OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     04.02.20 10:35l 101 Lines 5082 Bytes #999 (0) @ WW
BID : 926HB1PMS
Read: GAST
Subj: NSA Releases Guidelines to Improve Cloud Security
Path: DBO595<DBX320<FRB024<BBS645<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200203/1526Z 6857@HB1BBS.ZL.NLD.EU BPQ6.0.19

Van: HB1PMS@HB1BBS.ZL.NLD.EU

NSA Releases Guidelines to Improve Cloud Security

January 29, 2020 | Strategy and Planning 

nsa,national,security,agency,snowden,edward,logo,surveillance,secret,usa,ser
vice,coat,american,politics,adler,america,amerikanisch,armes,berlin,deutschl
and,eagle,electronic,emblem,embleme,geheimdienst,german,germany,icon,interne
t,of,politik,sign,signage,wappen
The guidelines include mitigation techniques for cloud vulnerabilities other 
than the identification of cloud security components, threat actors and 
more.
NSA hopes that organizations can gain perspective on cloud security 
principles while addressing cloud security considerations to assist with 
cloud service procurement.
The National Security Agency (NSA) has released new guidelines to help 
organizations improve the security of data stored on the cloud. The 
guidelines include mitigation techniques for cloud vulnerabilities other 
than the identification of cloud security components, threat actors and 
more.

With the release of the guideline, NSA hopes that organizations can gain 
perspective on cloud security principles while addressing cloud security 
considerations to assist with cloud service procurement. The guide is 
designed both for the organizational leadership team and technical staff.

What are the major flaws?

According to the guide, cloud vulnerabilities can be divided into four 
categories: misconfiguration, poor access control, shared tenancy flaws, and 
supply chain vulnerabilities.

Misconfiguration: Termed as the most prevalent cloud vulnerability, a 
misconfiguration can enable attackers to access cloud data and services. In 
May 2017, this kind of security flaw had caused a large defense contractor 
to expose sensitive NGA data and authentication credentials to the public. 
Likewise, in September 2017, a security researcher had discovered CENTCOM 
data accessible to all public cloud users and in September 2019, sensitive 
travel details of Department of Defense (DoD) personnel were exposed due to 
the same security flaw. And there are countless examples of the same flaw 
impacting private companies as well.

Poor access control: This occurs when cloud services use weak authentication 
methods or include vulnerabilities that bypass these vulnerabilities. 
Weaknesses in access control mechanisms can allow an attacker to elevate 
privileges, resulting in the compromise of cloud resources. The cyberattacks 
in October 2019 by the Phosporous group on Microsoft customers and the 
attacks in March 2018 by the Iranian Mabna Institute where email accounts 
were compromised by bypassing multi-factor authentication, are examples of 
how this flaw can be exploited by threat actors.

Shared tenancy vulnerabilities: Cloud platforms consist of multiple software 
and hardware components. Adversaries who are able to determine the software 
of hardware used in a cloud architecture can take advantage of 
vulnerabilities to elevate privileges in the cloud. The occurrence of such 
attacks is estimated to be rare as the sophistication level is ‘high’.

Hardware vulnerabilities in processors can also have a large impact on cloud 
security. One such case is the flaws in chip design that can result in the 
compromise of tenant information in the cloud through side-channel attacks.

Supply chain vulnerabilities: Supply chain vulnerabilities in the cloud 
include the presence of insider threats and intentional backdoors in 
hardware and software. In addition to this, third-party software cloud 
components may contain vulnerabilities intentionally inserted by rogue 
developers to compromise the application. Inserting an agent into the cloud 
supply chain, as a supplier, administrator or developer, could be an 
effective means for nation-state attackers to compromise cloud environments.

Conclusion

Managing risks in the cloud is a responsibility on the shoulders of cloud 
service providers (CSPs). Thus, CSPs should deploy the right countermeasures 
to help customers harden their cloud resources. Security in the cloud is a 
constant process and customers should also continually monitor their cloud 
resources and work to improve their security posture.

73 Henk.

======================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZLD.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

======================================================================

** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93  

======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed maandag 03 februari 2020  16:24 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU





Lese vorherige Mail | Lese naechste Mail


 24.11.2024 04:30:54lZurueck Nach oben