Don't make this basic mistake.
But it isn't just cyber attackers from outside the company who can take advantage of misconfigured identity, access and credential management, if it isn't managed properly. It's also possible for these issues to be exploited by insider threats – employees who can exploit the lack of controls to escalate their access privileges and gain access to data they shouldn't be able to.
They could be doing this just because they can, taking it with them to a rival company, or putting it up for sale to cyber criminals to exploit.
While gaining access to login credentials for cloud accounts is an increasingly common technique used in cyberattacks, in some cases, the attacker doesn't need a username or a password at all, because data stored in the cloud is being left exposed and is accessible to anyone who knows where to look.
The report also warns against some other common cloud security flaws, including:
- Insecure interfaces and APIs
- Misconfiguration and inadequate change control
- Lack of cloud security architecture and strategy
- Insecure software development
In order to improve identity and access management controls, the report recommends organisations implement a zero-trust model of cybersecurity, requiring validation at every stage of the user's journey through the cloud environment, preventing them from using one set of credentials to gain access to things they don't need to.
Users should also be required to avoid using weak passwords, so intruders can't use brute force attacks or guesswork to gain control of accounts. In addition, users should be equipped with multi-factor authentication to create an extra barrier against attacks.
Courtesy: ZDNet
No comments:
Post a Comment