Saturday, 24 May 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > The Silent Revolution in Cloud Security
Cloud Computing

The Silent Revolution in Cloud Security

Last updated: July 17, 2024 1:42 pm
Published July 17, 2024
Share
The Silent Revolution in Cloud Security
SHARE

Service accounts and automation are the lifeblood for effectively working cloud knowledge facilities and working enterprise processes – and GCP is one vendor making an modern transfer on this space. It is available in an unusual, not-attention-seeking e mail about some coverage change to its clients. A brand new setting permits customers to configure how GCP reacts when a non-public service account key leaks. Is that this the beginning of a bigger shift in how distributors strategy cloud safety? Understanding the importance first requires some background.

Service Accounts Fundamentals

Service accounts are a necessity for automation in each utility structure and knowledge middle. After proving their id, they permit functions and scripts to entry (cloud) sources. GCP gives varied authentication choices for service accounts, akin to identities connected to sources (e.g., VMs), Workflow Identification Federation, or service account keys. Google actively warns towards utilizing the latter (Determine 1), although they’re a necessity for some use instances, particularly for entry outdoors of GCP and/or the corporate’s perimeter. So, GCP has such a function (2).

Determine 1: Creating and managing entry keys for service accounts within the Google Cloud Platform

Service account keys are as safe (or barely safer than) person/password mixtures. Nevertheless, over the latest years, all of us discovered that securing person accounts with just one issue is insufficient. Attackers too usually succeed by tricking customers into revealing their secrets and techniques – utilizing phishing assaults, for instance. With just one consider place, attackers take over the person accounts and are in a company’s community. Thus, multi-factor authentication (MFA) – utilizing Authenticator apps or (extra legacy) textual content messages grew to become cutting-edge. MFA prevents hackers from accessing accounts who stole the password with the second issue.

Service Account Safety Dangers

The problem for service accounts is that MFA doesn’t work, and network-level safety (IP filtering, VPN tunneling, and so on.) is just not consequently utilized, primarily attributable to complexity and prices. Thus, service account key leaks usually allow hackers to entry firm sources. Whereas phishing is uncommon within the context of service accounts, leakages are steadily the results of builders posting them (unintentionally) on-line, usually together with code fragments that unveil the person to whom they apply. Dialogue boards on the web are one taste; extra virulent is importing code and information with credentials to the general public GitHub by mistake (Determine 2, 1). Then, hackers can merely scan the GitHub repositories and harvest cloud credentials (Determine 2, 2).

klaus-access-keys-Picture2.png
See also  5 ways cloud computing is transforming healthcare

Determine 2: GitHub, Credentials, GCP – The Large Image

Unintentional credential uploads to GitHub are clearly so prevalent that GitHub applied a function for scanning for secrets and techniques. It checks uploaded information and different data. Service suppliers (e.g., cloud or SaaS suppliers) can accomplice with GitHub to implement scans for his or her particular credentials’ codecs. When GitHub finds such credentials, it informs the shoppers who uploaded the info and the service supplier through which context the credentials are used (Determine 2, 3). In additional element:

  • GitHub informs the shopper and the service supplier of credentials in public repositories. This service is free for patrons.

  • GitHub informs clients (and never the service suppliers) if credentials are uploaded to personal or inside repositories if clients pay for a GitHub Superior License.

The foremost cloud suppliers akin to AWS, Azure, Google Cloud, and Alibaba Cloud collaborate with GitHub on safety. Past the large public clouds, GitHub additionally scans for credentials associated, e.g., to OpenAI, Slack, Tableau, or Dynatrace. The checklist of collaborating small and massive tech corporations is way from complete. Nonetheless, the foremost cloud suppliers collaborate, which is an enormous step in defending cloud knowledge facilities.

Dealing with Leaked Entry Keys: Then and Now

The basic strategy to deal with credential leaks is for GitHub to tell the shopper (and repair supplier) in regards to the leak. Then, the shopper’s operations and engineering groups repair it. The engineering group should get the data, react to it, and never deprioritize or postpone the duty. The groups would possibly even be reluctant to rotate the entry key because it requires two simultaneous modifications:

  1. The brand new entry key should be in place within the cloud.

  2. The invoking functions should swap to the brand new key. Different inside or exterior groups might need to alter their code or configurations.

Each actions should happen in sync; in any other case, functions is likely to be impacted. Thus, it’d take some time for engineers to be comfy rotating the important thing. Within the meantime, hackers can break into the service account (Determine 3, higher half).

klaus-access-keys-Picture3.png
See also  Oracle has a better generative AI strategy, analysts say

Determine 3: Fixing credential leakages – basic (prime) and new strategy (down)

Now, Google has modified the sport with its latest coverage change. If an entry key seems in a public GitHub repository, GCP deactivates the important thing, regardless of whether or not functions crash. Google’s announcement marks a shift within the danger and precedence tango. Gone are the times when patching vulnerabilities might take days or even weeks. Welcome to the fast-paced cloud period. Zero-second assaults after credential leakages demand zero-second fixing. Stopping an exterior assault turns into extra necessary than avoiding crashing buyer functions – that’s not less than Google’s opinion. Whereas Google doesn’t power its clients to make use of the function, selecting a much less strict setting might be the much less favorable selection for many clients.

The revolution in entry key safety basically modifications the dynamics between cloud suppliers and their clients in two areas:

  1. A cloud supplier proactively modifications buyer settings relatively than simply reporting points, thereby accepting that buyer functions break. It’s a deviation from the shared duty mannequin we all know from the early days of cloud computing, the place a cloud supplier’s duty ends with offering safe constructing blocks, and the remaining is as much as the shopper.

  2. No “seatbelt tax,” as identified by different cloud suppliers. Think about shopping for a automotive and getting a name one 12 months later: “Driving and not using a seatbelt is harmful. Wish to improve your automotive model with a seatbelt to outlive automotive accidents? It’s 10,000 EUR plus 5 EUR each time you shut your seatbelt!” With such pricing fashions, most automotive drivers would nonetheless not put on seatbelts right this moment. So, kudos to GCP for not attempting to monetize each new safety risk individually.

What I’m actually interested by is whether or not Google’s transfer will assist reshape cloud safety in an impactful method. Will Google roll out extra of those proactive security measures? How will different cloud distributors reply? Completely different cloud suppliers would possibly rely extra on safety revenues and act in a different way. So, will the proactiveness of cloud distributors develop into the brand new norm, and can we see an finish to seatbelt taxation? Keep tuned!

See also  Tencent to Boost Mideast Cloud Investments Amid Regional AI Push | Data Center Knowledge



Source link

Contents
Service Accounts FundamentalsService Account Safety DangersDealing with Leaked Entry Keys: Then and Now
TAGGED: cloud, Revolution, security, Silent
Share This Article
Twitter Email Copy Link Print
Previous Article Data Centre Investment & Expo (DICE): Canada in Toronto National Data Center Investment Expo & Conference (DICE) Capital Markets Summit in New York
Next Article Data Center Industry Calls for Environmental ‘Nutrition Labels’ to Cut Carbon Emissions Data Center Industry Calls for Environmental ‘Nutrition Labels’ to Cut Carbon Emissions
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

UK establishes LASR to counter AI security threats

The UK is establishing the Laboratory for AI Safety Analysis (LASR) to assist shield Britain…

November 25, 2024

Otto Raises $6M in Seed Funding

Otto, a Seattle, WA-based startup constructing an clever and autonomous AI journey agent for enterprise…

August 24, 2024

Earnings Roundup: How Major Data Center Players Fared in 1Q23 | DCN

This year's first-quarter earnings were a mixed bag in the data center industry, with some…

January 29, 2024

Microsoft claims quantum computing breakthrough, customers to benefit soon

“It is a essential milestone on our path to constructing a hybrid supercomputing system that…

April 7, 2024

Hurricane Electric Expands Network with Minnesota PoP

One of many bhe largest IPv6-native Web spine suppliers on the planet, Hurricane Electrical, has…

March 25, 2025

You Might Also Like

New partnership deploys secure edge computing for military and national security
Edge Computing

New partnership deploys secure edge computing for military and national security

By saad
Red Hat expands AMD partnership to support AI in hybrid cloud
Cloud Computing

Red Hat expands AMD partnership to support AI in hybrid cloud

By saad
Dell pushes a new idea of private cloud – without locking users in
Cloud Computing

Dell pushes a new idea of private cloud – without locking users in

By saad
Cloud costs. US dollar signs floating above clouds in the sky. 2166686133
Global Market

AWS clamping down on cloud capacity swapping; here’s what IT buyers need to know

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNoPrivacy policy
You can revoke your consent any time using the Revoke consent button.Revoke consent