Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

1/8/2020
10:00 AM
Greg Jensen
Greg Jensen
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

The "Art of Cloud War" for Business-Critical Data

How business executives' best intentions may be negatively affecting security and risk mitigation strategies -- and exposing weaknesses in organizational defenses.

Those who wish to do your business harm are hearing the famous words by Sun Tzu in the book The Art of War: "Attack him where he is unprepared, appear where you are not expected." This is the typical philosophy adopted by modern cybercriminals to identify points of weakness and exposure, whether they are in business data centers or in the cloud. But in a move never imagined by Sun Tzu himself, today's defenses may even be circumvented and damaged by business executives themselves.

Historically, enterprises have used application deployment models that required finance, supply chain, and human resources system owners to work hand in hand with security leaders to ensure they can move past the barriers of the corporate firewall. With the introduction of cloud, these same teams are now able to stand up cloud-based platforms in a matter of days or establish cloud infrastructure services with a credit card. These activities can rapidly serve the growing pressures placed on these business executives to meet key deliverables in a timely manner. So, with all the simplicity cloud brings, including low-lift efforts to onboard new services, what is the risk everyone is worried about?

The "Pace Gap" Issue Created by the Cloud
Oracle's recent industry report on cloud threats illustrates the fast-paced efforts by business executives that are creating what is called a "pace gap" between organizations' business-critical services and the security, compliance, and risk programs designed to keep customers and data protected. Pace gaps occur when a key business application is suddenly onboarded and used by the executive without any orchestration from the security operations team. This creates risk around credential/identity management programs, regulatory compliance oversight, data protection programs and organizations' ability to detect anomalous behaviors and respond accordingly.

The Benefits of a United Security Front
Event and alert information from today's cloud applications can be very instrumental in identifying threats and attacks. For example, when effectively deployed, an ERP system can provide a plethora of information on suspicious behaviors in user transactions that might correlate with supply chain behaviors or even behaviors on other IT resources. Consolidating, correlating and responding to these events is critical to a modern defense strategy so they all work together for a common cause.

As Sun Tzu said, "If his forces are united, separate them. If sovereign and subject are in accord, put division between them." Even back in 6th century B.C., Sun Tzu saw that a united front with no sunlight between overlapping defenses and infrastructure is the only way to defend against an attack. When there is unsanctioned application use inside any organization (by a business executive or user), this may be the daylight needed for an attacker to strike by exploiting misconfigured services or by taking advantage of limited monitoring and response capabilities.

The Need for Collaboration Between the Business and Security Operations
As this unsanctioned application usage illustrates, there are several reasons organizations may bypass and/or don't work more effectively with the security operations teams. For one, there is the concern that implementing the appropriate security controls will slow down deployment of a service the business executive wants for its customers. The other is that the security team itself may simply say "no" to rolling out the new service.

Both of these are issues that today's CISOs are working to overcome by changing the way they — and by extension, their IT and security teams — engage with the business executives. We are seeing CISOs making significant efforts to adopt new management styles to help them move past the old refrain of "no you can't" to the more inclusive approach of "yes you can… and here is a safe way to do that."

And what about the delay in service deployment? Eventually, the security operations, compliance, and data protection teams will catch up with services deployed that are misconfigured. In these situations, there is a real risk of suspension of services and a lengthy audit/remediation activity to bring this back in line with corporate policies.

I was once asked, "what is the most important step a business executive can perform to mitigate risk?" Simply put, buy your CISO a cup of coffee every other week. Help yourself by building a relationship and investing in the common goals you both share. Work with your CISO to understand your part of the shared responsibility security model between you and the cloud service provider. Your role as a business executive requires that you work effectively with your IT and security teams to ensure your company's role in securing data is addressed.

Public Cloud: An Organization's Closest Ally or Greatest Enemy 
Public cloud can be the most secure environment for your data with effective planning, or it can be your greatest risk without it. Ninety-one percent of security leaders feel that public cloud can provide an as-secure or more secure environment than one they can deliver in their own data center, but this requires organizations to take the advice of Sun Tzu and "be prepared."

Related Content:

 

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Car Hacking Hits the Streets"

Greg Jensen is a Director of Security Strategy at Oracle Corporation addressing the risk and challenges to the hybrid-cloud. He is also the Senior Editor of the Oracle and KPMG Cloud Threat Report and Oracle CISO Report with a key focus on developing cloud security ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Google Lets iPhone Users Turn Device into Security Key
Kelly Sheridan, Staff Editor, Dark Reading,  1/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16270
PUBLISHED: 2020-01-22
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
CVE-2018-16271
PUBLISHED: 2020-01-22
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This a...
CVE-2018-16272
PUBLISHED: 2020-01-22
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
CVE-2019-10780
PUBLISHED: 2020-01-22
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
CVE-2019-10781
PUBLISHED: 2020-01-22
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.