Here is how cloud-centric organizations can diagnose and troubleshoot three internal cyber threats holistically and emerge more secure for the future

For organizations relying on cloud technology, this growing trifecta of cloud risks should be treated as an urgent wake-up call.

Nigel Ng, Senior Vice President (Asia Pacific and Japan), Tenable

What are the signs of the three threats to look out for? Certain patterns are clear:

  • Workloads that are both publicly accessible and vulnerable to exploitation are frequently coupled with overly generous access permissions.
  • Critical vulnerabilities have often been left unpatched for too long, create a foothold for cybercriminals to escalate their attacks.
  • Over-privileged identities, often unintentionally created during the setup of testing environments or development cycles, can grant intruders expansive access upon their gaining a foothold in the system.

Awareness of the problem is a critical first step, but it must be accompanied by action.

  • Organizations need to prioritize identity and access management, recognizing that identity is the new perimeter in a cloud-first world. By enforcing multi-factor authentication, rotating access credentials, and adhering to the principle of least privilege, businesses can restrict the pathways available to attackers.
  • Similarly, vulnerability management must go beyond routine scans and generic patching schedules. Vulnerabilities must be prioritized based on risk context, especially for exposed and privileged systems. Addressing these vulnerabilities swiftly can seal off potential entry points and neutralize high-risk flaws before they are exploited. Kubernetes configurations present another weak spot that demands immediate attention. Publicly accessible Kubernetes API servers, often configured with excessive privileges, provide a tempting target for attackers. Implementing stricter controls over Kubernetes environments such as reducing public access and enforcing role-based access controls can help mitigate these risks.
  • Finally, organizations must take a holistic approach to cloud security to prevent the fragmentation of security practices and the disconnection of tools.