aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Computing

3 Overlooked Cloud Security Attack Vectors

  • aster.cloud
  • April 17, 2023
  • 3 minute read

Enterprises are putting their sensitive data in the cloud but both sides are responsible for security. Be sure your cloud provider is aware of these threats.

A 2022 Thales Cloud Security study revealed that 88% of enterprises store a significant amount (at least 21%) of their sensitive data in the cloud. No surprise there. Indeed, I thought the percentage would be much higher. The same report showed that 45% of organizations have experienced a data breach or failed an audit involving cloud-based data and applications. This news is less surprising and less encouraging.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

As I covered previously, humans create most cloud computing security problems. They make easily preventable mistakes that cost enterprises millions in lost revenue and bad PR. In their defense, most don’t get the training they need to identify and deal with ever-changing threats, attack vectors, or attack methods. Enterprises can’t skip this education and still maintain control of their cloud security.

Let’s talk about three little-known cloud computing attack vectors that you should share with your peers:

Side-channel attacks

In the context of cloud computing, side-channel attacks can extract sensitive data from virtual machines that share the same physical server as other VMs and processes. A side-channel attack uses information obtained from the physical environment, such as power consumption, electromagnetic radiation, or sound to infer sensitive information about a system. For instance, an attacker could use power consumption data to figure out the cryptographic keys used to encrypt data in a neighboring virtual machine. Yes, it’s complex and difficult to pull off, but it’s already been done several times.

Read More  Google Cloud Next 2019 | The "Why" And "How" Of Testing Games In The Cloud

Mitigating side-channel attacks can be challenging, as they often require careful attention to physical security and may involve complex trade-offs between performance, security, and usability. Common defenses include techniques such as masking, which adds noise to the system, making it more difficult for attackers to infer sensitive information. Also, hardware-based countermeasures (shields or filters) reduce the amount of information that can leak through side channels.

These protections will be the responsibility of your cloud provider. You can’t show up at their data center, even if you know where it’s located, and start installing countermeasures to side-channel attacks. Ask your cloud provider how they mediate these risks. Change providers if they don’t have a good answer.

Container breakouts

Container breakouts are a type of attack where an attacker gains access to the underlying host operating system from within a container. This can occur if a human has misconfigured the container or if the attacker can exploit a vulnerability in the container runtime, of which there are many. Once an attacker has gained access to the host operating system, they can potentially access data from other containers or compromise the security of the entire cloud infrastructure.Nominations are open for the 2024 Best Places to Work in IT

Defending against container breakout attacks includes some basic processes, including securing the host system, implementing container isolation, applying least-privilege principles, and monitoring container activity. These defenses must occur wherever the container runs: on public clouds or on more traditional systems and devices. These are just some of the emerging best practices; they are cheap and can be implemented by container developers and security specialists.

Read More  Intel Innovation 2023

Cloud service provider vulnerabilities

Along the same lines as a side-channel attack, cloud service providers themselves can be vulnerable, which can have significant consequences for their customers. An attacker could exploit a cloud provider’s infrastructure vulnerability to access customer data or launch a denial-of-service attack. Additionally, nation-state actors can target cloud providers, seeking access to sensitive data or disrupting critical infrastructure, which is the most significant risk right now.

Again, this requires trust in your cloud provider. Physical audits of their infrastructure are rarely an option and would likely prove unhelpful. You need a cloud provider that can quickly and easily answer questions about how they deal with their vulnerabilities:

  • Do they have playbooks to respond to issues they will likely see in the next few years?
  • How will they detect problems?
  • What are they doing to remove vulnerabilities?
  • What monetary guarantees can they provide?

If they balk at any of these core questions, find another provider with the right answers.

By: David Linthicum
Originally published at InfoWorld

Source: Cyberpogo


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Cloud
  • Cloud Computing
  • Cloud Security
  • Security
You May Also Like
View Post
  • Computing
  • Multi-Cloud
  • Technology

Reliance on US tech providers is making IT leaders skittish

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Examine the 4 types of edge computing, with examples

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

AI and private cloud: 2 lessons from Dell Tech World 2025

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

TD Synnex named as UK distributor for Cohesity

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Weigh these 6 enterprise advantages of storage as a service

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Pulsant targets partner diversity with new IaaS solution

  • May 23, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Growing AI workloads are causing hybrid cloud headaches

  • May 23, 2025

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.