 back to blog

Top 3 Most Common Threats Accelerated by Hybrid Cloud Environments

By
Brad Woodberg
,
Director of Product Management
and
|
February 8, 2023
Please note that this is an automated translation. For the most accurate information, refer to the original version in English.

The Transition from On-prem to Hybrid Cloud

Managing your ever-changing network, especially when expanding to a cloud environment is no simple feat. There’s not a one-size-fits-all approach to securing your cloud environment. Our customers have identified three key themes that are driving them to the cloud:  

  • Scale & agility
  • High availability
  • Integrated services

While the benefits of the cloud are real and numerous, it also comes with additional security considerations often left unaddressed during upfront deployments. In this blog, we’ll examine known threats aimed at hybrid cloud environments and where you might be able to catch them before they become an issue.  

Accelerating Threats in Hybrid Cloud

Accelerator 1: Quick & easy cloud deployment often results in security process slips

In most organizations, there are several teams involved with deploying new services, acting as unintentional safety nets before a service is deployed to the internet, but with the cloud, this isn’t necessarily true. While the threats against cloud workloads are not truly much different than those that affect their on-prem kin, the facts remain the same. It is much easier to deploy resources and modify configurations in the cloud. Although all attacks are possible on-prem, in the cloud it takes little more than an email address and credit card to deploy and expose your crown jewels.  Add in automation, and this can happen in minutes.  

Accelerator 2: Lateral movement between cloud and on-prem

For access and administrative purposes, often there are links between cloud workloads and on-prem systems.  This means that a breach in the cloud can often result in a breach of on-prem resources using lateral movement.  Most often, lateral movement is facilitated by site-to-site VPNs or other authorized connectivity.  Attackers are seldom satisfied with whatever access they can procure through the initial compromise of data center resources. Instead, they will try to escalate a breach to target core systems where proprietary data lives and they can inflict the most pain on core infrastructure.  

Accelerator 3: Hybrid cloud & the trials of shared responsibility  

Another aspect of the cloud that is often overlooked or misunderstood is the ownership and responsibility model of the cloud provider vs. the customer.  When using the cloud for workloads (IAAS), you are still responsible for the security and administration of your cloud workloads just like on-prem.

Even in the scenario where you are leveraging solutions like EC2 or AWS Open Search you still have some responsibility to secure your implementation (PaaS).

Source: Microsoft, Azure Shared Responsibility Model

Don’t Worry, Now’s Not the Time to Jump Ship with Cloud

All these factors can give an organization pause when looking to take advantage of or extend cloud adoption.  Yet cloud and hybrid deployments are a must in today’s working world. Instead of trying to prevent or stand in the way of your organization’s migration to the cloud, consider your more moderate options — for our purposes, we’ll feature Vectra AI examples below:  

How Vectra fits in your hybrid cloud architecture
  1. Seamless Integration: Vectra cloud sensors can plug in seamlessly to protect your cloud workloads against network threats, lateral movement and escalation.  This is accomplished the same way it is on-prem, by passively monitoring network traffic supplied by the cloud vendor to/from your workloads.  Learn more about Vectra NDR, today.  
  2. World Class AI Detections and Prioritization: Vectra harnesses Security AI-driven Attack Signal Intelligence™(ASI), to monitor threats against cloud, SaaS infrastructure, identity and on-prem.  This is provided out of the box with no onus on the customer to build detections. ASI helps SOC and security teams to aggregate, contextualize and prioritize the most important host and accounts so you have actionable information at your fingertips to enable rapid response. See what ASI can do for you.
  3. Unified Threat Detection: Vectra provides a single user interface to tie all the different threat vectors together.  This is important because attackers often try to pivot from cloud to on-prem, SaaS to on-prem, or cloud to cloud, so having this capability within a system that has knowledge of each aspect is critical. Explore more about Vectra’s TDR platform.  

In our next blog, we will explore how Vectra can help protect multicloud environments which introduce new attack surfaces and challenges.  Stay tuned!

Want to learn more? Schedule a demo today.

Want to learn more?

Vectra® is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

If you’d like to hear more, contact us and we’ll show you exactly how we do this and what you can do to protect your data. We can also put you in contact with one of our customers to hear directly from them about their experiences with our solution.

Get in touch
CONTACTREQUEST A DEMO