Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/15/2019
09:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Biggest Cloud Security Blind Spots

Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles.
Previous
1 of 8
Next

Image Source:Adobe Stock (Sergey Nivens)

Image Source:Adobe Stock (Sergey Nivens)

Cloud computing is evolving from a viable option for delivering IT services to the de facto standard. According to the "2019 Public Cloud Trends" report, from the Enterprise Strategy Group (ESG), the use of infrastructure-as-a-service environments has shot up in the past eight years, from 17% of organizations to 58%, and a full 39% of organizations report they take a cloud-first mentality to all of their technology deployments.

It's a boon for innovation, for sure, but security organizations continue to struggle keeping up with the constant changes in cloud technology, architecture, and use cases. Many of the biggest challenges they face have to do with visibility. In a recent report from the Cloud Security Alliance, three-quarters of companies with assets in the public cloud cited lack of visibility as a major challenge.

Here are some of the biggest cloud security blind spots that cause these visibility woes.

Cloud computing is evolving from being
a viable option for delivering IT services to being the
de facto standard. According to research from the Enterprise Strategy Group (ESG)
2019 Public
Cloud Trends
report, the use of infrastructure
-
as
-
a
-
service environments has shot up in the last
eight years from 17% of organizations to 58% and a full 39% of o
rganizations report that they
take a cloud
-
first mentality to all of their technology deployments. It's a boon for innovation, but
security organizations continue to struggle keeping up with the constant changes in cloud
technology, architecture, and use c
ases. Many of the biggest challenges they face have to do with
visibility. One
recent report
from Cloud Security Alliance shows that more than three
-
quarters of
companies
with assets in public cloud named lack of visibility as a major challenge. Here are
some of the biggest cloud security blind spots that cause these visibility wo
Cloud computing is evolving from being
a viable option for delivering IT services to being the
de facto standard. According to research from the Enterprise Strategy Group (ESG)
2019 Public
Cloud Trends
report, the use of infrastructure
-
as
-
a
-
service environments has shot up in the last
eight years from 17% of organizations to 58% and a full 39% of o
rganizations report that they
take a cloud
-
first mentality to all of their technology deployments. It's a boon for innovation, but
security organizations continue to struggle keeping up with the constant changes in cloud
technology, architecture, and use c
ases. Many of the biggest challenges they face have to do with
visibility. One
recent report
from Cloud Security Alliance shows that more than three
-
quarters of
companies
with assets in public cloud named lack of visibility as a major challenge. Here are
some of the biggest cloud security blind spots that cause these visibility wo

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
billycripe
50%
50%
billycripe,
User Rank: Strategist
9/3/2019 | 10:34:30 AM
Forensics and Visibility
Great summary of a bunch of key research!
The challenges with forensics and visibility, especially in the dynamic and decentralized world of container-based architectures are compounded with new TLS 1.3 encryption, pinned certificates coming from 3rd party APIs and even TLS 1.2 with perfect forward secrecy enabled. 

Security teams must have a way to get decrypted visibility in the cloud so they can do threat hunting, forensic / root cause analysis and passive, out of band inspection. Even DevOps teams increasingly need this for troubleshooting and appPerfMon activities. 

Symmetric Key Intercept is a new, out-of-band decryption technique for the cloud that should be investigated. Instead of creating contorted cloud architectures (like routing all back-end API calls through a front-end MITM set-up), out of band decryption that can handle the new standards provides decrypted visibility in the cloud without sacrificing the benefits that drew you to the cloud in the first place. 
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5226
PUBLISHED: 2020-01-24
Cross-site scripting in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new SimpleSAML\Utils\EMail class was introduced to handle sending emails, implemented as a wrapp...
CVE-2019-1517
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-1518
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-1519
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-1520
PUBLISHED: 2020-01-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.