Cloud service giants: AWS, Google Cloud Platform, and MS Azure have doubled its threat intelligence. They are working on helping users to identify and respond to malicious activities happening in their public Cloud Server Hosting. But how these platforms are different from one another? What sets them apart in terms of help or harm cloud security?
Brad Geesaman, a cloud infrastructure security consultant, identified what each platform offers, including its strengths and weaknesses. During his Black Hat session, Geesaman stated that detecting malicious behavior is a new outlook on the cloud platforms. He portrayed side-by-side the important security differences in the multiple cloud platforms.
For starters, the competition is getting tough each day. Companies are more focused on shipping features and outsourcing capabilities, such as security. Since the cloud has taken the market by storm, shifting the attack surface. Compared to the increasing features and cloud services, there is a shortage of cloud security experts to meet the needs.
With everything being an API, cloud server hosting changes the perspective about security said, Geesaman. With the scalability that comes with the Cloud Desktop Service, it offers an opportunity to bring out the good behavior but also amplifies the human error.
Credential theft involving phishing, pharming, malware, backdoor tools, or password guessing can still happen. Malicious people can misuse the employees’ credentials after they have left the company. The credential leak is another security issue that happens more often than you think.
People give away their credentials accidentally all the time, said, Geesaman.
When choosing between multiple cloud servers hosting, it is essential to remember that none of them has been long enough in the market and is still growing and changing constantly.
Geesaman asked the same questions from several people regarding the data sources they use, how they operate on the data, how much visibility is provided by the said data, what the services cover, and what is required to validate the detection, cost structure, customization, and partner integration.