By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
Airbnb, Netflix, Twitter, Uber, and Shopify are just some of Twilio’s customers who integrate its voice and text capabilities into their platforms. The impact of the modified code was to display malicious ads on consumers’ browsers, and it seems to have been part of a larger hack, searching for vulnerabilities on the Amazon platform.
According to an IT World Canada article, 99% of cloud breaches are the result of configuration errors.
In reading the article, two thoughts came to mind: governance/oversight and response capability. Anyone whose been in the trenches for any length of time knows that when outsourcing any part of your business, and especially IT, whether through cloud or managed services, you must consider the skills and staffing needed to properly oversee the quality and integrity of your service. In fact, you must even consider how your teams’ skills will remain fresh and current to ensure the oversight is of sufficient quality to protect your business.
You can never outsource accountability. Just because a big name like Amazon is attached to your solution does not mean that the implementation will meet expectations. Consider asking yourself, do you have a checklist of requirements, standards, test methodology, and ongoing validation that the environment is configured properly? Is your managed services vendor really providing the services that you believe you contracted them to provide? Finally, do you have alert and response capabilities that meet the risk and customer expectations. In Twilio’s case, it took eight hours following notification to reverse the configuration error. The more interconnected we become, the more we need clear delegations of responsibility and oversight as well as response plans for the inevitable.
Review your cloud strategy in detail. To understand the number of cloud sites accessed by your company, consider investigating cloud access security brokers.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to ensuring that you don’t inadvertently introduce new risks through this dynamic channel.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.
I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at Onspring to discuss the product audience and upcoming features.