{"id":12753,"date":"2020-12-16T15:56:18","date_gmt":"2020-12-16T14:56:18","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=12753"},"modified":"2022-01-05T20:03:27","modified_gmt":"2022-01-05T19:03:27","slug":"cloud-security-mistakes","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/","title":{"rendered":"5 Cloud Security Mistakes that Businesses Should Avoid"},"content":{"rendered":"\n\n\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-e9f6f6a9      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#cloud-security-mistake-1-not-patching-your-servers\" class=\"uagb-toc-link__trigger\">Cloud security mistake #1: Not patching your servers<\/a><li class=\"uagb-toc__list\"><a href=\"#cloud-security-mistake-2-not-addressing-zombie-server-risks\" class=\"uagb-toc-link__trigger\">Cloud security mistake #2: Not addressing zombie server risks<\/a><li class=\"uagb-toc__list\"><a href=\"#cloud-security-mistake-3-not-controlling-your-access\" class=\"uagb-toc-link__trigger\">Cloud security mistake #3: Not controlling your access<\/a><li class=\"uagb-toc__list\"><a href=\"#cloud-security-mistake-4-not-creating-standards-for-your-encryption\" class=\"uagb-toc-link__trigger\">Cloud security mistake #4: Not creating standards for your encryption<\/a><li class=\"uagb-toc__list\"><a href=\"#cloud-security-mistake-5-not-deleting-your-data\" class=\"uagb-toc-link__trigger\">Cloud security mistake #5: Not deleting your data<\/a><li class=\"uagb-toc__list\"><a href=\"#key-takeaways\" class=\"uagb-toc-link__trigger\">Key takeaways<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<p>Cloud service providers allow businesses to effortlessly host their <span id=\"urn:enhancement-2f6a7b4d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>, without the need for technical <span id=\"urn:enhancement-a1064359\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_hardware\">hardware<\/span> and with the promise of reducing costs. Sounds like a dream. But, cloud hosting also has the <strong>potential for cloud <span id=\"urn:enhancement-22f351af\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> mistakes<\/strong>. These mistakes can then lead to cloud <span id=\"urn:enhancement-8ec6dfc0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> breaches. In fact, <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.securitymagazine.com\/articles\/92533-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">research<\/a> showed that almost 80% of companies had experienced a cloud <span id=\"urn:enhancement-1cb2257f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> breach since January 2019.<\/p>\n\n\n\n<p>With the cloud services industry rapidly expanding to almost <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.globenewswire.com\/news-release\/2020\/10\/01\/2102033\/0\/en\/Cloud-Computing-Market-Worth-760-98-Billion-at-18-6-CAGR-Tech-Giants-Such-as-IBM-and-Microsoft-to-Focus-on-Introducing-Advanced-Cloud-Solutions-Fortune-Business-Insights.html#:~:te\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">$200 billion<\/a>, cloud <span id=\"urn:enhancement-c9ad140d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> <span id=\"urn:enhancement-75d3c1e0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> breaches are also rapidly increasing. <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.dincloud.com\/blog\/data-security-breaches-and-some-stats-of-2019\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">Research<\/a> shows that in 2019 there was a 54% increase in the number of breaches from the previous year. This is why <strong>understanding and implementing cloud <span id=\"urn:enhancement-677d67b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> is crucial<\/strong> for any successful business.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3-1024x1024.jpg\" alt=\"amazon cloud market\" class=\"wp-image-12761\" width=\"-56\" height=\"-56\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3-1024x1024.jpg 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3-300x300.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3-150x150.jpg 150w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3-768x768.jpg 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3-600x600.jpg 600w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image3.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>In this article, we have collected the <strong>five most common cloud <span id=\"urn:enhancement-f6aeafe1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> mistakes<\/strong> that businesses make and that you should avoid.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cloud-security-mistake-1-not-patching-your-servers\">Cloud security mistake #1: Not patching your servers<\/h2>\n\n\n\n<p>One of the biggest cloud <span id=\"urn:enhancement-af65ef74\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> mistakes a business can make is not being on top of their <strong><span id=\"urn:enhancement-ace83597\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span> <span id=\"urn:enhancement-3ebe61e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/patch_computing\">patching<\/span> management<\/strong>. Not only is this mistake especially detrimental, but it is also very common. A survey, that conducted <span id=\"urn:enhancement-3558a0a6\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/research\">research<\/span> about company cloud environments, showed that <a href=\"https:\/\/orca.security\/public-cloud-security-risks-research\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">50%<\/a> of the respondents were running a minimum of one outdated <span id=\"urn:enhancement-613f701d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The mistake businesses make is that they confuse general <span id=\"urn:enhancement-80750727\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> <span id=\"urn:enhancement-538d7eb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/patch_computing\">updates<\/span> with a company specific and effective <span id=\"urn:enhancement-50109013\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/patch_computing\">patch<\/span> <span id=\"urn:enhancement-a655b48c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/process_computing\">process<\/span>. Although <span id=\"urn:enhancement-cdc649fd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">cloud providers<\/span> are responsible for providing businesses with some <a href=\"https:\/\/exclusive.multibriefs.com\/content\/5-data-protection-trends-of-2020-that-will-define-security-next-year\/science-technology\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">data protection<\/a>, cloud <span id=\"urn:enhancement-ef5a9d87\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/patch_computing\">patching<\/span>, and application security should be maintained and regulated by the company.<\/p>\n\n\n\n<p>Consider this scenario. You\u2019re a company that provides <a href=\"https:\/\/www.ringcentral.com\/omnichannel-routing.html\">channel routing<\/a> software and you store a lot of sensitive customer information on the <span id=\"urn:enhancement-5e6378b3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">cloud<\/span>. But, your cloud <span id=\"urn:enhancement-fb9de389\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span> doesn\u2019t carry out <span id=\"urn:enhancement-a57b34c4\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/patch_computing\">patch<\/span> management. This means that you are prone to a significantly larger percentage of <span id=\"urn:enhancement-328aec5a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attacks<\/span>. In fact, <a href=\"https:\/\/securityboulevard.com\/2019\/10\/60-of-breaches-in-2019-involved-unpatched-vulnerabilities\/#:~:text=Home%20%C2%BB%20Security%20Bloggers%20Network%20%C2%BB%2060,in%202019%20Involved%20Unpatched%20Vulnerabilities&amp;text=Surveyors%20polled%203%2C0\" class=\"ek-link\">data<\/a> shows that 60% of breaches in 2019 were related to unpatched systems or <span id=\"urn:enhancement-c28c0e35\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span>.<\/p>\n\n\n\n<p>With <a href=\"https:\/\/www.codemotion.com\/magazine\/articles\/events\/remote-work-digital-nomad\/\" class=\"ek-link\">remote working<\/a> becoming ever more popular, <span id=\"urn:enhancement-e6ca3891\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/employment\">employees<\/span> are now constantly using unsecured public networks. So, <strong>to reduce the risk of <span id=\"urn:enhancement-46f03b48\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attacks<\/span><\/strong> and ensure company <span id=\"urn:enhancement-8b0d8086\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> it is vital that you carry out cloud patching. Here are a few tips you can use:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Perform scans periodically<\/strong>. Carrying out regular scans will allow you to quickly identify any potential vulnerabilities and patch them accordingly<\/li><li><strong>Maintain visibility<\/strong>. A company that creates up-to-date records of all their devices and servers can easily assess potential vulnerabilities. This will also make reporting and assessment collection a faster process<\/li><li><strong>Don\u2019t patch manually<\/strong>. Maintaining a server\u2019s security is complicated. They often run varied operating systems and applications. These require different patches and this procedure would be too laborious to carry out manually. This is why it is essential to automate your patching process. Not only will this save you time but it will also reduce the amount of human error<\/li><\/ol>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"560\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image2-4-1024x560.png\" alt=\"cloud security mistakes\" class=\"wp-image-12760\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image2-4-1024x560.png 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image2-4-300x164.png 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image2-4-768x420.png 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image2-4-1536x840.png 1536w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image2-4.png 1999w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud security mistake #2: Not addressing zombie server risks<\/h2>\n\n\n\n<p><strong>Zombie <span id=\"urn:enhancement-7679b892\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span><\/strong> are <span id=\"urn:enhancement-7b3ccda9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span> that are not patched, validated, checked for <span id=\"urn:enhancement-12151b1c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerabilities<\/span>, or managed, but are still present on your cloud <span id=\"urn:enhancement-125646dc\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span>. <a href=\"https:\/\/www.computer.org\/publications\/tech-news\/data-center-insider\/zombie-servers-lurking-and-wreaking-havoc-inside-data-centers\" class=\"ek-link\">Data<\/a> shows that there are more than 10 million of these <span id=\"urn:enhancement-e57cefdd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span> across the world and they use up to eight power plants worth of energy to maintain. They are a financial burden, can be difficult to spot, and most importantly, they are a cloud <span id=\"urn:enhancement-2b1bade1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> risk.<\/p>\n\n\n\n<p>The main mistake businesses make is that they <strong>put off their zombie workload<\/strong> and do not act instantly to block them.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Zombie resources or comatose <span id=\"urn:enhancement-743d104a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span> can actually prevent a company from detecting genuine cloud <span id=\"urn:enhancement-a55741a5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> risks such as <strong>cryptojackers<\/strong>. Not only that, zombie <span id=\"urn:enhancement-fad5742d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span> are a great indicator to potential attackers that you have weak <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/cloud-manager\/digital-developer-conference-cloud-native-security\/\" class=\"ek-link\">security<\/a> practices in place. This is because if you\u2019re not detecting these <span id=\"urn:enhancement-70933789\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span>, it is unlikely that you will be able to spot an <span id=\"urn:enhancement-ed77c1c7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attack<\/span>. Attackers can also exploit the zombie <span id=\"urn:enhancement-dac0284\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span> to breach your <span id=\"urn:enhancement-becce21b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span>.<\/p>\n\n\n\n<p>Here are the most effective techniques you can use to address your zombie <span id=\"urn:enhancement-577870d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span> <a href=\"https:\/\/www.clicdata.com\/blog\/cloud-migration\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">cloud<\/a> risk:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Maintain visibility of your entire cloud infrastructure<\/strong>. This should be a continuous process that provides you with full details of all the servers on your cloud. As mentioned above, zombie servers can be difficult to identify. So, instead of using a resource list, some companies use visual diagrams that allow them to view the full cloud layout and spot resources that have no connection to the others<\/li><li><strong>Label or tag any future resources<\/strong>. Creating a resource tagging protocol will allow you to keep tabs on all of your cloud resources. This makes managing useful resources and spotting comatose resources simple. But, it is vital that the labels you choose are easily understood by your employees<\/li><li><strong>After identifying, destroy<\/strong>. The most important part of addressing your zombie workload is actually terminating these resources. Using the <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.esecurityplanet.com\/products\/best-enterprise-network-security-products\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">best enterprise network security products<\/a> is key as they can help in the identifying and destroying process and they ensure you determine the correct ones<\/li><li><strong>Create a zombie reporting culture<\/strong>. Companies that stay on top of their zombie workload prevent the risk of being overwhelmed. This is why making zombie resource identification and termination an aspect of your general reporting and auditing process is vital to maintaining a zombie-free cloud environment<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud security mistake #3: Not controlling your access<\/h2>\n\n\n\n<p>Access control is the concept of enabling specific <span id=\"urn:enhancement-bea85b9b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/user_computing\">users<\/span> access to specific company <span id=\"urn:enhancement-ac471bff\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> and information. But more importantly, it is also the method of <strong>preventing <span id=\"urn:enhancement-24fa53b1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/user_computing\">users<\/span> access to restricted <span id=\"urn:enhancement-e42775c0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span><\/strong>. This is called access management. Efficient and secure access management requires both authentication and authorization of <span id=\"urn:enhancement-b56138c5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/employment\">personnel<\/span>. Take a look at this example.<\/p>\n\n\n\n<p>Let\u2019s say you\u2019re working at a coffee shop and you\u2019re analyzing private company information which you\u2019ve accessed via an initial authentication <span id=\"urn:enhancement-9630ba2a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/process_computing\">process<\/span>. The Wi-Fi is slow and the <a href=\"https:\/\/blog.3dcart.com\/how-increasing-website-page-speed-impacts-seo-and-conversions\" class=\"ek-link\">website loading time<\/a> is taking a while, so you quickly go to the toilet. If your company doesn\u2019t have a multi-factor authentication and authorization <span id=\"urn:enhancement-f5a84999\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/process_computing\">process<\/span> then your <span id=\"urn:enhancement-14482f8d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> can be accessed by anyone whilst you\u2019re gone. A multi-factor <span id=\"urn:enhancement-4bbf08c8\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/process_computing\">process<\/span> can be anything from face recognition software to a key fob.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"651\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image1-4-1024x651.png\" alt=\"enable multi factor authentication\" class=\"wp-image-12759\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image1-4-1024x651.png 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image1-4-300x191.png 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image1-4-768x489.png 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image1-4.png 1374w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>With remote working becoming ever more popular, this additional layer of protection is vital to ensure the necessary protection of your cloud information. <span id=\"urn:enhancement-a88582e8\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">Data<\/span> shows that almost <a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/key-statistics-for-enterprise-cloud-security\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">70%<\/a> of businesses don\u2019t implement sufficient access management to control access to their cloud <span id=\"urn:enhancement-fbbc2f4c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span>.<\/p>\n\n\n\n<p>Creating a good access management strategy requires you to understand the potential risks to your <span id=\"urn:enhancement-1f2ad5f9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> and then implement a <strong>strict access control protocol.<\/strong> There are a variety of different access control techniques, but each business needs to adopt the appropriate method depending on how sensitive their specific <span id=\"urn:enhancement-dda3d17b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> is.<\/p>\n\n\n\n<p>Here are a couple of common access control models your business can take advantage of:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Role-based access control<\/strong> (<strong>RBAC<\/strong>). This method ranks or separates employees to ensure that they can only access information or data that is related to their specific role. It is also the most common model used today<\/li><li><strong>Attribute-based access control<\/strong> (<strong>ABAC<\/strong>). This is a far more detailed and sophisticated method of access management. ABAC doesn\u2019t only compare the employees\u2019 roles, but every single attribute. This can include location, company position, specific time, and day of the week. This method is more appropriate for businesses that deal with highly sensitive information such as medical records<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cloud-security-mistake-4-not-creating-standards-for-your-encryption\">Cloud security mistake #4: Not creating standards for your encryption<\/h2>\n\n\n\n<p>Another crucial cloud <span id=\"urn:enhancement-5e836257\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> error businesses often make is <strong>failing to create a high standard encryption protocol<\/strong>. Many businesses rely on their <span id=\"urn:enhancement-d2aeea5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">cloud providers<\/span> to encrypt their information, but <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/backup.ninja\/news\/data-encryption-shared-responsibility\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">data<\/a> shows that less than 10% of all <span id=\"urn:enhancement-635a6adb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">cloud providers<\/span> encrypt <span id=\"urn:enhancement-6827dc61\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> at <span id=\"urn:enhancement-f3e8460d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/representational_state_transfer\">rest<\/span>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"350\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image4-4.png\" alt=\"cloud security: encryption controls\" class=\"wp-image-12762\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image4-4.png 700w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/image4-4-300x150.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p><strong>Data encryption<\/strong> is the <span id=\"urn:enhancement-9bbfc98e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/process_computing\">process<\/span> of transforming information before it is stored on <span id=\"urn:enhancement-9c50a53f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">cloud provider<\/span> <span id=\"urn:enhancement-cd48c984\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">servers<\/span>. For example, let\u2019s say your company had a <span id=\"urn:enhancement-738540bd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_file\">file<\/span> named \u201c<a href=\"https:\/\/www.ringcentral.com\/digital-customer-service-solutions.html\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">Digital Customer Service Solutions: Choosing the Right Platform to Improve Customer Experience<\/a>\u201d which contained sensitive <span id=\"urn:enhancement-7326c94c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>. Using encryption algorithms, this information will be encoded into an unreadable format that cannot be deciphered by attackers.<\/p>\n\n\n\n<p>Without encryption, this <span id=\"urn:enhancement-8584c546\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> has a greater chance of being <strong>breached<\/strong> by unauthorized <span id=\"urn:enhancement-2848111c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/user_computing\">users<\/span>. Despite the amount of potential cloud <span id=\"urn:enhancement-2f78a349\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> risk businesses can face, <a href=\"https:\/\/techbeacon.com\/security\/25-data-security-stats-matter\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">research<\/a> shows that less than 30% of companies actually carry out full-disk high standard encryption.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/cloud-manager\/a-journey-riding-in-the-clouds\/\" class=\"ek-link\">Cloud<\/a> encryption is especially beneficial if your company <span id=\"urn:enhancement-bd4ddca5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> is constantly transferred to different locations. Information transfer places <span id=\"urn:enhancement-8ed6049e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> in a vulnerable state and opens up the possibility of unwanted surveillance or cyberattacks. But, encryption tools can provide your company with that <span id=\"urn:enhancement-8489d465\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span> across multiple <span id=\"urn:enhancement-cc30ddfd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/information_appliance\">devices<\/span> that prevents anyone but you from accessing or changing the <span id=\"urn:enhancement-b8f4096c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>.<\/p>\n\n\n\n<p>The next hurdle is then<strong> creating a cloud encryption protocol<\/strong>. Of course, every encryption policy or protocol will differ from business to business, but here are some points you can consider:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Find out which specific data needs encrypting<\/strong>. Not every piece of information needs to be passed through the algorithm. You should assess whether the data falls under privacy acts or compliance requirements. Personal information and sensitive data to the company can also fall into this bracket<\/li><li><strong>At what point should the encryption begin?<\/strong> Company data records are dynamic, they are constantly increasing and updating. Data should be encrypted when at rest in the cloud. But, as mentioned above, data that is being transferred is vulnerable and should also be encrypted<\/li><li><strong>Decide who will manage the encryption keys<\/strong>. Encryption key management requires <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/rescue.ceoblognation.com\/2020\/11\/25\/how-to-overcome-the-5-pitfalls-in-leadership-communication\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">leadership<\/a> because losing the keys can put the company at a detrimental risk. Cloud services can often provide their customers, aka you, with key storage and management. But, even if you decide to hand over the management to the cloud provider it is important that you implement access control. As we\u2019ve mentioned above, this involves a multi-factor authentication and authorization process that ensures the security of your cloud information.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cloud-security-mistake-5-not-deleting-your-data\">Cloud security mistake #5: Not deleting your data<\/h2>\n\n\n\n<p>Let\u2019s imagine you\u2019re a company that provides communication solutions for businesses, your customer\u2019s experience shouldn\u2019t just end with them purchasing the product. Providing reliable <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/b2b-customer-service\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">B2B customer service<\/a> doesn\u2019t only mean answering customer queries like \u201c<a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.ringcentral.com\/omnichannel-routing.html\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">What is omnichannel routing and how does it work<\/a>?\u201d, it also means ensuring that private <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.clicdata.com\/blog\/customer-journey-data-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">customer data<\/a> is protected.<\/p>\n\n\n\n<p>One of the biggest cloud <span id=\"urn:enhancement-2d614474\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> concerns is <strong>incomplete <span id=\"urn:enhancement-b786b68c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> deletion<\/strong>. This is especially problematic when companies change their cloud service providers or close certain <span id=\"urn:enhancement-3ac61453\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/user_computing\">accounts<\/span>. Incomplete data deletion is not only problematic for your company\u2019s data but it can also expose your customer\u2019s private information.<\/p>\n\n\n\n<p>Complete data deletion is a process that should be assisted by your cloud provider. But, it\u2019s also your responsibility to ensure that the information has been removed in its entirety from the main servers, back-up servers, monitoring services, etc.<\/p>\n\n\n\n<p>Here are a couple of steps you can take to ensure complete cloud data deletion:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Remove information until it&#8217;s irrecoverable and inaccessible<\/strong>. This involves deleting information from every location and even temporary access points such as RAM and back-ups. This process should be carried out until neither the provider nor the customer can access the information<\/li><li><strong>Agree on deletion policies with your cloud provider<\/strong>. As a customer yourself, you need assurance from your provider that they will delete data within a given time period that you have predetermined and they should also provide you with proof of deletion. In the event of an error, your provider should carry out error handling to ensure that the mistake has been resolved<\/li><\/ol>\n\n\n\n<p>Cloud security is a vital part of modern business. It allows you to protect your company from any external or internal security threats and attacks. Without proper cloud security, you run the risk of losing control of valuable data and information and you increase the probability of a security breach. <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.cyberdefensemagazine.com\/5-reasons-why-cloud-security-is-important-for-all-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"ek-link\">Data<\/a> shows that the average cloud security breach can cost a company almost $4 million. This is why minimizing your cloud security mistakes is crucial to the <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/community-manager\/devrel-success\/\" class=\"ek-link\">success<\/a> of your business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key takeaways<\/h2>\n\n\n\n<p>So, let\u2019s quickly recap:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Don\u2019t just rely on your cloud provider to patch your servers, this should be a process you are constantly and automatically doing<\/li><li>Zombie servers are costing you financially and are negatively impacting your cloud security by increasing the chance of attackers. So, don\u2019t ignore the workload<\/li><li>In the same way that you wouldn\u2019t let anyone walk into your company office or warehouse don\u2019t let them wander into your sensitive cloud data. Develop multi-factor access control for maximum protection<\/li><li>Encryption is an efficient way for you to conceal data. Yet, many companies don\u2019t do it. Creating your own encryption protocol is necessary for effective cloud security<\/li><li>Incomplete data deletion has the potential to expose personal customer information and ruin your company\u2019s reputation. This is why working with your provider and ensuring complete deletion is key<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cloud service providers allow businesses to effortlessly host their data, without the need for technical hardware and with the promise of reducing costs. Sounds like a dream. But, cloud hosting also has the potential for cloud security mistakes. These mistakes can then lead to cloud data breaches. In fact, research showed that almost 80% of&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/\">Read more<\/a><\/p>\n","protected":false},"author":117,"featured_media":12754,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":8,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[5244],"tags":[7228,7152,9898],"collections":[],"class_list":{"0":"post-12753","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud","8":"tag-business","9":"tag-security","10":"tag-tips","11":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Cloud Security Mistakes that Businesses Should Avoid - Codemotion<\/title>\n<meta name=\"description\" content=\"In this article, we have collected the five most common cloud security mistakes that businesses make and that you should avoid.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Cloud Security Mistakes that Businesses Should Avoid\" \/>\n<meta property=\"og:description\" content=\"In this article, we have collected the five most common cloud security mistakes that businesses make and that you should avoid.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-16T14:56:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-05T19:03:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victorio Duran III\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victorio Duran III\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/\"},\"author\":{\"name\":\"Victorio Duran III\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/a3acf25992fdf0adb9e6211c5585dd98\"},\"headline\":\"5 Cloud Security Mistakes that Businesses Should Avoid\",\"datePublished\":\"2020-12-16T14:56:18+00:00\",\"dateModified\":\"2022-01-05T19:03:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/\"},\"wordCount\":2159,\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/freestocks-I_pOqP6kCOI-unsplash.jpg\",\"keywords\":[\"Business\",\"Security\",\"Tips\"],\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/\",\"name\":\"5 Cloud Security Mistakes that Businesses Should Avoid - Codemotion\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/freestocks-I_pOqP6kCOI-unsplash.jpg\",\"datePublished\":\"2020-12-16T14:56:18+00:00\",\"dateModified\":\"2022-01-05T19:03:27+00:00\",\"description\":\"In this article, we have collected the five most common cloud security mistakes that businesses make and that you should avoid.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/freestocks-I_pOqP6kCOI-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/freestocks-I_pOqP6kCOI-unsplash.jpg\",\"width\":1200,\"height\":675,\"caption\":\"cloud security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/cloud-security-mistakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevOps\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"5 Cloud Security Mistakes that Businesses Should Avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Codemotion.Italy\\\/\",\"https:\\\/\\\/x.com\\\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/a3acf25992fdf0adb9e6211c5585dd98\",\"name\":\"Victorio Duran III\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49b85662b7ff39a1d1e0dcbe46d0084186db2854b0d0085ced53d27d82556c8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49b85662b7ff39a1d1e0dcbe46d0084186db2854b0d0085ced53d27d82556c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49b85662b7ff39a1d1e0dcbe46d0084186db2854b0d0085ced53d27d82556c8?s=96&d=mm&r=g\",\"caption\":\"Victorio Duran III\"},\"description\":\"Victorio is the Associate SEO Director at RingCentral, a global leader in unified communications and CTI software provider. He has over 13 years of extensive involvement on web and digital operations with diverse experience as web engineer, product manager, and digital marketing strategist.\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/author\\\/victorio-duran\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 Cloud Security Mistakes that Businesses Should Avoid - Codemotion","description":"In this article, we have collected the five most common cloud security mistakes that businesses make and that you should avoid.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"5 Cloud Security Mistakes that Businesses Should Avoid","og_description":"In this article, we have collected the five most common cloud security mistakes that businesses make and that you should avoid.","og_url":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2020-12-16T14:56:18+00:00","article_modified_time":"2022-01-05T19:03:27+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg","type":"image\/jpeg"}],"author":"Victorio Duran III","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Victorio Duran III","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/"},"author":{"name":"Victorio Duran III","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/a3acf25992fdf0adb9e6211c5585dd98"},"headline":"5 Cloud Security Mistakes that Businesses Should Avoid","datePublished":"2020-12-16T14:56:18+00:00","dateModified":"2022-01-05T19:03:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/"},"wordCount":2159,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg","keywords":["Business","Security","Tips"],"articleSection":["Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/","url":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/","name":"5 Cloud Security Mistakes that Businesses Should Avoid - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg","datePublished":"2020-12-16T14:56:18+00:00","dateModified":"2022-01-05T19:03:27+00:00","description":"In this article, we have collected the five most common cloud security mistakes that businesses make and that you should avoid.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg","width":1200,"height":675,"caption":"cloud security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/cloud-security-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"DevOps","item":"https:\/\/www.codemotion.com\/magazine\/devops\/"},{"@type":"ListItem","position":3,"name":"Cloud","item":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/"},{"@type":"ListItem","position":4,"name":"5 Cloud Security Mistakes that Businesses Should Avoid"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/a3acf25992fdf0adb9e6211c5585dd98","name":"Victorio Duran III","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e49b85662b7ff39a1d1e0dcbe46d0084186db2854b0d0085ced53d27d82556c8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e49b85662b7ff39a1d1e0dcbe46d0084186db2854b0d0085ced53d27d82556c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e49b85662b7ff39a1d1e0dcbe46d0084186db2854b0d0085ced53d27d82556c8?s=96&d=mm&r=g","caption":"Victorio Duran III"},"description":"Victorio is the Associate SEO Director at RingCentral, a global leader in unified communications and CTI software provider. He has over 13 years of extensive involvement on web and digital operations with diverse experience as web engineer, product manager, and digital marketing strategist.","url":"https:\/\/www.codemotion.com\/magazine\/author\/victorio-duran\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-600x600.jpg","author_info":{"display_name":"Victorio Duran III","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/victorio-duran\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg",1200,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-768x432.jpg",768,432,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg",1200,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg",1200,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash.jpg",100,56,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/12\/freestocks-I_pOqP6kCOI-unsplash-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Victorio Duran III","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/victorio-duran\/"},"uagb_comment_info":0,"uagb_excerpt":"Cloud service providers allow businesses to effortlessly host their data, without the need for technical hardware and with the promise of reducing costs. Sounds like a dream. But, cloud hosting also has the potential for cloud security mistakes. These mistakes can then lead to cloud data breaches. In fact, research showed that almost 80% of&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/12753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=12753"}],"version-history":[{"count":8,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/12753\/revisions"}],"predecessor-version":[{"id":12778,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/12753\/revisions\/12778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/12754"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=12753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=12753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=12753"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=12753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}