Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Building a More Secure Cloud: 5 Strategies for 2022
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Building a More Secure Cloud: 5 Strategies for 2022

4 years ago Tripwire Guest Authors
Building a More Secure Cloud: 5 Strategies for 2022

Cloud adoption continues to soar. More than two-thirds of small to mid-sized businesses intend to increase their use of cloud technologies over the next few years. While the cloud comes with many security benefits, it also carries unique concerns.

As the cloud becomes increasingly central to business operations, cloud security should be a priority. Businesses must ensure this security from the ground up, not add it in later as an afterthought. These five strategies can help build a more secure cloud for 2022.

1. Review Cloud Data and Configurations Regularly

Even with a secure cloud design, businesses should never assume they’re safe. The cloud’s scalability and ease of use makes it easy to forget what users store on it or how it may change as it expands. This can lead to unpatched vulnerabilities.

Businesses can address these vulnerabilities by regularly reviewing their cloud storage and architecture. If they find any files or systems they’re not using anymore, they should delete them or move them somewhere else. Minimizing this data will mitigate potential breaches and make it easier to manage the cloud.

Similarly, businesses should regularly check their cloud security configurations. Misconfiguration is the number-one cause of cloud breaches, so it’s important never to assume a system is working as it should. Periodic misconfiguration tests can reveal and help patch these vulnerabilities.

2. Give Thought to Physical Considerations

Clouds should be secure by design, so companies must consider security when mapping out their systems and building data centers. That includes physical considerations like proper cooling and storage redundancy to ensure uptime.

 When designing the software side of the cloud, businesses should reduce dependencies, access, and endpoints as much as possible. Zero-trust architecture is the ideal solution for secure cloud design. A quarter of government security professionals say their agencies have already implemented zero-trust security, and private businesses should follow suit.

 It’s important to ensure all parties understand these considerations, too. As context, more than 85% of data center designs suffer from incorrect execution during construction. If companies use an external cloud vendor, they should specify their security requirements in their Service Level Agreements (SLA).

3. Emphasize IAM

Identity and access management (IAM) is another crucial aspect of cloud security. Security professionals often cite that users are a system’s most significant vulnerability, and IAM is the key to mitigating these risks.

IAM policies should follow the principle of least privilege. Each user should only have access to what they need for their roles and nothing more to mitigate a breach’s potential impact. Since roles and responsibilities can change, it’s also important to review IAM policies periodically. Network administrators may have to remove some permissions a user doesn’t need any more, or grant someone else more access.

IAM should apply to devices and cloud apps, too. If an endpoint or service has access to more than it needs, attackers could infiltrate it to cause widespread damage.

4. Embrace Automation

Cloud environments are dynamic. As such, their security requires frequent updates. Continuous monitoring is also essential for cloud security in 2022, given the likelihood of zero-day exploits or unpatched vulnerabilities. Businesses can account for both these needs with automation.

Automation reduces errors and resources by removing the burden from human IT teams. Most businesses don’t have the budget or resources to enable human-driven continuous monitoring, and even if they could, human errors are common. Automated tools can monitor cloud environments far faster and more accurately, filling the gaps.

Businesses should also use automated systems to deploy updates across their cloud environments. That way, they avoid overlooking any parts of the system and can update it faster. Automation may also prove beneficial for keeping pace with changing regulatory requirements.

5. Train Users Thoroughly

Regardless of how strong a cloud system’s defense is, user error can still jeopardize security. Cybercriminals know this too, as the recent rise in phishing attacks indicates. All cloud users should undergo thorough and repeated training to prevent critical errors.

Cloud security training should vary between users with different levels of access. Training for all employees should include foundational steps like strong password management and phishing prevention. Users with higher-level access should undergo additional cybersecurity training and more frequent assessments.

Assessments are an important but easily overlooked part of cloud security training. Testing users after teaching them the right steps can reveal if training needs to change to be more effective or focus on different topics. Just as penetration testing reveals technical vulnerabilities, mock attacks and phishing simulations can reveal human vulnerabilities that need to be addressed.

Better Cloud Security Is Crucial in 2022

The cloud is an indispensable tool for businesses in 2022. Consequently, companies can’t overlook cloud security. If organizations don’t build a more secure cloud, they could put all of their operations at risk.

These five steps are more than just recommendations. They’re becoming critical steps for businesses that hope to stay operational and secure this year.


About the Author: Dylan Berger has several years of experience writing about cybercrime, cybersecurity, and similar topics. He’s passionate about fraud prevention and cybersecurity’s relationship with the supply chain. He’s a prolific blogger and regularly contributes to other tech, cybersecurity, and supply chain blogs across the web.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor and do not necessarily reflect those of Tripwire, Inc.

The post ” Building a More Secure Cloud: 5 Strategies for 2022″ appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Critical Severity, Encryption, Medium Severity, Phishing, TripWire, Vulnerability

Continue Reading

Previous Latest Mobile Malware Report Suggests On-Device Fraud is on the Rise
Next Chinese Hackers Begin Exploiting Latest Microsoft Office Zero-Day Vulnerability

More Stories

  • Cyber Attacks
  • Data Breach

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

2 hours ago [email protected] (The Hacker News)
  • Vulnerabilities

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Malware

Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Vulnerabilities

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

1 day ago [email protected] (The Hacker News)

Recent Posts

  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
  • Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
  • AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
  • We Are At War
  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT