Cloud Security

The concept of public clouds has revolutionized the way businesses deploy their IT infrastructure. Cloud providers such as AWS, Google Cloud and Microsoft Azure have evolved their offerings over the years to meet every possible requirement.

Get In Touch Now

Whether it’s a business enquiry, security crisis or if you think you’ve got the skills to join us – we’re always listening and we’d love to hear from you.

Statistics of Cloud Breaches

The COVID-19 pandemic had a profound impact on the economy, social life, and the way we work. With so many employees working from home, the crisis forced organizations to put a bigger focus on cloud security solutions, to mitigate mounting cloud security threats.

Some of the most catastrophic security breaches in recent years were a result of lacking cloud security. This trend will continue as long as the companies do not improve their defenses. Gartner recently updated its cloud security assessment, concluding that by the year 2025, 99% of failures in cloud security will be a result of security issues on the customer side, not the cloud provider side.

According to a survey by Ermetic, nearly 80% of businesses have experienced at least one cloud data breach in the last 18 months, while 43% of businesses report more than 10 breaches.

According to the 300 CISOs surveyed, the three biggest causes of breaches were:

  • Security configuration errors (67%)
  • Lack of adequate visibility into access settings and activities (64%)
  • Identity and access management (IAM) and permission errors (61%)

Additional findings from the report:

  • Top priorities for cloud security are compliance monitoring (78%), authorization management (75%), and security configuration management (73%).
  • Top priorities for cloud access are maintaining confidentiality of sensitive data (67%), compliance (61%) and providing the right level of access (53%).

Over time, these cloud platforms have become very complex environments, where even the most experienced architects struggle to cope with all the granular parameters and settings. A single wrong setting, one misconfiguration could cause the entire system to be compromised and this can cause millions of dollars worth of damages to businesses.

As a testimonial to the complexity of such systems, there are dedicated job roles to managing AWS, GCP or Azure Cloud Platforms, and now there are similar job roles dedicated toward securing these platforms.