Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/15/2019
09:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Biggest Cloud Security Blind Spots

Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles.
Previous
1 of 8
Next

Image Source:Adobe Stock (Sergey Nivens)

Image Source:Adobe Stock (Sergey Nivens)

Cloud computing is evolving from a viable option for delivering IT services to the de facto standard. According to the "2019 Public Cloud Trends" report, from the Enterprise Strategy Group (ESG), the use of infrastructure-as-a-service environments has shot up in the past eight years, from 17% of organizations to 58%, and a full 39% of organizations report they take a cloud-first mentality to all of their technology deployments.

It's a boon for innovation, for sure, but security organizations continue to struggle keeping up with the constant changes in cloud technology, architecture, and use cases. Many of the biggest challenges they face have to do with visibility. In a recent report from the Cloud Security Alliance, three-quarters of companies with assets in the public cloud cited lack of visibility as a major challenge.

Here are some of the biggest cloud security blind spots that cause these visibility woes.

Cloud computing is evolving from being
a viable option for delivering IT services to being the
de facto standard. According to research from the Enterprise Strategy Group (ESG)
2019 Public
Cloud Trends
report, the use of infrastructure
-
as
-
a
-
service environments has shot up in the last
eight years from 17% of organizations to 58% and a full 39% of o
rganizations report that they
take a cloud
-
first mentality to all of their technology deployments. It's a boon for innovation, but
security organizations continue to struggle keeping up with the constant changes in cloud
technology, architecture, and use c
ases. Many of the biggest challenges they face have to do with
visibility. One
recent report
from Cloud Security Alliance shows that more than three
-
quarters of
companies
with assets in public cloud named lack of visibility as a major challenge. Here are
some of the biggest cloud security blind spots that cause these visibility wo
Cloud computing is evolving from being
a viable option for delivering IT services to being the
de facto standard. According to research from the Enterprise Strategy Group (ESG)
2019 Public
Cloud Trends
report, the use of infrastructure
-
as
-
a
-
service environments has shot up in the last
eight years from 17% of organizations to 58% and a full 39% of o
rganizations report that they
take a cloud
-
first mentality to all of their technology deployments. It's a boon for innovation, but
security organizations continue to struggle keeping up with the constant changes in cloud
technology, architecture, and use c
ases. Many of the biggest challenges they face have to do with
visibility. One
recent report
from Cloud Security Alliance shows that more than three
-
quarters of
companies
with assets in public cloud named lack of visibility as a major challenge. Here are
some of the biggest cloud security blind spots that cause these visibility wo

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
billycripe
50%
50%
billycripe,
User Rank: Strategist
9/3/2019 | 10:34:30 AM
Forensics and Visibility
Great summary of a bunch of key research!
The challenges with forensics and visibility, especially in the dynamic and decentralized world of container-based architectures are compounded with new TLS 1.3 encryption, pinned certificates coming from 3rd party APIs and even TLS 1.2 with perfect forward secrecy enabled. 

Security teams must have a way to get decrypted visibility in the cloud so they can do threat hunting, forensic / root cause analysis and passive, out of band inspection. Even DevOps teams increasingly need this for troubleshooting and appPerfMon activities. 

Symmetric Key Intercept is a new, out-of-band decryption technique for the cloud that should be investigated. Instead of creating contorted cloud architectures (like routing all back-end API calls through a front-end MITM set-up), out of band decryption that can handle the new standards provides decrypted visibility in the cloud without sacrificing the benefits that drew you to the cloud in the first place. 
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.