Threats to Cloud Security.

 

Cloud computing is on the rise and becoming popular in the public and business enterprises sector. Many CSPs (Cloud Service Providers) like, Microsoft Azure, AWS (Amazon Web Service), and GCP (Google Cloud Platform) are offering their clients and users the opportunity to migrate the operations to the cloud by subscribing services () that fits their operation needs. There are many activities involved with migrating to the cloud that are important for the public and business enterprises to understand before making such leap (migrate). Speaking of migrating, the term security is one of the most critical aspects that concerns cybersecurity team members, and all proper measures must be taken seriously. The uprising of cyber threats to cloud computing increases by the day just as cloud computing becomes more and more popular. The following are lists of threats to cloud security:

1.      Data Breach - regardless of whether data is accessible through the Internet or private network (on-perm or cloud), they are subject to security risk. Data stored in the cloud has some unique vulnerabilities, however, including risks due to shared hardware resources and vulnerabilities to CSP personnel or third-party providers (West, 2023, p. 217). As much as some customers would like to protect their data in the cloud, unfortunately, they do not have any physical security control over the physical configuration of the “infrastructure supporting their cloud-hosted data.” However, depending on the CSP, customers will be provided virtual security control.

2.      DoS and DDoS – (Denial of Service and Distributed Denial of Service) are methods attackers implement when they want to bring down a network by delaying its operations. Both methods can deny user access to legitimate websites (network server) if properly implemented. For example, an attacker can take down a website simply by deploying DDoS to flood the website with unnecessary traffic.

3.      Poor Account Management – poor account management will eventually lead to accounts being compromised by attackers.  For example, humans have the attitude of using weak passwords because human memory is not capable of memorizing complex characters (mixture of signs, numbers, and letters).

Other threats to cloud security that are not discussed in this blog but are just as important as the three being discussed are: Insider Threat, CSP Change or Outages, Data loss with no backup, Insecure Interface, Advanced Persistent Threat and many more.

 

 

Reference:

West, Jill. CompTIA Cloud+ Guide to Cloud Computing (p. 217). Kindle Edition. Retrieved: October 23, 2023.

Comments

Popular posts from this blog