Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Multi-Tenant and Cross-Tenant Threats in Google Cloud and Beyond
Cloud Computing

Multi-Tenant and Cross-Tenant Threats in Google Cloud and Beyond

Last updated: September 25, 2024 10:24 am
Published September 25, 2024
Share
Multi-Tenant and Cross-Tenant Threats in Google Cloud and Beyond
SHARE

Principal Entry Boundary, a brand new function of the Google Cloud Platform, won’t have made it to the agendas of CISOs and senior IT managers. However it may assist mitigate elementary cloud workload (and SaaS) safety dangers: id and entry administration (IAM)-enabled knowledge exfiltration paths that bypass all community safety mechanisms resembling firewalls.

The continuing cloudification of workloads brings new challenges for IAM past the 2 conventional ones, i.e., enabling staff (and clients and companions) to entry firm sources whereas blocking cybercriminals. A company’s engineers and staff want entry to the group’s cloud sources for his or her every day work. Roles and rights configurations within the IAM answer outline which particular person staff, exterior companions, clients, or customers can entry which useful resource (Determine 1, A). The IAM blocks customers or intruders with out explicitly granted entry (Determine 1, B), even when they’re within the firm perimeter past community firewalls or extra subtle safety features resembling VPC service controls in GCP or Personal Hyperlink in Azure.

New Information Exfiltration Paths within the Cloud

Nonetheless, within the cloud and SaaS worlds, two new knowledge exfiltration paths and paths for smuggling malware into a corporation exist: cross-tenant and multi-tenant entry.

Associated:Essential Cybersecurity Abilities for Immediately’s IT Execs

Determine 1: The 4 cloud entry challenges

Assume an worker has an organization account and a private account with a cloud or SaaS supplier – fairly a typical state of affairs for engineers working with the Azure cloud and utilizing M365 within the workplace and at dwelling. Then, the worker can add delicate firm R&D paperwork to their private M365 account or a SharePoint account managed by overseas companies. In Azure or Google Cloud, they may entry their firm’s cloud storage and switch buyer lists and order histories to cloud storage managed by cybercriminals (Determine 1, C).

See also  Cloud cost management is not working

Stopping such site visitors is usually unimaginable on the community stage since many cloud companies don’t incorporate the tenant data into the URL, as Determine 2 illustrates for GCP cloud storage. Thus, URLs, no firewall or egress proxy understands whether or not an worker accesses an organization or a non-company tenant. So, blocking undesirable site visitors on the perimeter will not be an possibility. The one answer: cloud or SaaS suppliers implement a tenant restriction functionality.

GCP_cross-tenant-threats_Figure2.png

Determine 2: Pattern configuration for a cloud storage bucket. Neither the identify nor the URL signifies which GCP tenant the information belongs to

A Nearer Take a look at Tenant Restrictions

IP filtering is the poor man’s tenant restriction variant. Smaller suppliers with few clients typically implement this sample. They could limit entry to tenant «Germany-Southwest-43» to requests originating from the IP vary 131.246.0.0/16, for instance.

Associated:SSH-Keygen Necessities: Methods to Generate and Handle SSH Keys

IP filtering doesn’t scale and causes operational challenges. For instance, IP adjustments end in blocked entry. Thus, bigger suppliers resembling Google or Microsoft assist a sample with organizational restriction headers. When a person submits an HTTP request (Determine 3, 1), the shopper group’s egress proxy provides a listing of acceptable tenants to the request (2) earlier than forwarding the request to the cloud supplier (3). Then, the cloud supplier checks whether or not a person tries to log in to a tenant on the enable record of the group restriction header (4).

GCP_cross-tenant-threats_Figure3.png

Determine 3: Implementing tenant restriction for Cloud and SaaS companies with group restriction headers

Even with tenant restriction in place, one essential knowledge exfiltration (or ingress) path in cloud environments stays open: cross-tenant entry, i.e., a principal (aka, a private or technical person) in a single (GCP) cloud tenant accesses sources in a (malicious) second (GCP) tenant with out involvement of end-user units like laptops.

See also  Intel hit with security probe in China as tech war escalates

Within the pre-cloud period, CISOs by no means nervous that somebody would grant their engineers entry to the Financial institution for Worldwide Settlement’s on-prem databases in Basel. The financial institution would by no means do this. Within the cloud, nevertheless, CISOs want to fret about unsolicited entry granting to M365 sources or Google Cloud Storage. It’s a new assault path for cybercriminals.

Associated:Cybersecurity Acronyms Cheat Sheet

However earlier than demonizing cross-tenant/group/subscription interplay options (the wording at all times differs barely), even safety specialists should perceive their advantages. Suppose I run a web based store and have my workload and knowledge in a single GCP challenge. My financial institution runs its workload on GCP as nicely. So, why not work together straight throughout the GCP ecosystem? It’s riskier if the financial institution and the net store work together through the web with all of the authentication and lost-credential subjects (Determine 4, A).

GCP_cross-tenant-threats_Figure4.png

Determine 4: Understanding cross-tenant/group entry safety threats

Mitigating Multi-Tenant and Cross-Tenant Threats

After the advantages, let’s deep-dive into the safety threats. A person named Tom works for a web based store. He has entry to a delicate buyer record. Assume that Tom turns prison or that cybercriminals hack his Google Cloud account. Now, the attackers (or Tom himself) grant Tom’s account entry to a cloud storage bucket «unhealthy issues solely» in a GCP group used for cybercrime actions (Determine 1, B).Now, utilizing the «Tom» account, cybercriminals can exfiltrate the shopper record by transferring it to the storage account «unhealthy issues solely» (C). Plus, they may add malware to Tom’s account (D) and set up it on all VMs in GCP to which Tom has entry. If additionally they handle to interrupt into Tom’s electronic mail inbox, the cybercriminals can unfold the malware to all his inner and exterior contacts (E). No conventional safety community safety mechanisms resembling firewalls, proxies, or DLP detect the site visitors between Tom’s GCP account and the cybercriminals’ storage account «unhealthy issues solely.»

See also  Build or buy cloud-based generative AI?

The brand new GCP function, Principal Entry Boundary (PAB), mitigates these dangers by complementing conventional IAM with specific whitelisting. At PAB’s coronary heart are Principal Entry Boundary Guidelines, that are collections of Google Cloud sources. Coverage Bindings apply these guidelines to units of Google Cloud Principals. Afterward, these principals can entry sources provided that they meet two situations:

  • The useful resource proprietor should grant them entry through IAM (as of at the moment), and

  • the principal’s group should approve and whitelist entry with PAB guidelines and bindings (the brand new situation).

Determine 5 illustrates the idea, which, if consequently utilized, prevents Tom from being granted entry to sources within the cybercriminal’s GCP group, thereby successfully blocking this assault path.

GCP_cross-tenant-threats_Figure5.png

Determine 5: Understanding Principal Entry Boundary within the Google Cloud Platform

To conclude and emphasize the important message: Google Cloud’s Principal Entry Boundaries idea will not be a safety hotfix for a particular GCP vulnerability. As a substitute, it addresses a typical safety problem associated to cross-tenant entry, one of many vital dangers rising from the cloudification of workloads. Together with the better-known tenant restriction matter, it calls for the eye of safety and danger professionals. They should consider their important platforms to find out if these dangers exist – and whether or not they exceed their group’s danger urge for food. In that case, they should mitigate them – and this won’t be as simple for all platforms as it’s with GCP. So, use this new GCP function as a wake-up name.



Source link

Contents
New Information Exfiltration Paths within the CloudA Nearer Take a look at Tenant RestrictionsMitigating Multi-Tenant and Cross-Tenant Threats
TAGGED: cloud, CrossTenant, Google, MultiTenant, threats
Share This Article
Twitter Email Copy Link Print
Previous Article Successful Corporate Top CEO HPE Aruba boosts observability, third-party management capabilities
Next Article Mark Lockett, SS&C Blue Prism: Enhancing human capabilities with digital workforces Mark Lockett, SS&C Blue Prism: Enhancing human capabilities with digital workforces
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

OpenCUA’s open source computer-use agents rival proprietary models from OpenAI and Anthropic

Need smarter insights in your inbox? Join our weekly newsletters to get solely what issues…

August 23, 2025

Attackers probing backdoor flaw in popular Cisco Smart Licensing Utility, warns SANS

Backdoor secrecy The hardcoded password flaw, recognized as CVE-2024-20439, could possibly be exploited to attain…

March 22, 2025

Anthropic confirms it suffered a data leak

It’s been an eventful week for AI startup Anthropic, creator of the Claude family of…

January 29, 2024

ECL reveals 1 GW off-grid, hydrogen-powered AI Factory data centre

Information Heart-as-a-Service pioneer ECL, which unveiled the world’s first off-grid, sustainable, modular, built-to-suit information heart…

September 27, 2024

Non-Habitual Resident Program in Portugal: Quick Explanation

Increasingly US residents determine to stay and work overseas. Portugal is likely one of the…

May 3, 2024

You Might Also Like

Alphabet boosts cloud investment to meet rising AI demand
Cloud Computing

Alphabet boosts cloud investment to meet rising AI demand

By saad
On how to get a secure GenAI rollout right
Cloud Computing

On how to get a secure GenAI rollout right

By saad
Snowflake and OpenAI push AI into everyday cloud data work
Cloud Computing

Snowflake and OpenAI push AI into everyday cloud data work

By saad
Klarna backs Google UCP to power AI agent payments
AI

Klarna backs Google UCP to power AI agent payments

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.