Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Cloud Data Storage: Key Threats

February 19, 2021May 11, 2021 by admin

Are you using cloud storage services? If yes, then you need to be aware of these key threats.

In the cloud, data storage can be manipulated into unauthorized usage, for example, by account hijacking or uploading illegal content. The multitenancy of cloud storage makes tracking unauthorized usage more challenging.

  • Unauthorized access: Unauthorized access can happen due to hacking, improper data access permissions being assigned in a multitenant environment, or internal cloud service provider employees accessing data without proper authorization.
  • Liability due to regulatory noncompliance: Certain controls (e.g., encryption) might be required in order to comply with certain regulations. Not all cloud services enable all relevant data controls.
  • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks on storage: Availability is a strong concern for cloud storage. Without data, no instance can launch.
  • Corruption/modification and destruction of data: This can be caused by a wide variety of sources: human error, hardware or software failure, and events such as fire, flood, or intentional hack. It can also affect certain portions of the storage or the entire array.
  • Data leakage/breaches: Consumers should always be aware that cloud data is exposed to data breaches. Threats can be external or come from a cloud service provider employee with storage access. Data tends to be replicated and moves in the cloud, which increases the likelihood of a leak.
  • Theft or accidental loss of media: This threat usually pertains to portable storage, but as cloud data centers grow and storage devices continue to become smaller, there are more vectors for theft or similar threats.
  • Malware attack or introduction: The goal for almost every malware is eventually reaching the data storage.

Another key threat is improper treatment or sanitization after end of use. End of use is challenging in cloud computing, because we usually cannot enforce physical destruction of media. Nevertheless, the dynamic nature of data kept in different storages with multiple tenants mitigates the risk that digital remanence can be located.

You will need to leverage different technologies to address the varied threats that may face an enterprise with regard to the safe storage and use of its data in the cloud. The circumstances of each threat will be different, and as a result, the key to success will be your ability to understand the nature of the threat you are facing, combined with your ability to implement the appropriate technology to mitigate the threat.

Related

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!