Executive Summary: Unit 42 Cloud Threat Report › system › files › v2-final... · groups...

2
Unit 42 by Palo Alto Networks | Cloud Threat Report, Spring 2020 | Execuve Summary 1 Over the last 18 months, we’ve witnessed a radical shiſt in how DevOps teams are building their cloud infrastructure. Organizaons are rapidly adopng IaC as they aempt to automate more of their build processes in the cloud. When teams move to IaC, they are avoiding the manual creaon and configuraon of infrastructure in favor of wring code. Although IaC is not new, many organizaons are adopng it for the first me, which means new risks. Our research indicates that while infrastructure as code (IaC) offers security teams a systemac way to enforce security standards, this powerful capability remains largely unharnessed. Summary of Key Findings Why It Maers It only takes one misconfiguraon to compromise an enre cloud environment. Just like when you forget to lock your car or leave a window open, aackers use misconfiguraons to weave around defenses. Without secure IaC templates from the start, clouds are ripe for aack. Why It Maers Unencrypted data is like having a house with glass walls. Encrypon prevents aackers from seeing and reading stored informaon. It’s also a requirement for many compliance standards. Vistaprint and MoviePass highlight the impor- tance of encrypng databases. Why It Maers When storage logging is disabled, malicious actors from CloudHopper to FancyBear could enter the stor- age system, and no one would ever know. Storage logging is crical when aempng to determine the scale of the damage in cloud incidents such as the US voter records leak or the Naonal Credit Federaon data leak. Why It Maers Cyber crime groups are using the cloud for “cryptojacking”. Adversary groups likely associated with China, including Rocke, 8220 Mining Group and Pacha, are stealing cloud resources. They are mining for Monero, likely through public mining pools or their own pools. Executive Summary: Unit 42 Cloud Threat Report Pung the Sec in DevOps of Pacha cryptocurrency traffic is desned for China 93% 43% of cloud databases are not encrypted 60% of cloud storage services have logging disabled 200K insecure templates in use Nearly

Transcript of Executive Summary: Unit 42 Cloud Threat Report › system › files › v2-final... · groups...

Unit 42 by Palo Alto Networks | Cloud Threat Report, Spring 2020 | Executive Summary 1

Over the last 18 months, we’ve witnessed a radical shift in how DevOps teams are building their cloud infrastructure. Organizations are rapidly adopting IaC as they attempt to automate more of their build processes in the cloud. When teams move to IaC, they are avoiding the manual creation and configuration of infrastructure in favor of writing code. Although IaC is not new, many organizations are adopting it for the first time, which means new risks.

Our research indicates that while infrastructure as code (IaC) offers security teams a systematic way to enforce security standards, this powerful capability remains largely unharnessed.

Summary of Key Findings

Why It Matters

It only takes one misconfiguration to compromise an entire cloud environment. Just like when you forget to lock your car or leave a window open, attackers use misconfigurations to weave around defenses. Without secure IaC templates from the start, clouds are ripe for attack.

Why It Matters

Unencrypted data is like having a house with glass walls. Encryption prevents attackers from seeing and reading stored information. It’s also a requirement for many compliance standards. Vistaprint and MoviePass highlight the impor-tance of encrypting databases.

Why It Matters

When storage logging is disabled, malicious actors from CloudHopper to FancyBear could enter the stor-age system, and no one would ever know. Storage logging is critical when attempting to determine the scale of the damage in cloud incidents such as the US voter records leak or the National Credit Federation data leak.

Why It Matters

Cyber crime groups are using the cloud for “cryptojacking”. Adversary groups likely associated with China, including Rocke, 8220 Mining Group and Pacha, are stealing cloud resources. They are mining for Monero, likely through public mining pools or their own pools.

Executive Summary:Unit 42 Cloud Threat ReportPutting the Sec in DevOps

of Pacha cryptocurrency traffic is destined for China

93%43%

of cloud databasesare not encrypted

60%

of cloud storage serviceshave logging disabled

200Kinsecure templates in use

Nearly

3000 Tannery WaySanta Clara, CA 95054

Main: +1.408.753.4000Sales: +1.866.320.4788Support: +1.866.898.9087

www.paloaltonetworks.com

© 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. unit-42-cloud-threat-report-spring-2020-es-020420

In our previous report, we noted that organizations need to do a better job of centrally monitoring and enforcing cloud configurations. Outside of IaC templates, in the months since our last report, we observed that organizations have been slow to make improvements. In fact, it would appear that many are unfortunately moving in the wrong direction.

Biggest Changes Since Our Last Report

Why It Matters

Exposing SSH servers to the entire internet is a risky practice. Attackers actively target SSH services as they provide remote access to cloud environments. Security teams should focus on moving away from trust-based access models like accounts and passwords. “Never trust, always verify” embodies a Zero Trust-based approach. It’s concerning that this service’s exposure is on an upward trend.

Why It Matters

Pick your poison: RDP or SSH. When publicly exposed, either of these services allows attackers to knock on your front door when they shouldn’t even know it’s there. Researchers recommend strongly against directly exposing RDP to the public internet. Many alternatives now exist, such as Azure® Bastion, a PaaS service offered by Microsoft. The alarming upward trend is something to watch closely between reports.

Why It Matters

TLS v1.1 was abandoned in 2008 due to increased vulnerability to attacks. In addition to violating compliance requirements such as PCI DSS, organizations are putting their customers’ data at risk. Having this number on a downward trend is good news for customer security and privacy.

Get and MaintainMulti-Cloud Visibility

It is very difficult to secure what is not visible or known. Security teams must take the lead in advocating for cloud native security platforms (CNSPs), which provide visibility across public and private clouds in addition to containers, serverless, and CI/CD pipelines.

Enforce Standards

Cloud-scale security requires strict enforcement of standards across public, private, and hybrid cloud environments. If your organization does not yet have a cloud security standard, check out the benchmarks created by the Center for Internet Security (CIS).

Cloud Security Best Practices

Shift-Left

Shift-left security is about moving security to the earliest possible point in the development process. Work with DevOps teams to get your security standards embedded in IaC templates. This is a win-win for DevOps and security teams.

Download the full report

of organizationsexpose SSH (port 22)

76%

20%of organizations

expose RDP (port 3389)

69%

30%of organizations use outdated versions

of Transport Layer Security (TLS)

27%➜

34%