The challenge of cloud acceleration

Issue 2 2022 Integrated Solutions

A move to cloud, otherwise referred to as the ‘cloud shift’, that has triggered a change in the way organisations run, is accelerating across the business world.

As a MSSP (managed security services provider), SecurityHQ has experienced this shift across practically every sector and in response, is highlighting the new threats that are emerging out of this shift.

The positives and negatives of cloud adoption

Positive: cost reduction. Now that this model of service is gaining confidence, has been tried and tested, even smaller companies are choosing to make the shift to cost-effective models of cloud operation.

Negative: greater threat surface. While costs may be reduced, a change in cloud configurations and administration means that there are many new opportunities for adversaries to detect vulnerabilities and to exploit misconfigurations in cloud environments.

Businesses must take into consideration the follow key points, to reduce their threat surface when making the shift to cloud.

• A shift to API monitoring. With many additional intercommunications between applications and automations, application programming interfaces (APIs) are more powerful than ever. Almost all admin activities and enumeration activities are possible via API calls.

• Federated accounts. With hybrid cloud models, often during transition phases, we may see attackers ambushing trust relations where the cloud accounts are likely still integrated with traditional identity management systems, such as Windows Active Directory. It is important to monitor behavioural use cases, to watch and catch adversaries moving laterally to cloud resources.

• Misconfigurations. This age-old technique of leveraging misconfigurations is still relevant. Although many cloud computing solutions today allow auto fixing of the overly permissive policies or configurations, business continuity and pressure to get things working will always have a higher priority. Watch out for default security group configurations, which allow unrestricted outbound access. This is an easy channel for adversaries to conduct data exfiltration.

• Firewall controls. With cloud infrastructure, the pricing model greatly depends on storage being used. In many cases, you may notice that logs are one of the biggest consumers of storage than the applications. Traditionally, for on-premises models, the perimeter security firewalls were crucial points to be monitored and further internal activity revolved around application and access logs generated by the systems themselves. With cloud monitoring, virtual private cloud (VPC) traffic is an essential element to monitor, especially traffic between different security groups. This can be optimised by logging your crown jewels as these flow logs tend to be noisy. There are several use cases that can be built around the VPC logs to detect traditional access attempts and excessive failures, which may indicate a broken service or an attack as well.

• Correlation. Correlation is a key element when it comes to cloud-based models. We cannot just check one single data domain.

• An attackers eye view. An attacker will usually follow the below sequence.

1. Check for exposed services.

2. Exploit a vulnerable or misconfigured service.

3. Escalate privilege.

4. Move laterally.

5. Detonate - final objective.

Indicators or trails of attack which are left are different when it comes to cloud-based attacks. Which means it becomes increasingly important to know how the client is set up on the cloud. This is crucial for investigation especially with serverless computing.

Having conducted incident response investigations across a wide range of industries, SecurityHQ is best placed to work with businesses, large and small and across numerous technical environments to reduce the impact of a cybersecurity incident.

For more information contact SecurityHQ Southern Africa, +27 11 702 8555, [email protected], www.securityhq.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

31 percent of all IoT SIMs managed with third-party IoT CMPs
News Integrated Solutions
Berg Insight recently released new findings about the market for IoT connectivity management platforms (CMPs), a standard component in the value proposition from mobile operators and IoT MVNOs around the world.

Read more...
Creating a safe, smart city environment
Integrated Solutions
As more governments around Africa start embracing the smart city concept, significant investments will be required to strengthen the underlying infrastructure essential to keep systems and data safe.

Read more...
Smart car parking solution eases traffic flow
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Integrated Solutions Products
Ethiopia’s first smart parking lot, designed to improve traffic flow and management efficiency, has been built and installed using Dahua Technology’s smart parking solutions.

Read more...
VMS 7.2 supports the investigation process and adds cloud capabilities
CCTV, Surveillance & Remote Monitoring Integrated Solutions Products
Qognify has launched the second release of its VMS, including extended support for body-worn video, additional functionalities to support investigations, and a new web client architecture. VMS 7.2 addresses the increasing use of body-worn video (BWV) across many sectors.

Read more...
Hytera and KZN Police Service roll out digital call handling system
Government and Parastatal (Industry) Asset Management, EAS, RFID Integrated Solutions
Hytera Communications announced that the municipality of Ray Nkonyeni in the KwaZulu-Natal province of South Africa is now using its digital call handling system for the reporting and recording of crimes.

Read more...
Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Johnson Controls releases IQ4
Perimeter Security, Alarms & Intruder Detection Integrated Solutions
New lower cost panel leverages Qolsys IQ Platform targeting residential, SMB, builder, MDU/multi-family and wellness market segments.

Read more...
SuperVision biometric access control
Integrated Solutions Access Control & Identity Management Products
SuperVision is a time & attendance (T&A) biometric access control system Fourier IT has been developing and enhancing for 18 years.

Read more...
Shift to online driving retail transformation
Retail (Industry) Integrated Solutions
There is a growing demand from retail for an end-to-end solution that helps their digitisation process, integrating finance, procurement, warehouse management, pricing, stock management, point of sale and more.

Read more...
AI in video analytics
CCTV, Surveillance & Remote Monitoring Integrated Solutions
AI (artificial intelligence), has been developed and debated ever since the first computers were invented, and while the most revolutionary incarnations are not yet here, AI-based technologies are widely used today.

Read more...