For attackers, misconfigurations in the public cloud can be exploited for a number of reasons. Typical attack scenarios include several kill chain steps, such as reconnaissance, lateral movement, privilege escalation, data acquisition, persistence and data exfiltration. These steps might be fully or partially utilized by an attacker over dozens of days until the ultimate objective is achieved and the attacker reaches the valuable data.
Removing the Mis from Misconfigurations
To prevent attacks, enterprises must harden configurations to address promiscuous permissions by applying continuous hardening checks to limit the attack surface as much as possible. The goals are to avoid public exposure of data from the cloud and reduce overly permissive access to resources by making sure communication between entities within a cloud, as well as access to assets and APIs, are only allowed for valid reasons.
For example, the private data of six million Verizon users was exposed when maintenance work changed a configuration and made an S3 bucket public. Only smart configuration hardening that applies the approach of “least privilege” enables enterprises to meet those goals.
[You may also like: Ensuring Data Privacy in Public Clouds]
The process requires applying behavior analytics methods over time, including regular reviews of permissions and a continuous analysis of usual behavior of each entity, just to ensure users only have access to what they need, nothing more. By reducing the attack surface, enterprises make it harder for hackers to move laterally in the cloud.
The process is complex and is often best managed with the assistance of an outside security partner with deep expertise and a system that combines a lot of algorithms that measure activity across the network to detect anomalies and determine if malicious intent is probable. Often attackers will perform keychain attacks over several days or months.
Taking Responsibility
It is tempting for enterprises to assume that cloud providers are completely responsible for network and application security to ensure the privacy of data. In practice, cloud providers provide tools that enterprises can use to secure hosted assets. While cloud providers must be vigilant in how they protect their data centers, responsibility for securing access to apps, services, data repositories and databases falls on the enterprises.

[You may also like: Excessive Permissions are Your #1 Cloud Threat]
Hardened network and meticulous application security can be a competitive advantage for companies to build trust with their customers and business partners. Now is a critical time for enterprises to understand their role in protecting public cloud workloads as they transition more applications and data away from on-premise networks.
The responsibility to protect the public cloud is a relatively new task for most enterprises. But, everything in the cloud is external and accessible if it is not properly protected with the right level of permissions. Going forward, enterprises must quickly incorporate smart configuration hardening into their network security strategies to address this growing threat.
The procedure requires applying conduct investigation strategies after some time, including customary audits of consents and a persistent examination of common conduct of every element, just to guarantee clients just approach what they don’t require anything, more.
I have been told that encryption is vital and your data should reside on a European server, thoughts please.
Economicskey Provides quality Economics homework help for students.
Good Article .Thanks for sharing!
I have been told that encryption is vital and your data should reside on a European server, thoughts please.
The article you shared is so important for the students. such articles are help full for the skill development of students.
very informative
Nice to heart about it..Great work.Very helpfull
I read this article! I hope you will continue to have such articles to share with everyone! thank you
Very good topic, similar texts are I do not know if they are as good as your work out.
Very good topic, similar texts are I do not know if they are as good as your work out.
This is a great job. I have enjoyed reading your post .
This is a scientific post which is useful for science students who are going to become scientists
Wonderful Innovation! it really help to all patients in the community. Thanks!
This post is not just informative but impressive also.
Thanks for this invention! My mom would love to have one.
This initiative is just so smart and beautiful. 🙂
While it is in the best interest of public cloud providers to offer network security as part of their service offerings, every public cloud provider utilizes different …
Those of us who have worked in cybersecurity for many years often start to think we’ve “seen it … like CrowdStrike Falcon® that can prevent these threats, the criminal element will be … The OverWatch team works to identify hidden threat activity … blocking of previously undetectable attacks, whether or not they use malware.
Amazing invention! Very helpful to cancer survivors.
Awesome Information sharing .. I am extremely cheerful to peruse this article .. much obliged for giving us experience info.Fantastic decent. I value this post.
A debt of gratitude is in order for the important data and bits of knowledge you have so given here…
Awesome Information sharing .. I am extremely cheerful to peruse this article .. much obliged for giving us experience info. Fantastic decent. I value this post.
A debt of gratitude is in order for this extraordinary post, i discover it exceptionally fascinating and extremely well thoroughly considered and set up together. I anticipate perusing your work later on.
Extremely pleasant article, I delighted in perusing your post, exceptionally decent share, I need to twit this to my devotees. Much obliged!.
Thanks for sharing!
This is exceptionally instructive substance and composed well for a change. It’s pleasant to see that a few individuals still see how to compose a quality post!
What an interesting topic to ponder. Also, thank you for sharing this.
great post
How do you harden network infrastructure?