Survey finds misconfiguration common in cloud deployments-and that’s before using edge services

edge computing research reports

Immutable security specialist Accurics has released the Summer 2020 edition of its “Accurics State of DevSecOps” report which highlights emerging security challenges as organizations adopt cloud native technologies. This new report reveals that cloud breaches will likely increase in velocity and scale, and highlights steps that can be taken to mitigate them.

“While the adoption of cloud native infrastructure such as containers, serverless, and service mesh is fueling innovation, misconfigurations are becoming commonplace and creating serious risk exposure for organizations,” explains Accurics Co-founder & CTO, Om Moolchandani. “As cloud infrastructure becomes increasingly programmable, we believe that the most effective defense is to codify security into development pipelines and enforce it throughout the lifecycle of the infrastructure. The receptiveness of the developer community toward assuming more security responsibility has been encouraging and a step in the right direction.”

The new Accurics report reveals, among other findings, that:

• Misconfigured cloud storage services are commonplace in 93% of the cloud deployments analyzed, and most also have at least one network exposure where a security group is left wide open. These issues will likely increase in both velocity and scale—and they’ve already contributed to more than 200 breaches over the past two years.

• Despite the availability of tools like HashiCorp Vault and AWS Key Management Service (KMS), hardcoded private keys turned up in 72% of the deployments analyzed. Specifically, unprotected credentials stored in container configuration files were found in half of these deployments, which is an issue given that 84% of organizations use containers. Going one level deeper, 41% of the organizations had high privileges associated with the hardcoded keys and were used to provision compute resources; any breach involving these would expose all associated resources. Hardcoded keys have contributed to a number of cloud breaches.

• Network exposures resulting from misconfigured routing rules posed the greatest risk to all organizations. In 100% of deployments, an altered routing rule exposed a private subnet containing sensitive resources, such as databases, to the internet.

• Automated detection of risks paired with a manual approach to resolution is creating alert fatigue, and only 6% of issues are being addressed. An emerging practice known as Remediation as Code, in which the code to resolve the issue is automatically generated, is enabling organizations to address 80% of risks.

Accurics has long advocated the philosophy of managing risk early in the development lifecycle, noting that implementation of best practices such as encrypting databases, rotating access keys, and implementing multi-factor authentication ensures enhanced hygiene. Automated threat modeling is also needed to determine whether changes such as privilege increases, and route changes introduce breach paths in a cloud deployment. As organizations embrace Infrastructure as Code (IaC) to define and manage cloud-native infrastructure, codifying security into development pipelines becomes possible and can significantly reduce the attack surface before cloud infrastructure is provisioned.

The new report makes the case for establishing the IaC as a baseline to maintain risk posture after cloud infrastructure is provisioned. Continuous assessment of new cloud resources and configuration changes against the baseline will surface new risks. If a change is legitimate, update the IaC to reflect the change; if it’s not, redeploy the cloud from the baseline.

Article Topics

 |   |   |   | 

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Edge News, Analysis & Opinion

Featured Company

Edge Market Reports

Explaining Edge Computing

Edge Computing Events

EdgeIR.com

Latest News