CLOUD AND CYBER
What
is a DDoS Attack ?
While most of the core services in the cloud are generally well understood and often deployed in very secure manners , the more complex areas like container orchestration and automation can introduce new risks , says Green . On the automation side , as more focus moves into software and DevOps , this brings additional considerations such as software supply chain risks in bringing in external , potentially unverified code to corporate environments .
Cloud platforms are vast and cover several technology domains that usually involve multiple teams . When it comes to the cloud , many organisations will have a dedicated ‘ cloud team ’ that is responsible for everything in their choice of public cloud platforms , explains Green .
“ In making their responsibilities far broader , there will be a cost of losing the in-depth expertise of how to properly and securely configure these services ,” says Green . “ For example , most cloud engineers can deploy a virtual machine with a public IP without much of a challenge , but fully understanding the consequences of making it publicly available , not applying network security controls , or configuring access privileges correctly could , in the worst case , mean someone has full remote access to the raw storage data .”
As more and more services are introduced and consumed in the cloud , the problem is exacerbated and can quickly become difficult to manage . “ This type of scenario tends to align with smaller businesses whose teams are more resource-constrained and under pressure to ‘ just make it work ’ when it comes to new deployments ,” says Green .
“ In contrast , there are larger enterprises who show a lot of restraint when it comes to adopting new cloud services for this exact reason and try to ensure that before any new cloud service is adopted , the scope of any new risks it introduces is fully understood .”
92 January 2023