Did you know?

How can today’s cloud services be used for abuse and nefarious activities and how can you protect yourself against this? You can both be a victim and a partner in crime if a malicious activity is launched using your cloud resources.

We trust our cloud service providers for the robust infrastructure services they offer (IaaS or Infrastructure as a Service) but its a mutual trust relationship between the service provider and us being a customer and using the service provider’s services. Its a shared service model, where the cloud provider provides us with the infrastructure to host our application and web hosting needs, but the service providers services end at the infrastructure layer (albeit any other services like application layer firewalls or DNS routing).

It remains our responsibility to ensure our services are not exposed, where malicious actors can use our service as a backdoor to host malicious content or initiate DDOS attacks.

Any activity hosted on a cloud service provider’s infrastructure may carry the service providers signature (like domain name in case of content hosted on S3) and a viewer can perceive this as a trusted source.

You can also be a victim in case a malicious attacker hosts malware on cloud services. Cloud services that host malware can seem more legitimate because the malware uses the CSP’s domain. So we need to be careful trusting any unknown content.

Attacks where malware was hosted on a trusted providers download website has been in news in the past and you do not want to be a victim by hosting such malware, which could tarnish your brand and reputation.

So how do you protect yourself from these latest breed of attacks? You need a partner to entrust your hosted cloud services and ensure all the checks and balances are in place.

Your partners are just a click away. Reach out to us today and have a free evaluation of your current footprint in the cloud and gain trust and knowledge with a peace of mind that your services are protected in the cloud.