Cloud Security, Cloud Security

Report: Most enterprises face security risk from misconfigured cloud

ITProPortal reports that 46% of 40,000 AWS S3 buckets analyzed by cloud security firm Lightspin had potential misconfigurations and were thus vulnerable to attack, reflecting a trend among businesses of improperly configuring their cloud storage permissions and leaving sensitive data open to compromise. Such misconfigurations have been blamed for a number of cybersecurity incidents, including the 2017 breaches that targeted Verizon and Booz Allen Hamilton.

Lightspin said the issue could be partially attributed to potentially confusing definitions provided by vendors for some access options, such as the “Objects can be public” option in AWS, which could leave businesses unsure as to whether the objects are secure. In addition, AWS evaluates access permissions of every file at the bucket level instead of the object level, causing the object’s Access Control List to not be considered, according to Lightspin. The report showed that 40% of S3 buckets they assessed have been attached with the “Objects can be public” definition while 4% are defined as public.

An In-Depth Guide to Cloud Security

Get essential knowledge and practical strategies to fortify your cloud security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds