The challenge of cloud acceleration

Issue 2 2022 Integrated Solutions

A move to cloud, otherwise referred to as the ‘cloud shift’, that has triggered a change in the way organisations run, is accelerating across the business world.

As a MSSP (managed security services provider), SecurityHQ has experienced this shift across practically every sector and in response, is highlighting the new threats that are emerging out of this shift.

The positives and negatives of cloud adoption

Positive: cost reduction. Now that this model of service is gaining confidence, has been tried and tested, even smaller companies are choosing to make the shift to cost-effective models of cloud operation.

Negative: greater threat surface. While costs may be reduced, a change in cloud configurations and administration means that there are many new opportunities for adversaries to detect vulnerabilities and to exploit misconfigurations in cloud environments.

Businesses must take into consideration the follow key points, to reduce their threat surface when making the shift to cloud.

• A shift to API monitoring. With many additional intercommunications between applications and automations, application programming interfaces (APIs) are more powerful than ever. Almost all admin activities and enumeration activities are possible via API calls.

• Federated accounts. With hybrid cloud models, often during transition phases, we may see attackers ambushing trust relations where the cloud accounts are likely still integrated with traditional identity management systems, such as Windows Active Directory. It is important to monitor behavioural use cases, to watch and catch adversaries moving laterally to cloud resources.

• Misconfigurations. This age-old technique of leveraging misconfigurations is still relevant. Although many cloud computing solutions today allow auto fixing of the overly permissive policies or configurations, business continuity and pressure to get things working will always have a higher priority. Watch out for default security group configurations, which allow unrestricted outbound access. This is an easy channel for adversaries to conduct data exfiltration.

• Firewall controls. With cloud infrastructure, the pricing model greatly depends on storage being used. In many cases, you may notice that logs are one of the biggest consumers of storage than the applications. Traditionally, for on-premises models, the perimeter security firewalls were crucial points to be monitored and further internal activity revolved around application and access logs generated by the systems themselves. With cloud monitoring, virtual private cloud (VPC) traffic is an essential element to monitor, especially traffic between different security groups. This can be optimised by logging your crown jewels as these flow logs tend to be noisy. There are several use cases that can be built around the VPC logs to detect traditional access attempts and excessive failures, which may indicate a broken service or an attack as well.

• Correlation. Correlation is a key element when it comes to cloud-based models. We cannot just check one single data domain.

• An attackers eye view. An attacker will usually follow the below sequence.

1. Check for exposed services.

2. Exploit a vulnerable or misconfigured service.

3. Escalate privilege.

4. Move laterally.

5. Detonate - final objective.

Indicators or trails of attack which are left are different when it comes to cloud-based attacks. Which means it becomes increasingly important to know how the client is set up on the cloud. This is crucial for investigation especially with serverless computing.

Having conducted incident response investigations across a wide range of industries, SecurityHQ is best placed to work with businesses, large and small and across numerous technical environments to reduce the impact of a cybersecurity incident.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.