Most cloud resources drift from secure configuration baseline after deployment

By GIXnews

Many organizations are automating their cloud infrastructure deployments through code. This allows them to establish a secure configuration baseline early in their DevOps lifecycle, but the security posture of most cloud resources later drifts due to undocumented changes that often remain undetected.

[ Follow these 5 tips for better cloud security. | Get the latest from CSO by signing up for our newsletters. ]

A new study from cloud security company Accurics found that in as many as 90% of cases the configuration of cloud resources was modified by privileged users after deployment. While many of those changes might have legitimate business reasons, others might be the result of malicious lateral movement activities following compromises. Insecure configurations are the top cause of data breaches involving cloud resources and cloud-hosted data. If they’re not detected and left unaddressed, they can be an easy entry point for attackers.

To read this article in full, please click here

Source:: IT news – Security