Securing your cloud: What you really need to know

F5 Ecosystem | January 18, 2017

5 MIN. READ

Almost every company is moving to the cloud in some way, whether through planned action or because employees are adopting unsanctioned cloud services. Workers typically adopt cloud services to more efficiently do their job, but they do it without considering the security implications—a concern for business management.

Unfortunately, companies often worry about the wrong issues when it comes to cloud security. Cloud providers, on the whole, do a much better job of securing their services than the average business, so you should not be overly worried about cloud provider security or whether your cloud provider will be hacked.

The most worrisome threat to cloud infrastructure are breaches, which have a variety of causes.

Instead, you should worry about the parts of the cloud that you control. Those concerns will differ depending on which type of cloud your company deploys. Infrastructure as a Service (IaaS) gives you much more control over security but also much more responsibility for it. Software as a Service (SaaS) gives you the least amount of control over security and transfers much of that responsibility to your service provider. Platform as a Service (PaaS) is a mixture of the two.
For these reasons, the model of cloud service you adopt will determine the level of your provider’s responsibility when it comes to security. Here’s what you need to know.

1. Understand the threats to cloud applications and infrastructure

The most worrisome threat to cloud infrastructure is the same as with any other infrastructure: breaches, which have a variety of causes. It is important to recognize that there are different levels of breaches; an attacker who gains access to an administrator account has far more control than one who accesses a limited user account.

For that reason, you should worry more about the administrative and privileged users, and monitor those accounts beyond what is normal for all user accounts. This security threat applies to all types of clouds, since company employees maintain some form of administrator access for SaaS, PaaS, and IaaS infrastructure.

2. Manage identity and access securely

By extension, you should give special attention to the importance of identity and access to securing cloud services. The store for identity and access data should be protected and monitored closely. However, with the average company having to deal with 1,031 cloud applications used by its employees, this cannot be accomplished without having a federated identity management or single sign-on infrastructure.

3. Offset threats to availability

Distributed denial-of-service (DDoS) attacks have become more sophisticated and easier to launch. DDoS-for-hire services, also known as booters or stressers, are readily available to take down networks or websites. And with cloud services becoming more popular, DDoS attacks have become more impactful as well, because the attackers can disrupt critical business services to many companies with a single attack.

In October 2016, for example, a large DDoS attack powered by tens of thousands of digital video recorders, cameras, and home routers targeted DNS provider Dyn, whose customers rely on the service to direct online users to their sites. As a result, many Internet services—including Netflix, Twitter, and PayPal—were disrupted.

You’ll need to determine whether your provider is elastic enough to weather an attack. While many cloud infrastructure providers offer capabilities to increase bandwidth, they often charge for that extra bandwidth during an attack, costing your business enormously. You need to assess at what point it costs too much to keep up with the level of attack and makes more sense to hire a DDoS mitigation service to intercept bad traffic before it gets to your apps.

4. Manage the threats of vulnerabilities

In 2015, a hacker used a vulnerability in antivirus firm BitDefender’s public cloud to steal an unknown number of unencrypted usernames and passwords. Vulnerabilities are no less a threat to cloud infrastructure than they are to on-premises devices and appliances.

Companies must be able to patch in an agile way, which means that operations teams need to know which infrastructure components are vulnerable and have options for managing that vulnerability. Fast patch deployment should be a priority, but virtual patching should also be available to give security teams enough time to fix problems without causing more issues.

Overall, cloud services and platforms tend to be more secure than the average company’s infrastructure owing to service-level agreements and regular updating and patching, so businesses should focus on the aspects of cloud within their control. Companies will find the cloud a much more secure option if they focus on controlling access and credentials, keeping services available, and managing vulnerabilities in the parts of the cloud infrastructure that are under their control.

As a Senior Security Solutions Architect at F5 Networks, Brian McHenry focuses on web application and network security. McHenry acts as a liaison between customers and the F5 product teams, providing a hands-on, real-world perspective. He is a regular contributor on InformationSecurityBuzz.com, a co-founder of BSidesNYC, and a speaker at AppSecUSA, BC Aware Day, GoSec Montreal, and the Central Ohio Infosec Summit, among others. Prior to joining F5 in 2008, McHenry, a self-described IT generalist, held leadership positions within a variety of technology organizations, ranging from startups to major financial services firms.

Share

Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

F5 Silverline: Our Data Centers are your Data Centers
F5 Ecosystem | 06/22/2021

F5 Silverline: Our Data Centers are your Data Centers

Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

The Internet of (Increasingly Scary) Things
F5 Ecosystem | 12/16/2015

The Internet of (Increasingly Scary) Things

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us
Securing your cloud: What you really need to know | F5