If the last 18 months have taught us anything about cybersecurity, it’s that moving work environments and software supply chains to the cloud has attackers proverbially gunning their engines. Attack vectors like ransomware and N-day attacks are causing security leaders to respond quickly and more creatively to the all-too-common risk of being blindsided by surprises like the recent Log4j incidents, as reactive tools can only help you address vulnerabilities that you already know, not the ones you don’t.
The Enterprise Strategy Group has found that the average organization’s attack surface is 40% “unknown”–and that was before the pandemic created a long tail of security debt from hastily built hybrid work environments on vulnerable or misconfigured cloud services. Researchers at Palo Alto Networks recently found that after setting 320 honeypot nodes comprising common tools — SSH, Samba, Postgres, and RDP — across public cloud infrastructure, 80% of those nodes were compromised within 24 hours, and all of them were compromised within one week.
The uptake of cloud data warehouses and cloud data lakes, adoption of cloud-native web applications using containers and microservices, and reliance on new identities, tokens, and APIs–all staples of the modern software supply chain powering digital transformation, and many based on open source code–expand and complicate the attack surface exponentially. (APIs are particularly vulnerable; per Gartner, by 2022, 90% of cloud apps will be more vulnerable to attacks through APIs than human-facing UI.) CISOs and corporate boards get grim reminders of this material risk over and over, with Log4j and its Log4Shell exploit being just the latest example.
In some organizations, automated tools have been thought to be the sole answer, especially given the chronic shortage of cybersecurity professionals. However, automation is no silver bullet; attackers have access to the same tools and supplement them with domain knowledge, creativity, and intuition. They can uncover new vulnerabilities before scanners do because automation can only help detect risks that have already been observed in the wild–and when they do, the results are incredibly noisy and may not be comprehensive. (The Log4j vuln is an example that, due to deep inter-dependencies, can easily evade scanners.) New, previously unseen vulnerabilities types, many of them critical, appear at the same rapid pace that new cloud applications are written, evading automated tools until they can adapt to those new risks.
Instead, cloud security requires the augmentation of the existing ecosystem of automated tools with a proactive, platform-powered approach that has these key characteristics:
The Bugcrowd Security Knowledge Platform uniquely orchestrates all of the above to defend against blindside cloud security attacks with proactive solutions spanning Penetration Testing-as-a-Service, Vulnerability Disclosure, Bug Bounty, and Attack Surface Management. For example, traditional, time-bound penetration testing approaches are not built to address the rapid pace and agility common to cloud services and cloud-native applications. Continuous pen testing-as-a-service, augmented by an incentivized crowd, offers a more comprehensive approach compared to running annual/infrequent pen tests. Bugcrowd cloud pen tests can be deployed against AWS, Azure, Google Cloud, and virtually any other environment to find ~70% more vulnerabilities than you would find using other methods, per IDC.
Complementing pen testing as a service with other solutions (see below) provides the broad, deep coverage that defends against blindside cloud application attacks:
Cloud application security requires an approach that goes beyond the status quo, and certainly beyond checkbox compliance–the risk of doing anything else is far too high. Learn more about how the Bugcrowd Security Knowledge Platform uniquely addresses that risk here.