Research On The Evolving State Of Cloud Security - Alert Logic

1y ago
24 Views
2 Downloads
1.46 MB
18 Pages
Last View : 26d ago
Last Download : 3m ago
Upload by : Ciara Libby
Transcription

Research on the Evolving State of Cloud SecuritySpring 2014

Research on the Evolving State of Cloud SecuritySpring 2014EXECUTIVE SUMMARYKey Findings From Latest Data SetCloud HoneypotsSummary of Results233A LOOK AT THE DATAAlert Logic’s MethodologyEvent vs. Incident45KEY FINDINGSThe Enterprise CloudLatest Data SetTrends Over Time668FINDING NEW THREATSCloud Honeypots10WRAPPING UPThe Data Tells the StoryWhere to Go From Here1212APPENDIXData Tables141

ALERT LOGIC CLOUD SECURIT Y REPORTExecutive SummaryATTACKSINCREASEDACROSS ALL INCIDENT TYPESin both on-premisesand CHP environments.InsightAs more enterpriseworkloads move to theCloud, traditional onpremises infrastructurethreats follow.ENTERPRISES CONTINUE TOADOPT CLOUD, FOCUS ONSECURITYIn early 2012, Alert Logic launched the first in a series of reports on cloudsecurity, with the goal of creating the IT industry’s first assessment of securityin the cloud for businesses considering the use of cloud computing platforms.Alert Logic’s approach to these assessments, based on data associated with alarge concentration of cloud workloads—i.e., the Alert Logic customer base—has proven to be a pragmatic way of gaining insight into the evolving state ofsecurity in the cloud.As cloud adoption grows, Alert Logic has observed a shift in security concerns.While cloud security remains a major concern, the business benefits of movingapplications to the cloud are too compelling to resist. Now, having largelycommitted to a cloud strategy, IT professionals are redirecting their focus tofinding the best ways to secure their cloud-based applications and data.In the current Cloud Security Report, Alert Logic continues its practice ofuncovering trends that threaten both cloud and on-premises environments.Two interesting observations have emerged. First, there has been an increasein attack frequency in both on-premises and cloud hosting provider (CHP)environments. Second, as more enterprise workloads move into cloud-hostedinfrastructure, traditional on-premises infrastructure threats follow. Theseobservations are intuitively consistent with the growing adoption of cloudservices in the enterprise.KEY FINDINGS FROM THE LATEST DATA SETDrawing on security data obtained from both on-premises and CHPinfrastructure end-users between April 1 and September 30, 2013, Alert Logicfound the following: 2Attacks increased across all incident types, in both on-premises and CHPenvironments, with only one exception, suggesting more attacks of alltypes are occurring.

Alert Logic Cloud Security Report Spring 2014www.alertlogic.com CHP environments saw significant increases in attacks, with brute force attacksclimbing from 30% to 44% of customers, and vulnerability scans increasingfrom 27% to 44%. These two types of incidents have historically been far morelikely to target on-premises environments, but are now occurring at nearequivalent rates in both CHP and on-premises environments.Malware/botnet attacks, historically the most common attacks in theon-premises datacenter, are on the rise in CHP environments.CLOUD HONEYPOTSIn each edition of the Cloud Security Report, Alert Logic selects an area foradditional investigation. For this report, we deployed honeypots in publiccloud infrastructures around the world in order to observe the types andfrequencies of attacks, and how the attacks vary geographically.Key observations from honeypot data: The highest volume of attacks occurred in Europe, where honeypotsexperienced four times the number of attacks as the U.S., and double thenumber of attacks as Asia. Honeypots in Asia experienced more than twiceas many attacks as those in the U.S.14% of the malware collected through our honeypot network wasconsidered undetectable by 51 of the world’s top antivirus vendors.SUMMARY OF RESULTSThese results demonstrate that organizations movingto the cloud must implement enterprise-gradesecurity solutions to protect their cloud workloads.These solutions must be cloud-deployable, and mustcontain advanced security content and analyticsconsistent with the attack vectors prevalent in thecloud. In other words, organizations cannot rely onlegacy approaches to security to support their cloudinfrastructure. They must find solutions that deliverprotection specifically for the cloud.CLOUD HONEYPOTS:Incident Attack Type by RegionFor this Cloud Security Report,we deployed honeypots inpublic cloud infrastructuresaround the world.US HONEYPOTSMicrosoft SQL Server12%MySQL13%HTTP23%Microsoft DS Service51%RPC0%FTP0%EUROPE HONEYPOTSMicrosoft SQL Server13%MySQL13%HTTP13%Microsoft DS Service35%RPC13%FTP13%ASIA HONEYPOTSMicrosoft SQL Server4%MySQL6%HTTP4%Microsoft DS Service85%RPC0%FTP0%3

A LOOK AT THE DATAAlert Logic’s MethodologyThe data used in this report is fromreal-world security incidents capturedin customer environments that aresecured via Alert Logic’s intrusiondetection system (IDS)1. To correctfor noise and false positives, AlertLogic utilizes a patented correlationengine that evaluates multiple factorsto determine whether networkbased events are authentic securityincidents. Finally, a team of GlobalInformation Assurance Certification(GIAC)-certified security analystsreviews each incident to ensurevalidity and to confirm the threat,further minimizing false positives.ALERT LOGIC CUSTOMER DATA SETCLOUD HOSTING PROVIDER20%ON-PREMISESAlert Logic regularly refines its threatdetection process. This, along withthe growing number of customersincluded in the analysis, means thatcomparisons between reports or timeperiods are only directionally valid.Also in this report, honeypot datawas gathered using low-interactionsoftware that emulates a vulnerableOS. Common ports were left open toentice attackers to interact with thesystem. A low-interaction honeypotsimulates services at a high level, isnot a full operating system, and istypically easier to compromise than ahardened system. The type of activityobserved in these instances is oftenfrom scripts, botnets, network probes,and malware installations that attemptto compromise the hosts/target.Alert Logic’s honeypots monitoredconnections to common ports, andgathered statistics on IP, geo-location,and malware, if installed.4FIG. A80%ON-PREMISES? HOSTED? CLOUD?How Alert Logic categorizes its customer dataAlert Logic categorizes its data into two environments: on-premises(formerly called enterprise datacenter) and cloud hosting provider(CHP). On-premises customers own and manage their own ITinfrastructure. CHP customers are an aggregation of customersutilizing solutions from a cloud or hosting partner, spanning fromInfrastructure-as-a-Service to a managed or dedicated hostingenvironment. For a full list of the CHPs included in this report, seeAppendix page 15.CLOUD HOSTING PROVIDER1ON-PREMISESFor future Cloud Security Reports, Alert Logic will incorporate security event and incident datafrom Alert Logic’s Log Manager and Web Security Manager solutions to expand analysis anddata sets.

EVENT VS. INCIDENTThis report is based on 232,364 verified security incidents, identified frommore than one billion events observed between April 1 and September 30,2013. The customer set includes 2,212 organizations across multiple industries,located primarily in North America and Western Europe. CHP environmentsaccount for 80% of the customers, while the remaining 20% represent onpremises datacenters. Alert Logic categorizes an event as evidence ofsuspicious behavior detected via an IDS signature, and defines an incident asan event or group of events that has been confirmed as a valid threat basedon advanced automated analysis by Alert Logic’s correlation engine, andverification by certified analysts. Alert Logic also applied this data set to a yearover-year comparative analysis with the two previous six-month data sets.INCIDENT CLASSIFICATIONSINCIDENT METRICSIncident OccurrencePercentage of customersexperiencing a specific classof incident at least onceduring the study period.Provides a view of theprobability of attack.Incident FrequencyAverage number of incidentsof each type per impactedcustomer. Provides anunderstanding of attackerpersistence and tenacity.Threat DiversityMalware/BotnetBrute ForceVulnerability ScanMalicious softwareinstalled on a host andengaging in unscrupulousactivity, data destruction,information gathering orcreation of backdoors.Exploit attemptsenumerating a largenumber of combinations,typically involvingmultiple credentialfailures, in hopes offinding a weak door.Automatedvulnerability discoveryin applications,services or protocolimplementations.Web App AttackReconApp AttackAttacks targeting thepresentation, logic ordatabase layer of webapps.Activity focused onping sweeps, mappingnetworks, applicationsand/or services.Exploit attemptsagainst applications orservices not runningover HTTP protocol.Average number ofunique incident types (ofthe six classes reviewed)encountered by impactedcustomers in eachenvironment. Provides a viewof the sophistication requiredof a security program.5

KEY FINDINGS:The Enterprise CloudBetween 2013 and 2017,PUBLIC IT CLOUDCOMPUTINGspending will experience acompound annual growth rate of23.5%Web application attacks, bruteforce attacks, and vulnerabilityscans each impact44%of the cloud hosting customer base.One of the most significant technology stories over the past several years hasbeen the broad and rapid adoption of cloud computing as a viable platform.The majority of enterprises already have a formal cloud strategy in place, andanalysts estimate that the growth rate of spending on cloud computing willsoon exceed that of on-premises IT by a multiple of four to six. In September2013, International Data Corporation (IDC)2 predicted that, between 2013 and2017, spending on public IT cloud computing will experience a compoundannual growth rate of 23.5%. By 2017, IDC believes the spending on public ITcloud services will account for one-sixth of overall IT product spending, andwill be responsible for almost half of all increases in the applications, systeminfrastructure software, platform as a service, and basic storage categories.Other analysts concur. At its October 2013 Symposium/IT Expo, Gartner3forecasted that, by 2016, the bulk of new IT spending will be cloud-basedrather than on-premises.Widespread acceptance of cloud computing in enterprise IT increases theneed to secure cloud infrastructure in a way that rivals protection of thetraditional datacenter. To meet this requirement, IT and security professionalsmust understand two key dimensions—the types of threats targeting cloudcomputing environments, and whether traditional security technologies canperform effectively in cloud environments.Since 2011, Alert Logic has been analyzing incident data to identify thedifferences between on-premises and CHP environments. Alert Logic’sproduction environment monitors and analyzes the security of data andsystems in both on-premises datacenters and CHPs (where public, privateand hybrid cloud infrastructure is hosted). After examining actual incidentdata, our first Cloud Security Report in February 2012 demonstrated thatfears of the cloud being inherently insecure could largely be put to rest. Whilewe uncovered variances between the two environments with respect to thetypes of incidents observed, these differences related largely to the types ofworkloads deployed and the diversity of infrastructure employed. Subsequentreports have reinforced these findings and conclusion.LATEST DATA SETThe data analyzed for this Cloud Security Report continues to underscore theconclusion that the cloud is not inherently less secure than traditional onpremises environments. It also reveals an interesting new set of observations.The key findings here are that attacks seem to be increasing across allenvironments, and, in parallel, the types of attacks experienced in thecloud are increasingly consistent with the types of attacks experienced in236http://www.idc.com/getdoc.jsp?containerId 3015

FIG. BINCIDENT OCCURRENCE:PERCENT OF CUSTOMERS IMPACTEDApp Attack16449Brute Force4456Malware/BotnetRecon11Cloud HostingProvider18640Vulnerability Scan31Web ApplicationAttack44CHP44TOP THREE INCIDENT CLASSESON-PREMISES DATACENTERCLOUD HOSTING PROVIDER44%44%44%Brute ForceVulnerabilityScanWeb ApplicationAttack49%56%40%Brute ForceMalware/BotnetVulnerabilityScanFIG. DINCIDENT FREQUENCY:AVERAGE NUMBER OF INCIDENTS PER IMPACTED CUSTOMERMalware/BotnetReconVulnerability Scan55.7Web 1Brute force attacks andvulnerability scans are nowoccurring at near-equivalentrates in both cloud and onpremises environments.02Malware/Botnet attacks,historically the most commonattacks in the on-premisesdatacenter, are on the rise inCHP environments032.12.2Brute ForceOn-PremisesOn-PremisesFIG. CApp AttackWHAT WE SEE ACROSSALL ENVIRONMENTSCHPOn-PremisesApplication, malware/botnet andrecon attacks remain much morelikely to occur on-premises thanin CHP environments.7

KEY FINDINGS:The Enterprise Cloud (cont’d)on-premises environments. Inprevious editions of the CloudSecurity Report, in addition toquantifying attacks in both onpremises and CHP environments, wedocumented differences in attacktypes between the two types ofenvironments. This most recent datais showing a convergence in attacktypes between on-premises and CHPenvironments. Our hypothesis is thatthe reason for this convergence isthe fact that traditional enterpriseworkloads are increasingly movingto the cloud.Even so, there remains somediversity in attack types betweenCHP and on-premises environments.Web application attacks, brute forceattacks, and vulnerability scanswere the most pronounced attacksexperienced in CHP environments,each impacting 44% of the cloudhosting customer base. Malware/botnet attacks (56%) and bruteforce attacks (49%) were the mostprominent threat vectors in onpremises datacenter environments.And while application attacks,malware/botnet attacks andrecon attacks remain much morelikely to occur on-premises thanin CHP environments, the ratesof occurrence of web applicationattacks and vulnerability scans inCHP environments exceed those inon-premises environments by 13%and 4%, respectively.For impacted customers, i.e., thosethat were the target of an attack,the frequency of attack in most8categories was also generally greateramong on-premises customers.Overall, threat diversity (the averagenumber of distinct incident classesencountered by impacted customersamong the six categories reviewed)is roughly equivalent in both the CHPand on-premises environments.TRENDS OVER TIME:CLOUD HOSTING VS.DATACENTERFrom the macro view, Alert Logicsaw incidents increase acrossboth environments. On-premisesenvironments are still morelikely to be attacked than cloudenvironments, but there has beena consistent increase in cloudattacks as well. As cloud adoptioncontinues to accelerate, brute forceattacks—which increased in onpremises environments as well—have surged among CHPs, likelydue to the increasing presence ofKey ObservationsCloud environments requiremore sophisticated securityprograms than in prior years.“theft-worthy” data in the cloud.Vulnerability scans, typically coupledwith brute force attacks in terms ofattack style and process, increaseddramatically in both environments.The percentage of customersimpacted by vulnerability scansincreased from 27% to 44% amongCHPs, and from 28% to 40% inon-premises datacenters. Malware/botnet attacks, highly prevalentin the desktop-rich on-premisesdatacenter environment, remainrelatively low among CHPs. TheyALERT LOGIC CUSTOMER DATA SETAlert Logic studied incident data fromover 2,200 customers in a broad range of industries80%FIG. ECLOUD HOSTING PROVIDER20%ON-PREMISES

Alert Logic Cloud Security Report Spring 2014www.alertlogic.comhave, however, more than doubled, which could be attributed to cloud-basedvirtual desktop infrastructure, mobile applications, or end-point applications.In the Spring 2013 Cloud Security Report, Threat Diversity was 1.8 and 2.5for CHP and on-premises, respectively. While threat diversity for on-premisescustomers was unchanged when compared to the 2013 report, it rose to 2.3in cloud environments based on growing workloads. This growth in threatdiversity is another indicator that cloud environments now require moresophisticated security programs than in prior years.FIG. FINCIDENT OCCURRENCE OVER TIME:10/01/12–03/31/13environments as well—have surgedamong CHPs, likely due to theincreasing presence rability scans increased inboth environments:524440%which increased in on-premisesdata in the cloud.CLOUD HOSTING PROVIDERS04/01/12–09/30/12BRUTE nerabilityScanWeb AppAttackCloud HostingProvidersOn-PremisesDatacentersFIG. GINCIDENT OCCURRENCE OVER etRecon2639293118VulnerabilityScanWeb AppAttack9

FINDING NEW THREATS:Cloud HoneypotsCLOUD HONEYPOTSA honeypot is a decoy systemconfigured to be intentionallyvulnerable, deployed to gatherinformation about attackers and theirexploitation methods. While honeypotsare not typically the target of highlysophisticated attacks, they are subjectto many undefined attacks, and providea window into the types of threatsbeing launched against the cloud.Honeypots allow researchers to:Collect new and emergingmalwareIdentify the source of theattacksDetermine attack vectorsBuild a profile of the targetindustry if using specificindustry domainsHoneypots are also deployed in thecorporate space to find attacks thathit a particular company and/orindustry. These honeypots are builton the edge of a corporate network,and made deliberately vulnerable sothat they will be compromised.Data collected: Provides detail on the IPaddresses of the source location Identifies malware in order toreverse engineer Creates signature content forprotecting the applicationstack—network, systems, andapplication—via IDS, log analytics,and web application firewalls Provides insight into the typesof attacks and associatedcharacteristics10In order to uncover attack trendsin the cloud, Alert Logic deployedhoneypots in public cloudinfrastructures around the world toobserve the types and frequenciesof attacks, as well as how the attacksvary geographically.Overall, the highest volume of attacksoccurred in Europe, where honeypotshad four times the number of attacksas the U.S., and double the numberof attacks as Asia. This is likely dueto the presence of highly organizedcrime circuits, which are basicallymalware factories, in Russia andEastern Europe. Malware producedin these “factories” is typically testedin Europe before deployment in theU.S. Similarly, honeypots in Asiaexperienced more than twice asmany attacks as those in the U.S.This finding came as something ofa surprise, given that the U.S. isgenerally considered a morevaluable target.Worldwide, attacks on MicrosoftDS (Port 445) accounted for themajority (51%) of honeypot incidents.Microsoft-DS (port 445) supportsdirect hosted “NetBIOS-less” SMBtraffic and file-sharing in Windowsenvironments, and it represents aneasy target, when open, for accessingfiles and providing the ability to infectsystems. The remainder of the attackswas split relatively evenly amongMicrosoft-SQL (Port 1433), MySQL(Port 3306), HTTP (Port 443), RPC(Port 135) and FTP (Port 21).4When disaggregated by region, thehoneypot data tell a more nuancedstory. In Asia, the preponderance ofattacks (85%) targeted Microsoft-DS.This is likely attributable to the largeamount of pirated (and unpatched)Microsoft software in use in thisregion. In contrast to other areas, asignificant proportion of attacks (23%)in the U.S. were made on HTTP. Thisis perhaps because the U.S. in generalhas more widespread web adoption,and hosts more web and cloudservices than other countries4.Also, 14% of the malware collectedthrough the honeypot network wasconsidered not detectable by 51 ofthe world’s top antivirus vendors.This does not mean that the malwareis considered a zero-day; rather itindicates that a malicious attackerrepackaged an older variant ofmalware such as Zeus or Conficker.While highly sophisticated attacksare unlikely to be launched againsthoneypot environments, analyzinghoneypot data enables us to monitorthe types of threats being launchedagainst the cloud, such as thetypes of malware being deployed,and what specific layers are beingattacked (e.g., the operating system,databases). In some instances, lookingat honeypot data provides an earlywarning system for new malware, oremerging variations of old malware,such as Conficker. By having a betterunderstanding of what attacks aretrying to exploit, and how, Alert orlds-top-100000-websites-are-hosted-infographic

Alert Logic Cloud Security Report Spring 2014www.alertlogic.comis better able to tune security content to appropriatelydetect and protect against new attacks in the cloud.In addition, the use of honeypots provides additionalvisibility into what security solutions are best suited todefend against these types of attacks.The bottom line is the honeypot results clearly indicatethat an organization moving to the cloud must understandand pay close attention to their security and compliancerequirements, and appropriately source a solution.TOTAL HONEYPOT ATTACKS BY REGIONFIG. H8%12%8%11%FTPMicrosoft SQL ServiceMySQLRPCGLOBALHONEYPOTS51%10%Microsoft DS SIAHONEYPOTSMicrosoft SQL Server12%Microsoft SQL Server13%Microsoft SQL %Microsoft DS Service51%Microsoft DS Service35%Microsoft DS Service85%RPC0%RPC13%RPC0%FTP0%FTP13%FTP0%11

WRAPPING UP:The Data Tells the StoryDespite apprehension about security risks, mass adoption of cloud platformscontinues to grow, and with it comes an increase in attacks. Overall, the datapresented in this edition of the Cloud Security Report indicates that the threats inthe cloud are growing in two dimensions: the total number of attacks is increasing,and attacks that were historically directed at on-premises environments are nowmoving to the cloud. Although, comparatively, on-premises environments are morefrequent targets, this should not undermine the fact that attacks directed at CHPshave increased significantly and are expected to continue at a rate that matches theaccelerated pace of cloud adoption and the continued migration of more valuableworkloads to the cloud.Whether looking at attacks in on-premises or cloud hosting environments, whetheranalyzing production environments or pure research honeypots, across the spectrumwe see the volume and persistence of attacks continuing to increase.As these attacks increase inpersistence, they are also increasingin sophistication. The threat diversityfor the cloud has increased to rivalthat of on-premises environments.And new threats uncovered by ourhoneypot research demonstratehow top antivirus software vendorscannot be solely relied upon todetect attacks. The continuedfocus by hackers on infiltratingIT infrastructure underscores theimportance of adopting the rightsecurity procedures and tools, andof continuously evaluating andadjusting those procedures andtools as attackers find new waysto thwart defense.WHERE TO GO FROM HERETo enjoy the benefits of the cloudwithout security compromise,organizations must understand the12different roles and responsibilitiesthat exist between a CHP and thecompany deploying their own (orthird-party) applications in thecloud. CHPs deliver core securityfrom their datacenters up to specificlayers (e.g., the hypervisor for thecompute layer). Responsibility for theapplication and its underlying host/operating system and network fallsto the customer. This makes it anabsolute necessity that customerseducate themselves on their businessand application requirements forsecurity and compliance, map theserequirements to the right CHPs,and source the right productsand build the right processes tomanage events, incidents andongoing security in the cloud. It’salso important to note that cloudproviders differ in their defaultsecurity settings. Some take anKey ObservationCloud providers differin their default securitysettings. Some take an “alldoors closed” approach,while others default torequiring users to definetheir own security.“all doors closed” approach, whileothers default to requiring users todefine their own security (i.e., thereis no security protection by default).As attackers adjust their attackpostures, organizations must respond

Alert Logic Cloud Security Report Spring 2014www.alertlogic.comacross the spectrum. Cloud environments are designed to operatedifferently than legacy enterprise architectures (e.g., with respect to networkarchitecture, provisioning, and scaling). It is important to find proven cloudsecurity solutions to protect mission critical applications, confidential data,and the underlying infrastructure that supports those applications, includingnetwork, compute, database, and identity management. An overall solutionshould address: Network: Firewall, Intrusion Detection, and Vulnerability Scanningprovide detection and protection, while also lending visibility intosecurity health.Compute: Anti-Virus, Log Management and File Integrity Managementprotect against known attacks, provide compliance and security visibilityinto activity within an environment, and understand when files have beenaltered—maliciously or accidentally.Application: A Web Application Firewall will protect against thelargest threat vector in the cloud: web application attacks. Encryptiontechnologies are ubiquitous for data in-flight protection, and somecompanies select encryption for data-at-rest when necessary, assumingapplications can support it.Application Stack: Security Information Event Management (SIEM) canaddress the big data security challenge by collecting and analyzing alldata sets. When deployed with the right correlation and analytics, thiscan deliver real-time insight into events, incidents, and threats across acloud environment.The design and configuration of these types of services will be drivenby requirements, including an organization’s security and compliancestandards, application and data sensitivity, risk assessment, and the policiesimplemented by the service providers an organization selects.EDUCATIONFOR THE RESTWhile the cloud delivers manybenefits including agility,performance, scalability, andcost management, organizationsthat have historically been lesssecurity conscious or technicallysophisticated, along with thosewhose security expertise doesnot include cloud-specificsecurity solutions, can be atrisk if they do not properlyresearch their deploymentrequirements and find provensolutions. Organizationsmust also factor in the rise of“Shadow IT.” “Shadow IT” isdefined as individual employeesand business groups deployingapplications in the cloud thathave not yet been vetted byIT to ensure the organization’ssecurity and compliancestandards are met. Given this,security consciousness andstandards need to be raisedthroughout the enterprise tobalance the value of the cloudwith the requirements of goodsecurity and compliance. Anorganization’s security posturemust extend from edge devicesto the heart of the business—the datacenter—whether thatdatacenter is on-premises,within the cloud, or hybrid.13

APPENDIX:Data TablesIncident Occurrence/Frequency TableAlert Logic Customers April 1, 2012–September 30, 2013CLOUD HOSTING PROVIDER (CHP) VS. ON-PREMISESINCIDENT CLASSCLOUD cyCustomersImpactedFrequencyApp Attack4%2.216%2.1Brute 518%6.4Vulnerability Scan44%13.440%9.7Web App Attack44%31.931%46.7ReconThreat Diversity2.32.5INCIDENT TYPES OVER TIMEINCIDENT TYPESAPRIL 1, 2012–SEPTEMBER 30, 2012OCTOBER 1, 2012–MARCH 31, 2013APRIL 1, 2013–SEPTEMBER 30, 2013CHPOn-PremisesCHPOn-PremisesCHPOn-PremisesApp Attack3%15%3%19%4%16%Brute 56%Recon9%23%3%15%6%18%Vulnerability Scan27%28%29%26%44%40%Web App Attack52%39%42%29%44%31%14

Alert Logic Cloud Security Report Spring 2014www.alertlogic.comTOTAL HONEYPOT ATTACKS BY REGIONINCIDENT ySQL28,6756%30,14513%127,62213%SQL %860%125,91713%Service Provider Partners Included In StudySERVICE PROVIDER PARTNERWEBSITESERVICE PROVIDER PARTNERWEBSITEAmazon Web Services (AWS)aws.amazon.comMicrosoft Azureazure.microsoft.comAtos .comNaviSitenavisite.comDatapipedatapipe.comPEER 1 Hostingpeer1.comDimension Netrig.netInternapinternap.comRook ard Availability Servicessungardas.comLayered s.netWindstream Communicationswindstreambusiness.com15

CONTRIBUTORSLead ResearcherStephen CotyLead AnalystsPatrick SnyderKevin StevensEditorsRahul BakshiMaureen RogersSheridan Scott Copyright 2014 Alert Logic, Inc. All rights reserved.16

CORPORATE HEADQUARTERSAlert Logic, Inc.1776 Yorktown, 7th FloorHouston, TX 77056UK OFFICE1 Farnham RdGuildfordSurreyGU2 4RGUnited Kingdom Copyright 2014 Alert Logic, Inc. All rights reserved. alertlogic.com

Alert Logic's approach to these assessments, based on data associated with a large concentration of cloud workloads—i.e., the Alert Logic customer base— has proven to be a pragmatic way of gaining insight into the evolving state of security in the cloud. As cloud adoption grows, Alert Logic has observed a shift in security concerns.

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. Crawford M., Marsh D. The driving force : food in human evolution and the future.

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. 3 Crawford M., Marsh D. The driving force : food in human evolution and the future.