Organizations neglect DevOps security in latest Cloud Threat Report

Today, Unit 42 (the Palo Alto Networks Security Consulting Group) released new research that illustrates how supply chain security in the cloud continues its growth as an emerging threat.
Today, Unit 42 (the Palo Alto Networks Security Consulting Group) released new research that illustrates how supply chain security in the cloud continues its growth as an emerging threat.

High-profile software supply chain attacks such as SolarWinds and Kaseya VSA have shed a glaring light on the disparity between organizations’ perceptions of security within their cloud infrastructure, and the reality of threats in their supply chains that can impact business catastrophically.

In the Unit 42 Cloud Threat Report, 2H 2021, Unit 42’s researchers dive deep into the full scope of supply chain attacks in the cloud and explain often misunderstood details about how they occur. It also provides actionable recommendations any organization can adopt immediately to begin protecting their software supply chains in the cloud.

Key Findings

Poor supply chain hygiene impacts cloud infrastructure

The customer whose development environment was tested in the red team exercise has what most would consider a mature cloud security posture. However, their development environment contained several critical misconfigurations and vulnerabilities, enabling the Unit 42 team to take over the customer’s cloud infrastructure in a matter of days.

Third-party code = secure code

In most supply chain attacks, an attacker compromises a vendor and inserts malicious code in software used by customers. Cloud infrastructure can fall prey to a similar approach in which unvetted third-party code could introduce security flaws and give attackers access to sensitive data in the cloud environment. Additionally, unless organizations verify sources, third-party code can come from anyone, including an Advanced Persistent Threat (APT).

Figure 1. As an example of the prevalence of misconfigurations, Unit 42 researchers analyzed public Terraform modules by number of misconfigurations (left) and types of misconfigurations and their percentages (right). Source: Unit 42 Cloud Threat Report, 2H 2021.
Organizations need to shift security left

Teams continue to neglect DevOps security, due in part to lack of attention to supply chain threats. Cloud-native applications have a long chain of dependencies, and those dependencies have dependencies of their own. DevOps and security teams need to gain visibility into the bill of materials in every cloud workload to evaluate risk at every stage of the dependency chain and establish guardrails.

Secure your software supply chain in the cloud

While the report provides key knowledge about software supply chain attacks themselves, the main focus is on how you can protect your organization from this growing threat starting immediately.

Methodology

Unit 42 analyzed data from a variety of public data sources worldwide to draw conclusions about the growing threats organizations face today in their software supply chains.

READ MORE

In addition to analyzing data, a large SaaS provider (a customer of Palo Alto Networks) commissioned its researchers to run a red team exercise against its software development environment. In three days, a single Unit 42 researcher discovered critical software development flaws that left the customer vulnerable to an attack similar to those on SolarWinds and Kaseya VSA.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Britain’s Uplevelling Plan

Amber Coster • 26th April 2022

Remote work could enable over 13 million Brits* to seize the opportunity to live and work outside the major cities, helping to spread economic opportunity across the UK, according to research released today by ClickUp, the all-in-one productivity platform.

The Heroes Of Technology

Steven Johnson • 26th April 2022

We tend to worship great business leaders, but there are thousands of innovators whose ideas — from tiny features to complicated algorithms — have made our lives easier, healthier, safer, and more convenient. Meet Hidden Heroes, a new publication designed to tell their stories and pay them the tribute they deserve.