Cloud security breach – how would you respond?

December 1st, 2013 by Leave a reply »

Over the 18 months ending June 2013, enterprises boosted their use of cloud storage by 90 percent, resulting in 45 percent more revenue for cloud service providers, according to report released by Verizon.

Is a concern about cloud security an irrational fear? In short, we have no way of knowing but attackers are likely to increase because the target audience is also increasing.

In the case of almost all the data breaches of the past year, the custodians of the data weren’t aware of the extent of their security weaknesses until their vulnerabilities were exposed by hackers. In some cases, they didn’t even know of the breach until the hackers boasted about it. What if they don’t boast?

Companies need to know the cloud provider’s contractual obligations because there is often a murky line between the cloud provider’s responsibilities and the customer’s responsibilities. expect different response from those who provide: Platform-as-a-service (PaaS) and software-as-a-service (SaaS) or infrastructure-as-a-service.

Successful intrusions may be infrequent – getting thirty million IDs and passwords is a difficult task, even from leaky on-premise infrastructures – but the consequences could be devastating. Finding out the extent of a data breach is hard. Kevvie Fowler’s SQL Server Forensic Analysis, explains in detail the tools, processes, data and logs required to identify and to collect the various data fragments (artifacts) to reconstruct the activity of an intruder.

If part of all of your infrastructure, platform or software is hosted in the cloud, then consider:.
How do you detect and repair any damage inflicted?
How would you find out what cloud data has been stolen?
How to plan your response to a security breach?

Advertisement

Comments are closed.