Securing public cloud in the age of remote working

Must Read

How to choose an effective DDoS mitigation plan

There are several flavours from which to choose when selecting an effective DDoS mitigation strategy. Most enterprises opt for one of the cloud protection flavours (always-on or on-demand)

How tech bolster security of online gaming platforms

The rise of and is evident throughout the world’s financial capitals with the UK, US, and a few other European nations at the forefront

Explained: The evolving nature of cybersecurity threats

Concerns such as hacking and the presence of computer viruses have existed for decades in one form or another. As technology evolved over the years, so did the   threats themselves.

Working remotely is todays  new normal in order to stay safe and maintain business continuity due to the pandemic. While shifting to remote work allows organizations to carry on, there is a downside: Remote employees are not protected by security controls that are typically available when working in the enterprise network. Indeed, the probability of stolen credentials, public exposures, and compliance breaches increases significantly when working remotely.

Organizations need an automated mechanism to ensure business continuity, by securing their cloud environment and aligning with cloud security best practices.

Why Is It Harder to Secure Public Cloud Environments These Days?

As more and more employees , the possibility of public cloud breaches increases, due to:

Increased probability of compromised credentials. Home networks are less secure than corporate ones, which can lead to a compromise. For example, there may be multiple devices on any given home network and if one is infected, or the router is insecure, chances of compromised credentials increase. This is compounded by increased internet usage by other family members, who may not adhere to proper security protocols.

Increased probability of exposed assets. Dev and DevOps teams might take shortcuts to allow access to different assets, such as machines and databases, and inadvertently expose them to the internet. Human error plays a large role here; for example, if access was supposed to be granted to an employee’s home network but was instead granted to a much wider network or to the whole internet.

Excessive permissions. Similarly, excessive permissions – which are the #1 cloud threat – can be given to different entities in the cloud, which can cause a larger breach if those credentials are misused by the user or stolen.

Also Read | Top 3 business verticals most targeted by bad bots

Lack of visibility. In light of the massive shift in the way people are now working, it’s more important than ever to gain better visibility of security posture, public exposure, compliance breach and misconfigurations.

5 Best Practices for Cloud Security for Remote Workers

Despite these challenges, not all hope is lost. There are several ways in which organizations can help enable remote workers to do their tasks in the cloud – securely:

  • Enable multi-factor authentication for users with Console access and for the root user
  • Make sure no inactive users are available, and that you follow the least privileges principle by revoking permissions for users with IAM policies that allow full *:* administrative privileges
  • Enable relevant cloud logs (e.g., CloudTrail/Activity logs) in all regions of the account
  • Make sure you’re aware of all assets exposed to the public (machines/storage/databases)
  • Make sure you’re aware of security groups which allow ingress from

Also Read | Excessive permissions biggest threat to cloud security

The right cloud protection is critical in these exceptional times. For example, with ’s Cloud Workload Protection service, you can get a detailed report which will allow you to get visibility into your cloud configuration and:

  • Strengthen your users’ authentication
  • Prevent and detect public exposure of different cloud assets
  • Reduce attack surface by detecting users and roles with excessive IAM permissions
  • Ensure your logging configuration is correct to get a better visibility of your public cloud
  • Detect network and cloud native attacks

The author is Managing Director-India, SAARC & Middle East at Radware. Views are personal.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

Leave a Reply

*The moderation of comments is automated and not cleared manually by Embedding of any link and use of abusive or unparliamentary language are prohibited.
- Advertisement -

Latest in TECH

Sapience Analytics signs distribution agreement with Redington

Sapience Analytics and Redington said that they have entered into a distribution agreement where latter will resell the Sapience Vue solution through its network of over 30,000 channel partners, system integrators, and value-added resellers countrywide.
- Advertisement -SAP Hana

Related Articles