Skip to content

The risks of lack of access protection in cloud environments

The cloud concept is less and less a buzzword and more of a need. Everyone, from application developers, executives, and students, is benefiting from the flexibility and reliability of cloud-based solutions.

Although the cloud has evolved a lot in recent years, there are still risks involved. One of the main concerns of cybersecurity professionals is the protection of access in cloud environments.

The cloud hosts data for thousands and thousands of people – including third parties, employees, and customers – which increases the attack surface. A successful attack can be fatal for many companies, and directly affect business continuity.

In this article, we explore some of the main risks associated with the lack of protection in cloud access. Also, we explain how some basic actions can be strategic to mitigate the risks of lack of management and access protection in cloud environments.

With a little planning, you can effectively mitigate these risks and take advantage of all that the constantly evolving cloud has to offer. Keep reading on and find out what risks you are exposed to due to the lack of protection for cloud accesses.

 

Lack of Governance

Do you have control of the data in your cloud environment? Do you know what information your employees have access to? Do outsourced employees have limited and controlled access to your cloud? The answers to these questions indicate whether your organization has good governance in the cloud or not.

Cloud governance ensures that all actions, from the implementation of a new server to the interactions of systems and data security, are properly managed.

The move from local infrastructures in companies to cloud environments adds layers of complexity to the protection of systems. It also means that more people in your company have the potential to impact these systems. That is why it is essential to develop and maintain a cloud governance model for access management.

By designating who has access to each part of the asset, information, and system management, your governance plan will determine the necessary limits on who can access and impact your infrastructure.

As mentioned earlier, this is especially important considering how easy it is to deploy new servers and other assets in the cloud. The last thing you want is applications and IT initiatives that are not properly managed, impacting your systems architecture and negatively impacting customers and users.

Controlling access to your cloud’s critical assets is essential for a more reliable environment, especially if you outsource software development to other companies.

 

Data Breaches

Data breaches are a major cybersecurity concern as the amount of data transmitted over the internet has been growing exponentially. This continuous transfer of information makes it possible for attackers anywhere to attempt to breach data in almost any company they choose.

What are the main ways in which a data breach can occur? The simplest way to view private data is to steal someone else’s login credentials to enter a system.

To that end, attackers apply a series of strategies to get their hands on the logins and passwords of a company’s employees. This is a big risk associated with the lack of access protection in your cloud because even less-skilled attackers can easily access your company’s data.

Internal threats are also a form of a data breach. These threats involve employees who have access to protected information, deliberately exposing that data, often for personal gain. In that sense, when there is no proper access control to manage what employees and outsourced people do in the cloud environment, this threat can become real.

Access control is a way to minimize risks associated with data breaches, ensuring that your employees have only the minimum access and permissions necessary to do their job.

 

Non-Compliance With Market Laws and Regulations

New laws such as the LGPD (General Data Protection Law) are increasingly demanding the development of a series of procedures for data protection from Brazilian companies. The law should be applied to any organization that performs operations with personal data, such as the collection, transmission, storage, or processing of data from Brazilians…

If your company fits into this segment, it is important to understand how access protection failures in your cloud environment can negatively affect business.

In cases where a breach of personal data occurs and if your company has not taken the required basic protection measures, you may suffer penalties, such as regulatory fines from the LGPD, which can reach 2% of revenues or R$ 50 million reais. Also, when it comes to cloud environments, you need to know where your cloud provider is located.

As an example, if your provider is located in any region of Europe, you should also seek compliance with the GDPR (General Data Protection Regulation) in order not to suffer penalties.

Meanwhile, in the payment methods market, certifications such as the PCI DSS (Payment Card Industry Data Security Standard) determine the importance of access control and management for cloud environments and define strong security policies for protecting customers.

Another example of regulation required by the payment methods market is Bacen’s Resolution 4658. The resolution is meant to guide procedures and controls to reduce cyber vulnerabilities and meet cybersecurity goals in cloud environments. Not complying is not an option for businesses.

 

Your Company and Your Customers at Risk

Cloud providers can guarantee compliance for their infrastructure and environment, but compliance with security and risk mitigation requirements is still entirely your responsibility.

We have already discussed access risks in cloud environments, so it is important to remember what is at risk. A breach of your data or your customer’s data can be devastating, depending on the type of data and the breach extent.

The costs of investigating and resolving a breach, associated legal expenses, and losses to a company’s reputation can be enough to make its business unfeasible.

senhasegura can help your company control risks in the cloud:

  • Fully integrating and implementing two layers of privileged account security: for both the service provider and the customers.
  • Reinforcing administrative access to virtual machines.
  • Incorporating senhasegura into task automation tools to transparently provision new accounts via APIs.
  • Systematically resetting standard passwords as part of the provisioning process.
  • Providing individual responsibility for all privileged user activities.
  • Isolating, monitoring, and recording all sessions.
  • Replacing encrypted and visible application credentials with rotating credentials to improve security.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura 
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Greater than Biblical Genesis: Tentacle Protocol Genesis

Everything Has a Beginning: The Genesis of Tentacle Protocol

You probably know all kinds of remarkable “genesis”: the biblical and canonized, where Adam and Eve have their first Tinder date, the British rock band from the 60s with excellent Peter Gabriel on vocals and Phil Collins on drums, and of course, the Hyundai Genesis, a passenger car manufactured by the South Korean brand Hyundai Motor Company since 2008… But this time, none of them interests us. We’ll leave the trunk capacity of the Hyundai for another day, but not today, today, in our ominous and greenish Pandora FMS Blog, we will talk about an even more important genesis for the history of the beginnings and the startings (drum roll), the beginnings of Tentacle Protocol.

And to talk about the origins of Tentacle Protocol, we had to make an effort to find our colleague Ramón Novoa Suñer, Head of the AI department and Senior Chief Programmer at Pandora FMS, a hero for the company, who has been here for as many years as it exists and that, therefore, houses all the possible knowledge on the matter, right within its experienced and ancient testa.

To find Ramón, we had to undertake a dangerous journey, crossing the icy glacier and the burning desert, traveling day and night without rest, risking our life and our physique, crossing the most spectral swamps and mountain slopes, enduring merciless winds, to finally reach the medieval fortress where he was, always involved in his chores and completely oblivious to the admiration that the world professes him.

Proposing an interview with Ramón was easy, but it took time to carry it out, that’s why I stayed with him as an apprentice. I slept in the highest tower of the castle and devoted myself to absorbing all kinds of technological knowledge that got thrown on me to the ground like little bones. I didn’t want to waste a second spent with him. After all, he is one of the most recognized geniuses in his field. The Dumbledore of programming.

Weeks passed, then years, but finally the long-awaited interview about the origin of the Tentacle Protocol that I longed for and that led me there came. Now I want to share it with you on this blog, as I ride away from the fortress as the voice of Master Ramón still resounds in my head:

Oh Master, what year would you say it was when the Tentacle Protocol was invented?

* Hmm … 2008, if I’m not mistaken, because by now it’s already been a few years… I would say shortly after I finished my degree and started working at Ártica. It still seems to me that it was yesterday, and here we are, more than a decade and a pandemic later…

*Important remark: All of the answers that Ramón gives us, should resonate in your head with the deep voice of a wise hermit, if not, you’re not reading this the right way.

¿Where does that science fiction name come from?

I’m very glad that you asked me that question, little Dim. You see, the Pandora FMS logo at that time was an octopus, so the name seemed like the most appropriate, don’t you think so? It is also a tribute to a popular video game from the 90s. You don’t need me to give you more clues, right? Authentic and pure people, the ones who are really worth it, will know what video game I refer to.

Do you remember who was involved in the project from the beginning?

The idea of the project came from Sancho Lerena, the famous CEO, and I was the developer. Keep in mind that at that time there were only two programmers in Ártica ST. We still had absolutely no idea about the people who would join us in this dream.

From what did the idea of this protocol arise? What is its true origin?

Well, at the very beginning, Pandora FMS agents used SSH or FTP to send data to the server. But users had a lot of trouble configuring these protocols correctly. So we decided to develop a simple protocol that would work without no more additional initial configuration than that of the IP address and the port of Pandora FMS server. Helping and simplifying has always been the purpose of the Tentacle Protocol, and boy did it do well.

What exactly is the Tentacle Protocol?

It is a text protocol (like SMTP or HTTP) to transfer files. The specification is very simple, it is given in our Wiki, the most sacred group of texts that I know, it contains from the Alpha to the Omega of this organization. The Tentacle Protocol is less efficient than a binary protocol, but more readable and easier to debug. Giving it that magic that it has.

What is it for?

Basically send and receive files. The advantage it has, as I mentioned before, is that it is very easy to configure. You don’t even need to specify the destination directory. It also supports slightly more advanced features such as data compression or the use of X.509 certificates.

How important is it for Pandora FMS?

It is essential for transferring XML data files from agents and satellite servers to Pandora FMS server. It is also used to manage remote configuration, file collections, etc. Also, the Tentacle server can work as a proxy.

Is it true that in good hands and used in the right way it could save the world?

If the instructions to save it had to be sent through a TCP/IP stack, I have no doubt.

Let’s fantasize, if you could rename it now, what would you call it?

A) Metal Gear Solid Protocol: Solid Snake you are the boss.
B) Testicle Protocol
C) Tenta-cool protocol
D) Protocol A Feira

E) “Octopus” too, in reference to Doctor Octopus as well.

And that was it for my story of how I managed to find Ramón Novoa at the end of the world and have him explain everything about the genesis of the Tentacle Protocol. I will never forget his hospitality, his erudition, or how the monk’s habit that I wore throughout the training in technological knowledge, there in the tower, was constantly killing my waist.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Number of APT groups exploiting the latest Exchange vulnerabilities grows, with thousands of email servers under siege, ESET discovers

BRATISLAVA, MONTREAL – ESET Research has discovered that more than ten different advanced persistent threat (APT) groups are exploiting the recent Microsoft Exchange vulnerabilities to compromise email servers. ESET has identified more than 5,000 email servers that have been affected by malicious activity related to the incident. The servers belong to organizations – businesses and governments alike – from around the world, including high-profile ones. Thus, the threat is not limited to the widely reported Hafnium group.

In early March, Microsoft released patches for Exchange Server 2013, 2016 and 2019 that fix a series of pre-authentication remote code execution (RCE) vulnerabilities. The vulnerabilities allow an attacker to take over any reachable Exchange server, without the need to know any valid account credentials, making internet-connected Exchange servers especially vulnerable.

“The day after the release of the patches, we started to observe many more threat actors scanning and compromising Exchange servers en masse. Interestingly, all of them are APT groups focused on espionage, except one outlier that seems related to a known coin-mining campaign. However, it is inevitable that more and more threat actors, including ransomware operators, will have access to the exploits sooner or later,” says Matthieu Faou, who is leading ESET’s research effort into the recent Exchange vulnerability chain. ESET researchers noticed that some APT groups were exploiting the vulnerabilities even before the patches were released. “This means we can discard the possibility that those groups built an exploit by reverse engineering Microsoft updates,” adds Faou.

ESET telemetry flagged the presence of webshells (malicious programs or scripts that allow remote control of a server via a web browser) on more than 5,000 unique servers in over 115 countries.

ESET hourly detections for webshells dropped via CVE-2021-26855 – one of the recent Exchange vulnerabilities

Proportion of webshell detections by country (2021-02-28 to 2021-03-09)

ESET has identified more than ten different threat actors that likely leveraged the recent Microsoft Exchange RCE vulnerabilities in order to install malware like webshells and backdoors on victims’ email servers. In some cases, several threat actors were targeting the same organization.

The identified threat groups and behavior clusters are:

  • Tick – compromised the web server of a company based in East Asia that provides IT services. As in the case of LuckyMouse and Calypso, the group likely had access to an exploit prior to the release of the patches.
  • LuckyMouse – compromised the email server of a governmental entity in the Middle East. This APT group likely had an exploit at least one day before the patches were released, when it was still a zero day.
  • Calypso – compromised the email servers of governmental entities in the Middle East and in South America. The group likely had access to the exploit as a zero day. In the following days, Calypso operators targeted additional servers of governmental entities and private companies in Africa, Asia and Europe.
  • Websiic – targeted seven email servers belonging to private companies (in the domains of IT, telecommunications and engineering) in Asia and a governmental body in Eastern Europe. ESET named this new cluster of activity as Websiic.
  • Winnti Group – compromised the email servers of an oil company and a construction equipment company in Asia. The group likely had access to an exploit prior to the release of the patches.
  • Tonto Team – compromised the email servers of a procurement company and of a consulting company specialized in software development and cybersecurity, both based in Eastern Europe.
  • ShadowPad activity – compromised the email servers of a software development company based in Asia and a real estate company based in the Middle East. ESET detected a variant of the ShadowPad backdoor dropped by an unknown group.
  • The “Opera” Cobalt Strike – targeted around 650 servers, mostly in the US, Germany, the UK and other European countries just a few hours after the patches were released.
  • IIS backdoors – ESET observed IIS backdoors installed via webshells used in these compromises on four email servers located in Asia and South America. One of the backdoors is publicly known as Owlproxy.
  • Mikroceen – compromised the exchange server of a utility company in Central Asia, which is the region this group typically targets.
  • DLTMiner – ESET detected the deployment of PowerShell downloaders on multiple email servers that were previously targeted using the Exchange vulnerabilities. The network infrastructure used in this attack is linked to a previously reported coin-mining campaign.

“It is now clearly beyond prime time to patch all Exchange servers as soon as possible. Even those not directly exposed to the internet should be patched. In case of compromise, admins should remove the webshells, change credentials and investigate for any additional malicious activity. The incident is a very good reminder that complex applications such as Microsoft Exchange or SharePoint should not be open to the internet,” advises Faou.

For more technical details about these attacks exploiting the recent Exchange vulnerabilities, read the blogpost “Exchange servers under siege from at least 10 APT groups” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The Future of Network Security: Identity, Segmentation & Securing the Edge

What it takes to properly secure corporate networks in the world of remote work, BYOD & IoT

The workplace has changed thanks to COVID-19. Many of us continue to spend most, if not all, of our workdays at home, juggling Zoom meetings, kids, pets, relationships, cooking, cleaning…you name it. Since at least February 2020, organizations around the world have altered the way they operate – encouraging their employees to stay home, stay safe, but stay available.

On top of the immediate operational challenges that companies faced when shifting to full or hybrid work environments, the rise of remote work in response to COVID-19 has pushed a number of network security shortcomings to the surface. In response, cybersecurity vendors and IT professionals have accelerated the development of and search for solutions to fill these network security gaps.

As we return to the office and arrive in a post-COVID-19 world, these areas will dominate the evolutionary direction of corporate network security…

The Role of Identity

As people, we represent the weakest link in the network security armor. While we may wish we were infallible, we’re really full of bad cybersecurity habits, like weak passwords, forgetting to back up data, or clicking on hyperlinks in emails from strangers. Our identities, however, can also be our strongest means of securing networks. The rise of multi-factor authentication (MFA) identity and access management (IAM) tools is allowing organizations to verify employee identity and authenticate their access to the network in real-time, no matter the employee’s location or whether they’re attempting to connect with a managed or personal (BYOD) device.

Network Segmentation

Segmenting the network is a cybersecurity best practice. Period. For any companies, this practice is even a regulatory requirement (e.g., the Payment Card Industry data security standard (PCI)). Network segmentation is simply a means of dividing up a network into smaller parts, ensuring the right people only have access to the parts of the network that are relevant to them. It is a measure that improves the effectiveness of an organization’s investments in other security tools, and can help to prevent significant damage to critical data across the network after a company has experienced a breach.

Securing the Edge

Gartner introduced SASE a few years ago. It represents a new enterprise networking technology category that converges the functions of network and security solutions into a single, unified cloud service. This marks an architectural transformation, as it allows IT teams to leverage a holistic and flexible service to their businesses. Critical to this budding area is NAC. Specifically, the movement of NAC to the cloud eliminates expensive on-site hardware and hidden maintenance costs. With cloud NAC, like Portnox CLEAR, all that’s needed to control network access across a geographically dispersed network is an internet connection.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

訊連科技將於「2021智慧城市展 Smart City Expo」登場 展示FaceMe®人臉辨識於安控、防疫、金融等解決方案

【2021年03月16日,台北訊】 世界級AI臉部辨識技術開發商訊連科技(5203.TW)將於2021年3月23日至26日於台北南港展覽館舉辦之「2021智慧城市展Smart City Expo」登場,展示最新的FaceMe® Security,可提供身分辨識、門禁管理、出勤、口罩偵測及體溫量測之一站式智慧安控及防疫解決方案。此外,亦於本展中展示專為金融保險業設計的FaceMe® eKYC & Fintech智慧金融解決方案,提供金融或保險業者,利用人臉辨識進行eKYC電子化的身分辨識服務。

訊連科技將於「2021智慧城市展 Smart City Expo」登場 展示FaceMe®人臉辨識於安控、防疫、金融等解決方案

近年來,人臉辨識技術快速進入智慧安控領域。FaceMe® Security解決方案可於現行安控系統中,快速導入人臉辨識功能,除可用作門禁或紀錄員工出缺勤紀錄外,更可辨別VIP或黑名單等特定人士。支援Milestone、Network Optix Nx Witness及VIVOTEK VAST2等VMS影像管理軟體,於偵測到特定人士時,可同步發送事件通知至VMS軟體,方便保全人員監控及管理。

FaceMe® Security於智慧安控場景中提供端對端的解決方案。於邊緣端運行的FaceMe® Security Workstation可運作於工作站、工業電腦及物聯網裝置上,進行即時的人臉偵測及特徵擷取,用作身分比對。以人流來說,於工廠或科技園區等每小時上萬人流的大型場域,可選擇於單一Windows工作站上安裝至多四張的NVIDIA Quadro RTX 5000加速卡。而以數千人的中小型場域,如辦公大樓、零售商場及倉儲,則可運行於NVIDIA Jetson (AGX Xavier或Xavier NX)或採用Intel® Core 處理器或Movidius™ VPU的工業電腦或NUC等設備,降低建置成本及功耗。針對門禁及防疫需求,FaceMe® Security可透過Health Add-On及Check-In Add-On兩款套件,於場域入口建置體溫、口罩偵測站及出勤打卡機。

金融保險業近年來積極布局的Fintech數位轉型,透過生物辨識進行的「eKYC電子化認識客戶」(Electronic Know Your Customer)成為Fintech熱門應用,其中人臉辨識有其相容性高、辨識準確度高及非接觸性等優勢,成為eKYC最主流技術。訊連科技推出的FaceMe® eKYC & Fintech 智慧金融解決方案 ,提供1:1人員核身(人證比對)與1:N身分辨識等功能,可應用於行動網銀、ATM無卡交易、行動投保與人員進出管理等,透過人臉辨識可更快速、安全的核實用戶身分,並將臉部特徵建檔供作後續服務應用。透過人臉辨識簡化身分認證流程,有效提升客戶體驗。

訊連科技FaceMe®人臉辨識引擎,在全球知名NIST人臉辨識評比中,準確度為扣除中、俄廠商後,全球排名第一的人臉辨識開發商。訊連科技將於於2021年3月23日至26日登場之「2021智慧城市展Smart City Expo」中,針對智慧金融、智慧安控和防疫需求,展示多項最新AI科技與應用解決方案。

2021智慧城市展 Smart City Expo
活動期間:110年 3 月 23 日(星期二)至 3 月 26 日(星期五),共四日。
展出時間:上午10時至下午6時 (最後一日參觀至下午5:00)
活動地點:台北南港展覽館2館1樓 (115台北市南港區經貿二路2號)
訊連科技攤位編號:Q701

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×