Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:00 PM
Liran Tancman
Liran Tancman
Connect Directly
E-Mail vvv

Cloud Services Are the New Critical Infrastructure. Can We Rely on Them?

If cloud services vendors successfully asked themselves these three questions, we'd all be better off.

With billions of people confined to their homes, the concept of "critical infrastructure" needs to be extended. To the traditional list of bridges, power plants, water filtration plants, airports, etc., we need to add cloud-based web conferencing (think Zoom, Webex, and Skype), online financial services, telehealth services, e-commerce, online delivery, and more.

In a very real way, our global economy and daily lives now depend on these online services. For example, teleconferencing services are de facto replacing air travel, with the aviation sector and most airports nearly shut down. Yet the sad fact is that if cloud-based services were regulated critical infrastructure like your average airport, the Transportation Security Administration would have shuttered many of them long before COVID-19 came along. 

If Your Web Service Was an Airport
I travel a lot — or used to, before the coronavirus crisis. It's interesting that our sad experience with terrorism in recent decades led us to trust travelers — whom we can still see and touch — far less than we seem to trust faceless, remotely connected employees, contractors, users, or admins. 

The security paradigm under which organizations like the TSA operate to secure modern airports has clear parallels in the web services arena — but also some vast differences. To illustrate, let's drill down into what we as travelers go through before we get on a plane, in comparison to what we online users go through before accessing critical web services:

  • Initial identification: At the entrance to the TSA screening line, you need to show your passport and boarding card. This is the equivalent to logging in to your web service of choice. Yet online, one can imitate the identity of a trusted person. In the real world, if I steal the passport of an 87-year-old grandmother from Kansas, a TSA agent is probably going to notice.

  • Security screening: The TSA is very concerned about both who I am and what I bring with me. They check that I have nothing harmful in my pockets or in my carry-on. Web services have some verification procedures in place — two-factor authentication, for example. Yet millions of known and unknown vulnerabilities in many popular software packages allow one to essentially skip this verification step, get unauthorized access, and go right to the virtual departure gate. 

  • In the terminal: Despite the strict access security described above, all serious airports also have internal security personnel on constant watch for anything out of the ordinary in the terminal itself. In most web services and applications, runtime security is lacking and often nonexistent, as it can take months to implement. Once attackers get in, they can remain undetected for months. 

  • The insider threat: Airports are large and complex organizations that cover vast physical areas and require a huge workforce. Despite this, airports manage to conduct extensive employee background checks and ongoing security screening. Web services that serve millions can be administered and accessed by individual administrators or a small development team with extensive access. Many companies don't have sufficient controls in place to mitigate that risk.

But Web Services Are Not Airports
Thankfully, web services are not airports. Nor can they be secured like airports without destroying what makes them so great. To deliver the robust and massive-scale service they provide us, web services interact with thousands of other services and need to be accessible from every place and device. Hyper-connectivity is what makes these services so powerful — putting up barriers would simply ruin this.

While airports are only built once, cloud services are rebuilt every day by developers who introduce hundreds of changes. Every change introduced in an airport's architecture is thoroughly reviewed before implementation. The same level of scrutiny over changes in web applications would simply kill innovation.  

Plus, do we really want to go through a TSA agent every time we access our bank account?

So, What Can Be Done?
Airport analogies aside, it's clear that we need to enhance the resilience of the web services on which we've grown increasingly reliant in recent years — and utterly reliant on today. Business, IT, and security leaders urgently need to ask themselves how to effectively reduce this risk without affecting the dynamism and connectivity that makes these services so great. Here are three questions cloud-services vendors should ask themselves:

  1. How do we implement controls without impeding productivity and agility in such critical times? Deploying and operating controls that catch and thwart intruders is notoriously difficult at the overwhelming scale and complexity of modern cloud services. Vendors must make sure they adopt next-generation autonomous controls that can be implemented quickly at scale. 

  2. Are IT and security teams focusing on those vulnerabilities that matter? Cloud services vendors are flooded with thousands of vulnerabilities they need to patch. However, most of these vulnerabilities do not represent an actual threat to the system. Using vulnerability prioritization tools, vendors can address their high and critical-risk vulnerabilities by patching less than 10% of all vulnerabilities. 

  3. How can I control developer access without adhering to the level of TSA-vetting? Thoroughly vetting every developer and contractor with access to cloud services is not feasible. However, web services providers should strictly ensure that all code changes are implemented through pre-existing pipelines (called "CI/CD pipelines") where code can be screened for vulnerabilities and malware. 

Given that remote is the new normal now, and is likely to continue being so after the crisis, it's time for our newest critical infrastructure providers to offer their awesome online services with a correspondingly awesome level of resilience.

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Liran Tancman, CEO and Co-Founder of Rezilion, is one of the founders of the Israeli cyber command and spent a decade in Israel's intelligence corps. In 2013, Liran co-founded CyActive, a company that built a technology capable of predicting how cyber threats could evolve and ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-06
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
PUBLISHED: 2021-05-06
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...
PUBLISHED: 2021-05-06
emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php.
PUBLISHED: 2021-05-06
** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode wh...
PUBLISHED: 2021-05-06
Stormshield SNS with versions before 3.7.18, 3.11.6 and 4.1.6 has a memory-management defect in the SNMP plugin that can lead to excessive consumption of memory and CPU resources, and possibly a denial of service.