Is the public cloud secure?

Issue 6 2022 Information Security, Security Services & Risk Management

Is the public cloud safe? Organisations often have this concern as they engage services from third-party cloud hosts. They may have a point; the public cloud is not necessarily as secure as we want to think. The rise in cyberattacks partially correlates with the spreading adoption of public digital services.

While there is reason to be concerned, it’s not a definitive conclusion. “The public cloud is more secure than most private estates because public providers spend a lot on security and specialise in security as a critical part of their business model. But there are risks in the public cloud that customer companies aren’t aware of,” says Alastair Cox, head of Microsoft consulting at cybersecurity company, Performanta.

Three security threats

An effective way to explain this puzzle is to focus on a popular public cloud: the Microsoft 365 ecosystem. Countless companies rely on Microsoft 365, using services that range from straightforward email and collaboration to complex infrastructure and emerging technologies. Such an environment has three general security threats.

1) Firstly, criminals know the public addresses that connect to those services, so they don’t have to first discover where, for example, a target’s email service resides before launching an attack.

2) Secondly, most criminals rely on easy-to-use solutions such as Ransomware-as-a-Service that are sometimes optimised to target popular public clouds.

3) Thirdly, the complex integrations between public clouds and company systems leave room for configuration errors that translate into security gaps.

“The public cloud’s biggest security risk emerges when companies assume their provider will take care of their security,” says Cox. “What we’re seeing more of is organisations that don’t sufficiently configure and integrate cloud security measures. They don’t generally realise how much bigger attack surfaces become with the public cloud.”

Security controls will change

The top public clouds are nearly impenetrable, so criminals look for weaknesses among client configurations. Companies don’t realise how much their internal security services must adapt to the new environment.

“When organisations move to cloud services, there is a misconception. It may just be the email service that is outsourced, but the entire environment needs to be reviewed and considered, including critical areas such as identity. Traditional controls are important, such as reviewing transport rules to harden the environment and reduce the likelihood of being an open relay. But be aware that if you’re living in Microsoft 365, you need to take a holistic approach, reviewing the entire set of controls available to you,” says Cox.

Responsible organisations appreciate that public cloud security is a two-way transaction, but they can underestimate the changes on their side and often overlook critical steps that will harden their security against criminals who exploit new blindspots in the public space. Fortunately, they can address and overcome such risks by using security benchmarks and assessments.

A new diligence for security

Companies adopting public cloud services need a new type of diligence. The practice of assessing security is fundamental. But in the context of public clouds, they shouldn’t make assumptions based on their previous security posture. They should systematically check and improve security components that tie into the new environment.

Cox recommends using security benchmarks such as those provided by CIS, or Microsoft’s Secure Score.

“These benchmarks provide a holistic approach to hardening your environment, allowing organisations to use predefined frameworks and strengthen their environment. By applying good controls, you’ll be able to lower the risk of being breached as well as limit the impact of any breaches which may occur,” he says.

Companies can use security assessment services that understand the security tools available in cloud environments. Benchmarks and assessment partners make an effective combination to close public cloud security gaps, and bring an added benefit.

“The best public clouds are very secure, but they depend on customer security teams that understand the available controls. Assessment services provide guidance and insight that help established security teams identify key risks and advise on remediation. This creates a positive feedback loop, closing gaps, improving security knowledge and building confidence in the public cloud,” says Cox.

Even though they are better equipped to repel cyberattacks, public clouds introduce new risks and attack opportunities. But when organisations continually tackle these with the support of benchmarks and assessment teams, the public cloud is very secure.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...