Preventing the risks of cloud exploitation at the edge – TechRadar

Since the global pandemic, enterprises have had to accelerate their move to the cloud. The Infrastructure-as-a-Service (IaaS) cloud computing model empowers remote work, accelerates digital transformation, provides scalability, enhances resilience, and can reduce costs. However, if businesses want to successfully achieve this migration, they need to be aware of the security ramifications involved and ensure they have the strategies in place to safeguard their data and applications.

With the introduction of any new technology, its crucial that all the relevant security policies, tools, processes, and training are made clear to the organization. A sensitive approach needs to be taken for cloud infrastructure due to the risks posed to customer-facing critical applications. The Shared Responsibility Model is a security and compliance framework that sets out the shared infrastructure and systems that a cloud provider is responsible for maintaining. It also explains how a customer is responsible for operating systems, data, and applications utilizing the cloud. Companies migrating to the cloud must understand and follow these rules, otherwise data, applications, and cloud workloads may be exposed to security vulnerabilities.

Cloud exploitation involves targeting vulnerabilities in cloud infrastructure, applications, or services to gain unauthorized access, disrupt operations, steal data, or carry out other malicious activities. A cloud exploitation playbook could include attack vectors like distributed denial-of-service (DDoS) attacks, web application attacks, and bots with the number one attack target being web applications. According to the 2023 Verizon Data Breach Investigations Report (DBIR), the majority of cyber attacks are led by organized criminals looking to disrupt business and steal data to sell. The number one reason (95%) for cyber attacks is financial gain, with 24% of all cyber attacks involving ransomware.

Social Links Navigation

Senior Manager for Solutions Engineering EMEA at Edgio.

Threat detection and mitigation speed are important for three key reasons. First, adversaries are adept at learning from open source intelligence to develop new tactics, techniques, and procedures (TTPs) making rapid security response imperative. Second, cyber criminals are well-organized and act fast. Verizons 2023 DBIR noted, more than 32% of all Log4j scanning activity over the course of the year happened within 30 days of its release (with the biggest spike of activity occurring within 17 days). And, finally, the importance of speed is clearly illustrated by the fact that companies that contain a security breach in less than 30 days can save $1M or more.

To reduce the risk of cloud exploitation, it is crucial that businesses implement strong security measures, such as robust access controls, encryption, regular security assessments, and monitoring of cloud environments. Implementing Web Application and API Protection (WAAP) at the edge is critical to identifying and mitigating a variety of threats such as DDoS attacks, API abuse, and malicious bots. Modern-day WAAPs utilize machine learning and behavioral and signature fingerprinting for early threat detection. Further, companies using AI and automation see breaches that are 74 days shorter and save $3 million more than those without.

A WAAP rapid threat detection and mitigation solution is an invaluable tool for DevSecOps teams to implement an optimized Observe-Orient-Decide-Act (OODA) loop to improve meantime to Detect (MTTD) and meantime to Respond (MTTR) as new threats arise.

The latest innovation is a Dual WAAP capability that enables DevSecOp teams to test new rules in audit mode against production traffic to verify their effectiveness while lowering the risk of blocking legitimate site traffic. This increased confidence, plus the ability to integrate with existing CI/CD workflows, allows teams to push effective virtual patches out faster, closing the door on attackers more quickly than ever before. Additionally, with Dual WAAP, there is no WAAP downtime while updating rulesets, with new rules deployed across the global network sometimes in under 60 seconds.

There are many advantages that cloud Infrastructure-as-a-Service brings to organizations, including agility and resilience. However, cloud exploitation continues to increase and the Shared Responsibility Model emphasizes the importance of maintaining enterprise security as partners. While it is the responsibility of cloud service providers to secure the cloud infrastructure, companies cant let their guard down against the threat of attacks on operating systems, applications, endpoints, and data.

An indispensable tool for DevSecOps teams looking to enhance their "Observe-Orient-Decide-Act" (OODA) loop is a WAAP solution. It can rapidly detect and mitigate threats by reducing both the mean time to detect (MTTD) and the mean time to respond (MTTR). As organizations build up their defense in the fight against cyber threats, WAAP solutions are a strong and effective tool.

We've featured the best business VPN.

Here is the original post:
Preventing the risks of cloud exploitation at the edge - TechRadar

Related Posts

Comments are closed.