itb-nz logo
Story image

Current security practices 'grossly inadequate' for protecting cloud infrastructures - report

Current security practices are grossly inadequate for protecting transient cloud infrastructures, according to new research from security specialists Accurics.

The Accurics State of DevSecOps says current poor security practices are why more than 30 billion records have been exposed through cloud breaches in just the past two years.

The report takes a deep analysis of current cloud security approaches and outlines best practices that organisations should consider as they reevaluate their approach to this critical discipline. 

"As cloud stacks become increasingly complex, with new technologies regularly added to the mix, what's needed is a holistic approach with consistent protection across the full cloud stack, as well as the ability to identify risks from configuration changes to deployed cloud infrastructure from a baseline established during development," says Accurics co-founder & chief executive Sachin Aggarwal.

"The shift to infrastructure as code enables this; organisations now have an opportunity to redesign their cloud security strategy and move away from a point solution approach," he says.

The Accurics report reveals that:
Misconfigurations of cloud native technologies across the full cloud native stack are increasing the attack surface, and being exploited by malicious actors.

There is a significant shift towards provisioning and managing cloud infrastructure through code. This offers an opportunity for organisations to embed security earlier in the DevOps lifecycle. However, infrastructure as code is not being adequately secured, thanks in part to the lack of tools that can provide holistic protection.

Even in scenarios where infrastructure as code actually is being governed, there are continuing problems from privileged users making changes directly to the cloud once infrastructure is provisioned. This creates posture drift from the secure baseline established through code.

Accurics' research shows that securing cloud infrastructure in production is not enough. Researchers determined that only 4% of issues reported in production are actually being addressed. 

"This is unsurprising since issue investigation and resolution at this late stage in the development lifecycle is challenging and costly," says Aggarwal.

 A positive trend identified by the research is that there is a significant shift towards provisioning and managing cloud infrastructure through code to achieve agility and reliability. Popular technologies include Terraform, Kubernetes, Docker, and OpenFaaS. Accurics research shows that 24% of configuration changes are made via code, which Aggarwal says is encouraging given the fact that many of these technologies are relatively new.

 "Infrastructure as code provides organisations with an opportunity to embed security earlier in the development lifecycle. However, research revealed that organisations are not ensuring basic security and compliance hygiene across code," explains Aggarwal.

"The dangers are undeniable: high severity risks such as open security groups, overly permissive IAM roles, and exposed cloud storage services constituted 67% of the issues. This is particularly worrisome since these types of risks have been at the core of numerous high-profile cloud breaches."

The study also shows that even if organisations implement policy guardrails and security assessments across infrastructure as code, 90% of organisations allow privileged users to make configuration changes directly to cloud infrastructure after it is deployed. 

"This unfortunately results in cloud posture drifting from the secure baseline established during development," he says.

Story image
Developing digital skills in the hybrid workplace
47% of Australians miss feeling empathy from and for others because of the increase in digital interactions, with a similar proportion longing for small talk, humour, physical interactions and the ability to be honest.More
Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Why organisations should rethink the approach to retail demand planning and forecasting
Why organisations should rethink the approach to retail demand planning and forecastingMore
Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
The mirrored world: Digital twins redefine business intelligence
The world’s most visionary leaders will use technology to master change and shape the future.More