BreachExchange mailing list archives

Inevitability of a Security Breach: Assume You're Always Under Attack


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 6 Oct 2014 19:19:46 -0600

http://talkincloud.com/cloud-computing/inevitability-security-breach-assume-youre-always-under-attack

Hardly a week goes by of late without the news of a new vulnerability or a
new breach somewhere. Attackers these days are somewhat indiscriminate.
They'll attack you in the cloud, in the data center or both. The goal is
not always to extract profitable data, but exfiltrate data that can be used
to extract profitable data from some other app. Everything is connected to
everything else these days, after all, and obtaining customer credentials
for a cloud-based marketing app may net the bad guys access to an
on-premise app that can ultimately be the point of injection for malicious
code that opens the door to the network.

The reality of today is that you should assume you are always under attack,
because you probably are. I can visit the log of my home office router
right now, and I guarantee I will find a variety of attacks that have been
successfully detected and rejected. Any organization that tells you they
don't detect and reject thousands of attempted attacks a day is probably
lying.

The question is not if an attack will be successful, but when and how much
damage it will do. The key to mitigating a successful attack is to have a
process to follow when it happens, because eventually it will.

Talking with cloud notable leaders this past week, the conversation turned
to the increasing number of organizations that are carefully weighing the
cost of investing in security solutions versus the benefits of having a
well-defined breach response process in place. Many are moving to focusing
on the response process.

They see the writing on the wall. No one is really safe anymore. Attacks
are constant, and even a blind squirrel will find a nut once in a while.
Orphaned accounts, social engineering, web platform vulnerabilities and a
lack of robust security services available to cloud-hosted applications
only serve to increase the risk and reinforce the need to have a
well-defined security response process in place. Especially with the
constant migration of applications to the cloud.

A recent Tata Consulting survey on the state of cloud application adoption
shows that organizations are increasing their cloud footprint across the
board. While the average remains at about 24 percent and few have reached
critical mass (greater than 50 percent), the reality is that applications
are moving to the cloud more and more frequently. That means more
applications with fewer protections between them and the bad guys. Couple
that with the standard growth of applications — doubling every four years
according to IDC — and the ability to detect and stop every single threat
is nigh unto impossible.

Someone or something will succeed. It's time to start making sure your
response strategy is ready for it.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: