Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

1/8/2020
10:00 AM
Greg Jensen
Greg Jensen
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

The "Art of Cloud War" for Business-Critical Data

How business executives' best intentions may be negatively affecting security and risk mitigation strategies -- and exposing weaknesses in organizational defenses.

Those who wish to do your business harm are hearing the famous words by Sun Tzu in the book The Art of War: "Attack him where he is unprepared, appear where you are not expected." This is the typical philosophy adopted by modern cybercriminals to identify points of weakness and exposure, whether they are in business data centers or in the cloud. But in a move never imagined by Sun Tzu himself, today's defenses may even be circumvented and damaged by business executives themselves.

Historically, enterprises have used application deployment models that required finance, supply chain, and human resources system owners to work hand in hand with security leaders to ensure they can move past the barriers of the corporate firewall. With the introduction of cloud, these same teams are now able to stand up cloud-based platforms in a matter of days or establish cloud infrastructure services with a credit card. These activities can rapidly serve the growing pressures placed on these business executives to meet key deliverables in a timely manner. So, with all the simplicity cloud brings, including low-lift efforts to onboard new services, what is the risk everyone is worried about?

The "Pace Gap" Issue Created by the Cloud
Oracle's recent industry report on cloud threats illustrates the fast-paced efforts by business executives that are creating what is called a "pace gap" between organizations' business-critical services and the security, compliance, and risk programs designed to keep customers and data protected. Pace gaps occur when a key business application is suddenly onboarded and used by the executive without any orchestration from the security operations team. This creates risk around credential/identity management programs, regulatory compliance oversight, data protection programs and organizations' ability to detect anomalous behaviors and respond accordingly.

The Benefits of a United Security Front
Event and alert information from today's cloud applications can be very instrumental in identifying threats and attacks. For example, when effectively deployed, an ERP system can provide a plethora of information on suspicious behaviors in user transactions that might correlate with supply chain behaviors or even behaviors on other IT resources. Consolidating, correlating and responding to these events is critical to a modern defense strategy so they all work together for a common cause.

As Sun Tzu said, "If his forces are united, separate them. If sovereign and subject are in accord, put division between them." Even back in 6th century B.C., Sun Tzu saw that a united front with no sunlight between overlapping defenses and infrastructure is the only way to defend against an attack. When there is unsanctioned application use inside any organization (by a business executive or user), this may be the daylight needed for an attacker to strike by exploiting misconfigured services or by taking advantage of limited monitoring and response capabilities.

The Need for Collaboration Between the Business and Security Operations
As this unsanctioned application usage illustrates, there are several reasons organizations may bypass and/or don't work more effectively with the security operations teams. For one, there is the concern that implementing the appropriate security controls will slow down deployment of a service the business executive wants for its customers. The other is that the security team itself may simply say "no" to rolling out the new service.

Both of these are issues that today's CISOs are working to overcome by changing the way they — and by extension, their IT and security teams — engage with the business executives. We are seeing CISOs making significant efforts to adopt new management styles to help them move past the old refrain of "no you can't" to the more inclusive approach of "yes you can… and here is a safe way to do that."

And what about the delay in service deployment? Eventually, the security operations, compliance, and data protection teams will catch up with services deployed that are misconfigured. In these situations, there is a real risk of suspension of services and a lengthy audit/remediation activity to bring this back in line with corporate policies.

I was once asked, "what is the most important step a business executive can perform to mitigate risk?" Simply put, buy your CISO a cup of coffee every other week. Help yourself by building a relationship and investing in the common goals you both share. Work with your CISO to understand your part of the shared responsibility security model between you and the cloud service provider. Your role as a business executive requires that you work effectively with your IT and security teams to ensure your company's role in securing data is addressed.

Public Cloud: An Organization's Closest Ally or Greatest Enemy 
Public cloud can be the most secure environment for your data with effective planning, or it can be your greatest risk without it. Ninety-one percent of security leaders feel that public cloud can provide an as-secure or more secure environment than one they can deliver in their own data center, but this requires organizations to take the advice of Sun Tzu and "be prepared."

Related Content:

 

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Car Hacking Hits the Streets"

Greg Jensen is a Director of Security Strategy at Oracle Corporation addressing the risk and challenges to the hybrid-cloud. He is also the Senior Editor of the Oracle and KPMG Cloud Threat Report and Oracle CISO Report with a key focus on developing cloud security ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20733
PUBLISHED: 2021-06-22
Improper authorization in handler for custom URL scheme vulnerability in ????????? (asken diet) for Android versions from v.3.0.0 to v.4.2.x allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
CVE-2021-20734
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in Welcart e-Commerce versions prior to 2.2.4 allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
CVE-2021-20735
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in ETUNA EC-CUBE plugins (Delivery slip number plugin (3.0 series) 1.0.10 and earlier, Delivery slip number csv bulk registration plugin (3.0 series) 1.0.8 and earlier, and Delivery slip number mail plugin (3.0 series) 1.0.8 and earlier) allows remote attackers to ...
CVE-2021-20736
PUBLISHED: 2021-06-22
NoSQL injection vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to obtain and/or alter the information stored in the database via unspecified vectors.
CVE-2021-20737
PUBLISHED: 2021-06-22
Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors.