CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Report Shows Cyber Attacks on Cloud Services Have Doubled

Cloud Services under attackAs cloud services increase in popularity, a worrying cybersecurity trend has emerged.

According to the 2020 Trustwave Global Security Report, the volume of attacks on cloud services more than doubled in 2019 and accounted for 20% of investigated incidents.

Although corporate and internal networks remain the most targeted domains, representing 54% of incidents, cloud environments are now the third most targeted environment for cyber attacks.

As digital transformation drives cloud adoption, these alarming statistics underscore that a different approach is needed to reduce the new and evolving set of risks associated with the cloud.

 

Cloud services complicate security performance management

The cloud substantially grows the corporate digital footprint far beyond its usual perimeter. As such, organisations often lack visibility into the inventory of critical assets in their cloud ecosystems, as well as the risk associated with those assets.

This challenge is compounded by the cloud shared security model. Organisations must understand the model for every cloud vendor they work with and configure each cloud instance securely. If they don’t, they open themselves to cyber risk. Furthermore, traditional security assessments used for on-premise environments can be difficult to scale. This makes it hard for security teams to discover and determine how well they are securing their cloud-hosted assets — and what portion of the risk they own and manage versus their cloud providers.

As the Trustwave report shows, it’s more important than ever that organisations achieve broad and continuous visibility into all assets across their digital ecosystems. They need insight into unknown malware infections, outdated security certificates, exposed ports (such as those exposed by the BlueKeep exploit in 2019), SSL misconfigurations, bad web application headers, and so on.

In an on-premise environment, this really comes down to basic security hygiene — but in the cloud it’s far more complex. BitSight Attack Surface Analytics can help security teams overcome the challenges of managing cyber risk across their expanding digital ecosystems.

 

Monitor risk hidden in cloud environments

BitSight Attack Surface Analytics gives security teams continuous, broad visibility and context into their attack surface in the cloud. Security managers can understand the risk profiles of all cloud-hosted assets, even across subsidiaries and acquired companies.

A centralised dashboard outlines the location of all assets — broken down by their cloud providers — and shows the corresponding cyber risk associated with each individual asset based on the number of material/severe findings. These findings can reveal areas of weaknesses in an organisation’s security programs and failed security controls that expose them to risk.

 

Understand cyber risk in context

For businesses to get the greatest ROI out of their cybersecurity initiatives, they must allocate resources based on the criticality and level of risk associated with each asset. For instance, a top priority could be remediating any incidents that involve a critical asset with a high risk of being breached. But with an ever-expanding cloud footprint, making these prioritisation decisions can be difficult. Identifying the most severe security events often involves filtering through multiple technology solutions and massive amounts of data.

With BitSight Attack Surface Analytics, you gain unprecedented visibility into your digital ecosystem. Powerful analytics data gives you the context you need to better understand which assets are properly secured — and which represent the greatest potential for security risk — empowering you to make informed, comparative remediation decisions.

The solution also layers additional context into map-based views, such as geographic location. Managers can be alerted to unauthorised cases of servers spun up in the cloud, such as an AWS instance in China, or other cloud instances that aren’t listed in the organisation’s inventory of contracted vendors. Security teams can also determine the precise location of a vulnerable asset, such as an instance in Germany that may be misconfigured, and quickly move to remediate that risk. They can also prioritise remediation efforts by ranking the importance of assets by cloud provider.

Additionally, BitSight Attack Surface Analytics provides visibility into multi-cloud environments. Security teams can compare the security posture of multiple AWS deployments, or the security of AWS in comparison to a Google Cloud or Oracle instance and bring them into alignment.

With the additional context that BitSight Attack Surface Analytics provides, it’s easier than ever to focus remediation efforts and align security policies across the digital landscape.

 

Get one step ahead of opportunistic threat actors

Cloud environments are emerging as a lucrative target for threat actors seeking to exploit confusion about the shared security model and a lack of organisation-wide understanding of security performance and risk.

To alleviate these challenges, organisations must have comprehensive and continuous visibility into their digital footprints. Only with this insight and context can they take the first step towards establishing an effective security program — before opportunistic threat actors strike.

 

You’re Only As Strong As Your Weakest Link

There’s never a more vital time to start thinking seriously about the security posture of your organisation and the cyber supply chain you rely on. DVV Solutions are here to help with a range of services and solutions proven to improve your ability to assess, analyse and manage more Third-Party cyber and data privacy risk domains. For more advice and information on any Third-Party risk challenge you have:

Call Us+44 (0) 161 476 8700

Contact Us: Complete our Contact Form, or

Learn more about What We Do

 

This article was originally published by BitSight and is shared with their kind permission.