storing sensitive data in public cloud environments, with a third of respondents saying that they weren’t confident — or only slightly confident — about their ability to protect sensitive data in the cloud. This type of technical and professional oversight — whether it involves a misconfigured database or security teams lacking the necessary know-how — is exactly why cloud accounts have become a prime target in this era of remote work.

What you need to know: Now that data is widely (and all too often, haphazardly) dispersed across the cloud, attackers have ample opportunity to find and exploit both known and unknown vulnerabilities. This is especially true as organizations hurriedly migrate to the cloud, potentially compromising or misconfiguring certain security controls. To complicate matters further, assets and applications need to be secured per the shared responsibility model, where cloud service providers (CSPs) will cover certain elements, processes and functions, but then the customer is responsible for securing its proprietary data, code and any other assets of note, per the cloud security alliance (CSA). But when that responsibility is shirked, hackers inevitably abound.

Comments

Popular posts from this blog

Compromised Credentials

SQL Injection