More

    NSA Offers Guidance on Mitigating Cloud Flaws

    [ad_1]

    A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.

    The National Security Agency (NSA) today published a new document outlining common types of cloud vulnerabilities and offering different ways for companies to protect cloud environments.

    “Mitigating Cloud Vulnerabilities” addresses how cloud adoption can improve security posture but introduce risks that organizations should understand. It addresses four types of cloud architectural services – identity and access management, compute, networking, and storage – and explains the importance of shared responsibility with cloud service providers. For example, this model affects tasks like patching but varies by CSP, cloud service, and product offering.

    It also digs into different types of cloud threat actors, which may include malicious admins who use their privileged credentials to access sensitive data. These may come from the CSP or the customer, NSA notes. Other cloud-focused attacks may come from cybercriminals, nation-state attackers, or untrained or neglectful customer cloud administrators, officials state.

    The document breaks cloud vulnerabilities into four classes. Misconfigurations, considered to be the lowest in sophistication, often arise from CSP policy mistakes or misunderstanding the shared responsibility model. It’s the most widespread of the four and could expose an organization to a range of threats including denial of service and account compromise.

    Poor access control is another widespread threat of moderate sophistication. This occurs when cloud resources use weak authorization methods or have vulnerabilities that would let an attacker bypass authentication. An attacker could elevate privileges and compromise resources.

    Shared tenancy vulnerabilities are considered rare and of high sophistication. Hypervisor flaws are difficult and expensive to find and exploit; CSPs continuously scan hypervisor code for bugs. Containers run on a shared kernel, and a vulnerability in the container platform could let an attacker target containers run by other tenants on the same host.

    Supply chain flaws, the fourth type of cloud vulnerability, are also considered to be rare and advanced. These vulnerabilities include the presence of inside attackers, as well as intentional backdoors built into hardware and software. Bringing someone into the supply chain could give attackers an easy route into a target organization.

    Read more details and mitigations in the full document here.

    Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

    More Insights



    [ad_2]

    Source link

    Recent Articles

    Episode 396: Barry O’Reilly on Antifragile Architecture : Software Engineering Radio

    Barry O’Reilly of Black Tulip Technology discusses Antifragile Architecture, an approach for designing systems that actually improve in the face of complexity and...

    Could Pittsburgh be the Next Silicon Valley for EEs?

    Following the bay area’s technology boom, we’ve now set our sights on identifying the next big nucleus of innovation. There’s been plenty of...

    StreamElements helps brands work with livestream content creators more efficiently

    StreamElements has partnered with Magic: The Gathering maker Wizards of the Coast to launch SE.CAP, an integrated influencer marketing platform that helps brands...

    Broadcom announces new ‘high-performance component’ deals with Apple, valued at $15B

    Chipmaker Broadcom has announced that it has inked two multi-year deals with Apple to provide “high-performance wireless components and modules.” These chips will...

    Related Stories

    Stay on op - Ge the daily news in your inbox