Threat Vector by Palo Alto Networks

Dangers of Cloud Misconfigurations

Jan 9, 2025
In this discussion, Margaret Kelley, a Senior Consultant at Palo Alto Networks’ Unit 42, dives deep into the world of cloud security. She highlights the critical dangers posed by cloud misconfigurations that often lead to breaches. Real-world examples illustrate how attackers exploit these vulnerabilities. Margaret also clarifies the shared responsibility model between organizations and cloud providers. Listeners gain practical strategies to tighten cloud defenses, manage permissions effectively, and stay ahead of emerging threats.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Evolving Cloud Attacks

  • Early cloud breaches often involved basic misconfigurations like publicly accessible storage.
  • Modern cloud attacks now exploit cloud-native features, showcasing increased attacker sophistication.
ADVICE

Basic Cloud Hygiene

  • Implement firewalls and network segmentation in cloud environments, similar to on-premise setups.
  • Avoid publicly accessible databases, a surprisingly common and risky misconfiguration.
ANECDOTE

Compromised VM and Stolen Credentials

  • A developer left a publicly accessible virtual machine with a known vulnerability, leading to a breach.
  • The attacker used stolen cloud credentials to create infrastructure for anonymized attacks on other organizations.
Get the Snipd Podcast app to discover more snips from this episode
Get the app