Public cloud services: Will they open the doors to cyber criminals?

16-04-2018 |   |  By Paul Whytock

Public cloud computing and storage services are rapidly becoming the norm and overtaking the alternative strategy where companies build their own private cloud.

Will this open more doors through which cybercriminals can infiltrate company networks? This question follows the news that hackers have launched more online attacks against British businesses than ever before. The warning comes from the National Cyber Security Centre and the National Crime Agency.

There is no doubt that public cloud services are a booming business to be in. Cisco’s Global Cloud Index analysis indicates that over 70% of cloud computing services will be handled by public centres by the time we enter the next decade.

This, of course, is terrific news for the companies battling each other in the public cloud arena and suggests that corporate revenues are set to escalate.

Today, there are several dominant players: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform. The majority of industry analysts position AWS as the pack leader, particularly when it comes to the revenues it creates. However, Azure is hot on its heels, and Google is very comfortably lurking in third place.


What does it all mean to the person in the street?


What does it all mean to the person in the street regarding the security of data held about them? A business’s sheer size does not bring cast-iron assurances that security will not be breached. Take the recent harvesting of Facebook, where information about over 80 million users was obtained.

But when it comes to making sure public cloud services are secure and that data is protected, there exists a dichotomy. Responsibility for ensuring watertight security does not, as you may think, entirely lie with the cloud service provider. Indeed, they have a massive interest in making sure their network is very secure, but interestingly some of the responsibility also lies with the cloud services customer or, in other words, the company that has chosen to use a public cloud rather than creating its own cloud service operation.

So what should these potential public cloud customer companies be looking out for? According to the Cloud Security Alliance (CSA), some critical public cloud security issues relate to how cloud computing operates through its fundamental concept of shared and available-on-demand facilities. So what are they? Prime among them, of course, are data breaches whereby a network has been deliberately targeted or where security systems have proved either inadequate or not sufficiently updated, or it could be through plain old human error by an employee.

One of the significant security problems pointed out by the CSA is where illegal entry into a network is made by posing as legitimate users. A hacker posing as an operator or developer could read, modify, and delete data, issue control and management functions, spy on data in transit or release malicious software that appears to originate from a legitimate source.

Insecure interfaces are another key security area where Cloud operators provide software user interfaces or application programming interfaces that customers use to manage and interact with cloud services. These must be capable of nullifying both accidental and malicious attempts to circumvent security.

Further network insecurities can be the result of account or service hijacking. This is not a new idea, but cloud services add a unique opportunity. If attackers gain access to a user’s credentials, they can eavesdrop on activities and transactions, manipulate data, return falsified information and, very importantly, redirect clients to illegitimate sites.

A particularly pernicious and challenging security infiltration to deal with is Advanced Persistent Threats (APTs). These worm their way into the network structure of the targeted company and then steal data. This can happen gradually over a long time. During that period, the APT can very cleverly modify itself to deal with the security measures to defend against them.


Conclusion


These are just a few of the ways in which data can be breached by cybercriminals, and potential customers of public clouds need to be aware of them.

Many companies thinking about using public cloud networks will be looking for expert help on what to look for and how to evaluate possible services. It may well be worth them visiting the National Cyber Security Centre website. This is part of the Government Communications Headquarters (GCHQ) and can provide specific advice on cloud cybersecurity issues.



paul-whytock.jpg

By Paul Whytock

Paul Whytock is Technology Correspondent for Electropages. He has reported extensively on the electronics industry in Europe, the United States and the Far East for over thirty years. Prior to entering journalism, he worked as a design engineer with Ford Motor Company at locations in England, Germany, Holland and Belgium.

Related articles