Are you using cloud storage services? If yes, then you need to be aware of these key threats.
In the cloud, data storage can be manipulated into unauthorized usage, for example, by account hijacking or uploading illegal content. The multitenancy of cloud storage makes tracking unauthorized usage more challenging.
- Unauthorized access: Unauthorized access can happen due to hacking, improper data access permissions being assigned in a multitenant environment, or internal cloud service provider employees accessing data without proper authorization.
- Liability due to regulatory noncompliance: Certain controls (e.g., encryption) might be required in order to comply with certain regulations. Not all cloud services enable all relevant data controls.
- Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks on storage: Availability is a strong concern for cloud storage. Without data, no instance can launch.
- Corruption/modification and destruction of data: This can be caused by a wide variety of sources: human error, hardware or software failure, and events such as fire, flood, or intentional hack. It can also affect certain portions of the storage or the entire array.
- Data leakage/breaches: Consumers should always be aware that cloud data is exposed to data breaches. Threats can be external or come from a cloud service provider employee with storage access. Data tends to be replicated and moves in the cloud, which increases the likelihood of a leak.
- Theft or accidental loss of media: This threat usually pertains to portable storage, but as cloud data centers grow and storage devices continue to become smaller, there are more vectors for theft or similar threats.
- Malware attack or introduction: The goal for almost every malware is eventually reaching the data storage.
Another key threat is improper treatment or sanitization after end of use. End of use is challenging in cloud computing, because we usually cannot enforce physical destruction of media. Nevertheless, the dynamic nature of data kept in different storages with multiple tenants mitigates the risk that digital remanence can be located.
You will need to leverage different technologies to address the varied threats that may face an enterprise with regard to the safe storage and use of its data in the cloud. The circumstances of each threat will be different, and as a result, the key to success will be your ability to understand the nature of the threat you are facing, combined with your ability to implement the appropriate technology to mitigate the threat.