Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/1/2010
05:12 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Cloud Security Alliance Names Top 7 Threats To The Cloud

CSA also teams with IEEE in survey of IT pros on security standards gap for cloud computing

SAN FRANCISCO -- RSA Conference 2010 -- The Cloud Security Alliance (CSA) here today identified the top seven security threats to cloud computing, covering everything from the nefarious use of the cloud to insecure application programming interfaces.

"This is like the OWASP [Open Web Application Security Project] Top 10 list," says Dennis Hurst, senior application security architect for HP and a founding member of the CSA. "We wanted to develop guidance around cloud security: What things were the big concerns?"

In a related survey, the CSA and IEEE here today also revealed the results of a poll of IT professionals about cloud computing security standards, in which 93 percent said standards are important, and 82 percent said there is an "urgent" need for them.

"It's clear from the survey's findings that enterprises across industries are eager to adopt cloud computing but that it will take security standards development to accelerate cloud adoption on wide scale, largely because of regulatory drivers," said Jim Reavis, founder and executive director of the Cloud Security Alliance.

Close to 45 percent of the respondents said they are involved in cloud computing standards efforts, and 81 percent said they will likely work on the development of cloud security standards in the next 12 months. Standards for data privacy, security, and encryption are at the top of the list, according to the survey.

Meanwhile, the CSA's leading cloud threats -- not in any particular order -- are abuse and nefarious use of cloud computing; insecure application programming interfaces; malicious insiders; shared technology vulnerabilities; data loss/leakage; account, service, and traffic hijacking; and unknown risk profile, according to the CSA's Top Threats to Cloud Computing V1.0 report released here today.

The report is based on input from security experts in 29 enterprises, cloud computing providers, and consulting firms.

Besides the obvious abuse potential for the cloud, such as spamming, cloud providers' APIs are also a risk. "You need to trust that an API is secure," Hurst says. "You find out by audits and testing."

Cloud provider employees could also pose a threat. "You need to understand how they vet their employees," he says. And the technology used by the cloud provider itself must be secure, or otherwise "everyone is a target that's using their service," Hurst says.

Data leakage and loss is another worry: The key is understanding how data is transferred and the type of encryption being used, both in transit and at rest, Hurst says. Account hijacking is also a risk. "Because you're in a shared environment, going to a shared data center -- how is that network traffic protected?" he says.

The CSA/IEEE survey, meanwhile, found that the use of public, private, and hybrid cloud computing will increase during the next 12 months, with public cloud services the hottest right now.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.