Controls

Intentionally Insecure: Poor Security Practices in the Cloud

Cloud-based breaches that expose our personal data are growing at a surprising rate as organizations intentionally degrade their cloud-based security controls.
By Lori Mac Vittie (additional contributions by Sara Boddy)
March 07, 2019
5 min. read

I’m writing this on the last day of February 2019. So far this year, there have been five documented cases of organizations exposing their private data due to misconfigured S3 buckets or cloud databases.

Wait, let’s fix that: due to intentionally configured S3 buckets and cloud databases. The distinction is important. In order to allow the kind of access necessary for unauthorized users to view S3 buckets or access databases, someone has to intentionally remove or degrade the default security guards placed on them.

To call them misconfigured implies a mistake, the kind that everyone makes from time to time and can be forgiven. But these are not mistakes. These resources have been intentionally opened up to allow access to just about anyone.

F5 Labs researchers combed through lists of organizations whose cloud resources have been exposed since 2017 due to intentional insecurity. The growth rate from 2017 to 2018 was an alarming 200%. So far in 2019, with an average of 2.5 breaches per month, we would expect to see a total of 30 breaches by the end of 2019. Yet, the 2017-to-2018 growth rate tells us that our estimate for 2019 is probably far too low. If the 200% growth rate were to continue, we’d expect to see as many as 90 cloud security breaches in 2019. What's worse is that we're sure that our compiled lists of organizations are only scraping at the top of the barrel.

This is not acceptable. Not only is private data exposed, some of the data has the potential for very real, very damaging repercussions for those to whom the data actually belongs. You. Me. The guy in the next cube. The woman getting off the bus. The teen readying for college. Here are just a few breach examples:

  • In 2017, a credit repair service exposed its customers data.1 How long do you think it took for predatory scammers to find that and exploit those whose only crime was trusting a company to help them repair their lives?

  • In 2018, a home security system used the same hard-coded keys on devices as it did for its AWS storage server,2 where recordings detailing home layouts were sent. How long do you think it took criminals to find and exploit the intimate details or occupancy patterns they were able to discover about customers' homes?

  • Most recently, a data analytics company servicing financial organizations leaked 24 million US loan records via an exposed database with no password.3 No doubt predators, scammers, and identity thieves threw a party to celebrate.

No industry is left out of the growing list. From governments4 to service providers,5 from manufacturing6 to politics,7 from finance8 to entertainment,9 every industry has an entry in the “Who Can Lose the Most Data Due to Poor Security Practices” contest. It's a contest no one should want to win—or even enter in the first place.

We are firmly entrenched in the digital economy. The bits and bytes that fuel it don't just represent dollars or yen or pounds. They represent people. People who are actually impacted by these breaches in ways we may never know, because it doesn't get reported.

How and Why is this Happening?

Why would someone intentionally compromise their security when configuring S3 buckets and cloud databases, making them public-facing? In our experience, the culprits are rarely on the operations side:

network engineers, database administrators, systems engineers, and security engineers would know better than to do this.

  • Network engineers, typically responsible for managing access to systems over the network and determining which systems are pubic-facing, would not generally allow a database to be public-facing.

  • Database administrators, typically responsible for managing database access and account permissions, would not allow databases to be accessed without requiring authentication. They would take on enterprise password policies with standard complexity requirements and not allow weak passwords.

  • System engineers, typically responsible for managing applications to the defined hardening standards, would manage a web server in front of the public-facing database and would ensure its was properly secured with a web application firewall.

  • Security engineers would normally conduct independent assessments of all systems and the network to ensure compliance with the security policy.

More often, the product development side might decide not to incorporate already-existing security features—in many cases because they don’t want to disrupt the revenue stream, either by pushing back the timeline or potentially introducing new bugs.

Moving to the cloud enables developers to circumvent traditional enterprise IT roles that are obviously needed, considering the growing number of cloud breaches. That sets up the perfect storm for devs to deploy systems with poorly-configured security features, not because they want to, but because they might not understand the consequences or they might assume that a breach is unlikely to happen.

What You Can Do to Avoid Cloud Breaches

How do we fix this problem? No one is suggesting we go back to long, extended delays in deploying systems (a common dev complaint). At the risk of doing time in Buzzword Jail for this, maybe as an industry we should start talking about DevSecOps as a discipline to infuse good security practices into development. All teams clearly need to be included in the conversation. Only limited security reporting is available in default cloud deployments: there are no trusted network engineering or systems engineering teams from which to request a list of subnets and ACLs, and no Active Directory groups and permissions. In most public clouds, organizations need to buy third-party cloud security auditing tools to produce the reports the security team would normally have gotten from their internal counterparts.

Yes, security is hard. Yes, security sometimes slows things down. But intentionally ignoring or degrading security because it's more convenient or speeds up the process is simply unacceptable and quite possibly unethical. Real people can be impacted, and not just financially. That's real people, not just the digital incarnations they entrust to companies on a daily basis.

It's time to stop referring to these exposures as the result of misconfiguration and start calling them what they are: intentional and deliberate insecurity. More importantly, InfoSec professionals need to call out these poor practices more firmly. Perhaps with a reminder that poor security practices impact people and not just the processes they're used to avoid or circumvent.

Join the Discussion
Authors & Contributors
Lori Mac Vittie (Author)
Prinicipal Technical Evangelist
Sara Boddy (Contributor)
Footnotes

1 https://www.upguard.com/breaches/credit-crunch-national-credit-federation

2 https://techcrunch.com/2018/12/27/guardzilla-security-camera-flaws/?mc_cid=e39f74a005&mc_eid=1d548fda2d

3 https://techcrunch.com/2019/01/23/financial-files/

4 https://thehackernews.com/2019/01/oklahoma-fbi-data-leak.html

5 https://www.upguard.com/breaches/verizon-cloud-leak

6 https://www.businessinsider.com/hackers-teslas-amazon-cloud-to-mine-cryptocurrency-2018-2

7 https://www.upguard.com/breaches/aggregate-iq-part-four-canada

8 https://www.upguard.com/breaches/cloud-leak-alteryx

9 https://www.forbes.com/sites/thomasbrewster/2017/07/06/massive-wwe-leak-exposes-3-million-wrestling-fans-addresses-ethnicities-and-more/#d70e3f775dd4

What's trending?

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read