Aqua CSPM Cloud Security Posture Management Guide
Aqua CSPM Cloud Security Posture Management Guide
Aqua CSPM Cloud Security Posture Management Guide
Cloud Security
Posture Management
How CSPM automates security configuration across clouds
Jan. 2023
Contents
Contents
Introduction 03
Cloud security challenges 04
The dynamic and complex nature of the cloud 04
Multi-cloud world 06
The human element 07
Shared responsibility model 09
Growing compliance needs 09
Solutions 10
Manual auditing 10
Scripted reviews 10
Cloud providers’ native security tools and features 11
What is cloud security posture management? 12
How CSPM works 12
Critical elements of CSPM solutions 13
Meet Aqua CSPM 14
Main features of Aqua CSPM 15
Conclusion 17
Page 2
Introduction
Introduction
Organizations now operate across multiple public and private clouds, use a myriad of
cloud services, and often have hundreds or even thousands of developers impacting
(even unknowingly) their cloud infrastructure. In addition to cloud providers releasing
new services and features at a record pace, cloud users also need to navigate complex
compliance requirements from different regulators.
The widespread adoption of public clouds has driven new levels of agility and innovation while radically
transforming enterprise ecosystems. Organizations now operate across multiple public and private clouds,
use a myriad of cloud services, and often have hundreds or even thousands of developers impacting (even
unknowingly) their cloud infrastructure. In addition to cloud providers releasing new services and features
at a record pace, cloud users also need to navigate complex compliance requirements from different
regulators. Complexities quickly add up and keeping track of all the setups and configurations needed to
secure every single service gets incredibly overwhelming.
With the lack of visibility and control over ever-changing configurations, it’s no surprise that cloud data
breaches and exposures are extremely common. In 2020, according to a study conducted by IDC and
Ermetic, 79% of companies had reportedly experienced at least one cloud data breach. A subsequent study
by the same group came up with an even more detailed view: in the last two years the figure had risen to
98%, up by about almost 20% of the surveyed organizations 83% had experienced more than one breach,
and 43% reported 10 or more breaches in that same time frame.1
While cloud providers take great effort to secure their offerings, most organizations lack the necessary
processes or tools to use them effectively. Some of the largest cloud breaches at companies like Imperva,
Capital One, and CenturyLink happened due to simple configuration mistakes, be it an open AWS S3
bucket or excessive permissions. Gartner estimates that through 2025, at least 99% of cloud security
failures will be the customer’s fault, and 90% of the organizations that fail to control public cloud use will
inappropriately expose sensitive data2. As the COVID-19 pandemic accelerated the transition to the cloud even
further, data breaches will only continue to increase in scale and velocity.
This whitepaper covers the security challenges organizations face today with their cloud IaaS environments,
what approaches can mitigate these risks, and why Cloud Security Posture Management (CSPM) is the
solution that addresses these challenges most efficiently and effectively.
1
State of Cloud Security 2021: More Aware Yet Very Exposed
2
“Is the Cloud Secure?”, Gartner, 2019
Page 3
Cloud Security Challenges
The dynamic, software-defined nature of the cloud leads to frequent changes that are completely different
from the traditional on-premises world. The configurations that used to exist only in the physical data center
now exist entirely in the cloud as a software layer - allowing you to tweak settings on the fly. In a cloud-based
world, everything is easy to change with just a few clicks, but at the same time, very easy to misconfigure.
There are over 1.4M SKUs for sale across the major cloud providers
One of the biggest cloud security challenges is the sheer complexity of the environment. Each major cloud
provider offers a broad set of services spanning compute, storage, databases, analytics, networking, mobile, IoT,
security, and much more. 451 Research’s Cloud Price Index tracks a colossal 1.4M SKUs for sale from AWS,
Google, Microsoft, Alibaba, and IBM3.
Across the big three cloud providers, there are hundreds of different services, sub- services, regions,
availability zones, and configuration options. While the services that different providers offer are similar
in many ways, they aren’t identical. Within each of them, there are dozens of unique settings, granular
configurations, and specific authorization policies that make it very hard to ensure an environment meets
proper security and compliance requirements.
3
“Cloud Trends in 2020: The Year of Complexity, and its Management”, 451 Research
Page 4
Cloud Security Challenges
To stay competitive, cloud providers are constantly rolling out new services, adding new features and removing
services. For example, the Cloud Price Index logged over 300,000 SKU changes — SKUs added, SKUs removed,
price increases and price decreases — at Amazon Web Services Inc., Microsoft Azure and Google Cloud.4
The AWS Cloud spans 96 Availability Zones with over 250 services in 30 geographic regions around the
world, with recently announced plans for 15 more Availability Zones and 5 more AWS Regions. This is up
from just over 100 services three years ago and 175 in 2020, making it extremely difficult for everyone to keep up.5
2020 2022
175 Service 250+ Service
77 Available Zones 96 Available Zones
24 Geographic Regions 30 Geographic Regions
245 Countries 245 Countries
This pace of change is dizzying for administrators who were accustomed to the relatively static nature of
their traditional on-prem environments. The sheer complexities of navigating cloud infrastructure can lead
to configuration errors. One-click mistakes can easily escalate to a serious data breach if they aren’t caught.
The task of ensuring security only gets harder in a multi-cloud environment, which today is norm for many
organizations.
4
"In Q3'21, hyperscale cloud providers changed 300,000 pricing line items"
5
“AWS Global Infrastructure"
Page 5
Cloud Security Challenges
Multi-Cloud World
Today, organizations increasingly use various cloud combinations, i.e., they simultaneously leverage multiple
public and private clouds. A Flexera 2022 State of the Cloud Report shows cloud adoption continues to
become more mainstream. Heavy users (currently running more than 25%of workloads in the cloud) are up
to 63%, an increase from 59% in 2021 and 53%t in 2020. Similarly, respondents to the Flexera study who
reported light usage decreased from 19% to 14%, implying more organizations are advancing through their
cloud journeys.5
Several reasons have led to a significant rise in interest in multi-cloud deployments. Enterprises adopt
multi-cloud to increase agility, take advantage of best-in-breed solutions, improve cost efficiencies, achieve
better geographic coverage, and increase flexibility through choice. In addition to the core cloud benefits, a
multi-cloud approach can help reduce vendor lock-in and ensure uptime in the event of a provider outage.
For example, using several providers minimizes the effect of DDoS attacks by spreading traffic and services
over multiple clouds, eliminating the risk of having a single point of failure. Gartner predicts that multi-cloud
strategies will reduce vendor dependency for two-thirds of organizations through 20246.
With all the benefits of a multi-cloud strategy, there are serious challenges that come with it as well.
Multi-cloud architectures are much more complex and, therefore, harder to manage. Due to the lack of
visibility across diverse hosts and services spanning multiple vendors, as well as significant differences in
the configuration of similar services between clouds (e.g., AWS EC2 vs. Azure Instances, or Amazon EKS vs.
Google GKE) the environment becomes even more complicated to secure. Multi-cloud tooling is essential
for managing cloud resources cost-effectively and ensuring strong governance and security.
5
Flexera 2022 State of the Cloud Report
6
4 Trends Impacting Cloud Adoption in 2020, Gartner
Page 6
Cloud Security Challenges
Part of the problem is that many organizations still lack adequate cloud expertise and skills. Since the cloud
landscape is changing so fast, always having security-savvy experts in place for all the new services being
released becomes a challenge. But the even more dramatic issues arise with the implementation of a “shift
left” approach.
Overall, it’s good practice - you’re trying to address problems earlier in the software development life cycle
(SDLC) and therefore, you place more control in the hands of developers. As a result, large organizations
now have dozens, hundreds, or even thousands of developers operating inside their cloud environments.
Each of them is making changes, deploying infrastructure, and configuring services. However, not being
security experts, developers often take the path of least resistance to get a new service up and running,
which can lead to mistakes.
What’s worse, developers can now make configuration changes at the beginning of the process without
a clear understanding of how their actions might affect the infrastructure downstream. As everything in
the cloud is interdependent, this quickly can lead to drift away from a secure and compliant environment.
The reality is that it only takes one misplaced wildcard in a permissions policy or a single wrong click to
introduce a security risk.
Eight in 10 companies across the US have experienced at least one data breach due to
cloud misconfigurations
2020 IDC Cloud Security Survey Highlights
Cloud misconfiguration is one of the two most common initial threat vectors in data breaches. Data from
the afore mentioned study by IDC and Ermetic showed that access-related vulnerabilities are behind 83%
of cloud security breaches. The report also showed that larger companies were at higher risk (60% of
businesses with 10,000 or more employees) of experiencing these data breaches than companies with
fewer employees. This is likely because the bigger the business, the more possible entry points to sneak
into your system. Additionally, companies don’t use all the permissions they have access to which enables
hackers to take advantage of accounts with misconfigured permissions in order to access sensitive data.9
7
2020 IBM X-Force Threat Intelligence Index
8
2020 IBM Cost of a Data Breach Report
Page 7
Cloud Security Challenges
The yearly financial average loss due to compromised cloud accounts for the 662 US organizations
represented in one study was estimated at 6.2 million dollars.9 And in the 12 months before the publication
of that study, this figure represented an average of 3.5% of the companies’ total revenues—a significant
chunk of their budget. The data from the Cost of a Data Breach 2022 report by IBM and the Ponemon
Institute showed that the average cost of a data breach for a hybrid cloud environment was 3.61 million
dollars—which is less than other cloud environments (including private, public, and on-premises).7 In IBM’s
2022 report, they found that the average cost of data breaches was up to an all-time high of 6.35 million
dollars—an increase of 150,000 dollars from the previous year.
The majority of the breaches involve misconfigured AWS S3 buckets, but also happen with databases like
MongoDB, or Elasticsearch instances. AWS S3 (Simple Storage Service) is one of the most popular cloud
storage tools for everything from server logs to customer data. There are legitimate use cases for an S3
bucket to be publicly accessible – as is the case when hosting public-facing assets on a website. But in
most cases, they should be kept private and encrypted.
Not every data breach happens due to cloud misconfigurations, but this element often
plays a key role in the attack kill chain
S3 buckets have attracted a lot of attention in recent years due to many high-profile data breaches
affecting companies like Uber, FedEx, Adidas, Shopify, Accenture, and even the United States Department
of Defense. All these breaches had one thing in common – the administrator managing the service
misconfigured some security settings, leaving it open to the public. And while not every data breach
happens due to configuration issues, this element is prevalent and often plays a key role in the attack kill
chain, as we’ve seen again in the recent attacks against vulnerable Redis server ports.
5
2020 State of the Cloud Report, Flexera
6
4 Trends Impacting Cloud Adoption in 2020, Gartner
7
2020 IBM X-Force Threat Intelligence Index
8
2020 IBM Cost of a Data Breach Report
9
The Cost of Cloud Compromise and Shadow IT
Page 8
Cloud Security Challenges
This means that cloud users are the ones responsible for properly configuring their own guest operating
systems, databases, and applications. They should take care of such areas as network traffic security,
OS and firewall configuration, application security, patching, identity, and access management, and, most
critically, the safety of customer data. Regardless of the cloud service, you’re responsible for securing your
own space within that cloud.
To stay compliant with the laws and regulations, organizations need to understand and deploy cloud
services with specific configurations and in a very specific way. Each standard has its own set of rules
and guidelines and must be configured to support any clouds an organization is using. Additionally, the
regulatory landscape is always changing - many new standards have been born in the cloud, such as CIS
benchmarks or AWS Well-Architected Framework. Retaining compliance becomes a never-ending task.
To sum up, organizations end up with a multifaceted challenge. The multitude of cloud services, their
configuration options, combined with hundreds of developers and a changing regulatory landscape can
quickly lead to configuration chaos. In addition, the speed of change in the cloud is now so high that
mistakes are almost inevitable.
Page 9
Solutions
Solutions
Manual auditing
If you are just starting out with the cloud and don’t use too many services, you may be able to audit your
cloud infrastructure manually. But, overall, cloud environments have become too large and complex for the
vast majority of enterprises to rely on manual security tools. Manual approaches simply cannot keep up with
the constantly evolving nature of the cloud. Any review process would quickly become overwhelming and
consume hours of developers’ time.
For example, even configuring only 10 services, each with varying granularities of authorization policies,
across several accounts, different applications, and compliance contexts is extremely hard. Then, if you use
multiple providers there are just too many settings to track. To find misconfigurations in such environments
is like trying to find a needle in a massive haystack, and to make things worse, a needle that’s constantly
moving. Even if you could track them all, the time required to manually fix them would still leave you exposed.
Page 10
Solutions
Scripted Reviews
Since manual security can’t keep pace with a growing cloud footprint, organizations need automated tools
to address these risks. Many teams start to script the review process based on industry best practices.
Some organizations implement home-grown scripts, others use open source tools, such as Aqua Trivy.
By ensuring that the same review process is followed continuously, these tools are much better at detecting
infrastructure weak points.
While this approach saves organizations a lot of time, maintenance and change management are still a big
problem. You need a whole team to run it, review the results, and implement the changes. It’s especially
not well-suited for enterprise-scale, as in large organizations with many cloud accounts you will have to
aggregate the individual scripts and provide visibility and data retention at the corporate level.
The cloud providers’ approach has been one of making visibility and some basic security configurations
easier but has steered clear of more advanced security controls. Moreover, built-in security tools will lock
you in even further to one specific cloud provider.
Each of these approaches has certain limitations and doesn’t provide full visibility,
automation, and remediation to address the problem efficiently, especially at scale.
A more comprehensive and consistent approach is necessary. Secure cloud configuration
must be a dynamic and continuous process and include automated remediation.
To meet the needs of the changing environment, organizations with hundreds of
developers continuously releasing new code into production should look for a fully
automated cloud security and compliance solution. That’s where the concept of
Cloud Security Posture Management comes into play.
Page 11
What is Cloud Security Posture Management?
The concept of CSPM is to enable organizations to automatically discover, assess, and remediate security
configuration issues and gaps across multiple cloud providers and accounts. This approach ensures that at
any given moment you have a consistent, secure, and compliant cloud infrastructure.
The CSPM term was coined by Gartner and according to their description,“CPSM offerings continuously
manage cloud risk through the prevention, detection, response, and prediction of where excessive cloud
infrastructure risk resides based on common frameworks, regulatory requirements and enterprise policies.
The core of CSPM offerings proactively and reactively discover and assess risk/trust of cloud services
configuration (such as network and storage configuration), and security settings (such as account privileges
and encryption)”10.
With this access, CSPM tools assess the current security posture against best practices, policies, and
compliance frameworks and help detect such issues as:
Through 2024, organizations implementing a CSPM offering and extending this into
development will reduce cloud-related security incidents due to misconfiguration by 80%
10
Gartner, Innovation Insight for Cloud Security Posture Management, 2019
Page 12
What is Cloud Security Posture Management?
Compliance reporting
CSPM provides reporting for common compliance frameworks and standards, such as PCI-DSS, HIPAA, AWS
Well-Architected Framework, GDPR, CIS Benchmarks, NIST, and ISO27001, and various custom compliance
requirements. Organizations should have the opportunity to filter reports by region, cloud provider service
category (e.g., AWS EC2, AWS S3), severity level, etc., and generate their own customizable reports.
Page 13
Meet Aqua CSPM
Expert Remediation
Guidance
Page 14
Meet Aqua CSPM
Page 15
Conclusion
Conclusion
With businesses rapidly moving to the cloud, understanding the unique cloud
security challenges is essential for managing risks. However, many organizations
struggle to find the right tools to adequately address them.
An ever-increasing complexity of dynamic cloud environments and the current pace of change make manual
configuration ineffective and, at a large scale, impossible. In such context, CSPM becomes critical for
tackling security issues across the IaaS cloud stack.
With Aqua CSPM, organizations can continuously monitor and manage their security posture across multi-cloud
infrastructure and detect thousands of threats in their cloud accounts. To amplify the benefits of the CSPM
tool, it’s essential to weave it into your larger cloud native security strategy, one that covers your entire
technology stack from infrastructure to workloads.
Securing modern agile environments requires a holistic approach. It means embedding security across
an entire application lifecycle: in the build process from the start and in a runtime environment as well.
By combining cloud workload protection for VMs, containers, and serverless, with cloud infrastructure
best practices you can achieve full-stack security across all your cloud native deployments.
Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction.
The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build,
secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial
services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning
containers, serverless functions, and cloud VMs.
Schedule demo ›