![](https://cms.cyberriskalliance.com/wp-content/uploads/2024/02/021224_shira_shamban.jpg)
- Hybrid environments are common: Many organizations, including financial firms, operate in hybrid environments where cloud and on-premises systems coexist. Weaknesses in one environment can easily compromise the other, especially when file transfers or APIs connect the two.
- Visibility into data flow has become critical: Comprehensive visibility into data flows is essential, whether data resides in the cloud or on-premises. The Finastra breach highlights the importance of tracking and protecting sensitive data across all environments to prevent unauthorized access.
- File transfer systems are prime targets: Whether hosted in the cloud or on-prem, file transfer platforms are a frequent target for cybercriminals. The vulnerabilities exposed in this breach are a reminder to rigorously assess the security of all file transfer systems, regardless of where they are deployed.
- Cloud environments are not immune: Although this breach didn’t involve the cloud, it illustrates how attackers exploit misconfigurations and vulnerabilities to access high-value data. Cloud systems face similar risks if they are not adequately secured, making this a cautionary tale for all environments.
- Implement zero-trust architectures: The breach underscores the necessity of a zero-trust security model. Assume all users, systems, and connections are potentially compromised, and enforce strict access verification for every data interaction. In cloud environments, this involves robust IAM policies, multi-factor authentication (MFA), and role-based access controls to limit access to sensitive resources.
- Monitor and encrypt data in transit and at rest: Security teams must encrypt sensitive data, whether it’s stored or in transit. Cloud practitioners should leverage native encryption tools offered by cloud platforms and conduct regular audits to ensure configurations align with security best practices.
- Secure APIs and file transfer mechanisms: APIs and file transfer systems are frequent attack vectors. In cloud environments, practitioners must validate API configurations, apply rate limiting, and scan for vulnerabilities regularly. Modern file transfer solutions should include encryption, detailed auditing, and anomaly detection to quickly flag unauthorized access attempts.
- Adopt proactive threat hunting: Continuous monitoring and threat detection are critical. Leveraging AI-driven tools, such as anomaly detection and behavior analytics, allows for early breach detection and minimizes the window of exploitation. Cloud-native tools such as AWS GuardDuty or Azure Defender for Cloud offer powerful capabilities to proactively identify and mitigate threats.
Now that cloud adoption has accelerated across industries, it’s more important than ever to integrate these lessons into security strategies. By doing so, organizations can reduce the risk of data breaches, protect sensitive information, and uphold customer trust in an ever-evolving and increasingly hostile cyber landscape.Shira Shamban, co-founder and CEO, SolvoSC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective, and non-commercial.