
The main focus of security in cloud computing is the software as a service (SaaS) offering. Storage solutions such as Apple’s iCloud, Google’s Drive, and Dropbox’s self-titled storage service are leaders in the industry. The reason that cloud storage is the main focus is because attackers most commonly penetrate network defenses to compromise sensitive data. Many companies and personal consumers utilize cloud storage for their sensitive data because it is often more cost efficient or more convenient to have data stored, managed, and backed up by another company. With data in the wrong hands having the potential to compromise anywhere from businesses intellectual property to people’s privacy, securing that data is a requirement not to be taken lightly. As covered earlier in this blog, it is important to balance the three aspects of the CIA triangle: Confidentiality, Integrity, and Availability.
A notable case study of a cloud computing environment being susce
ptible to attack from an anonymous attacker due to poor security practices is in Apple’s iCloud environment. iCloud is a cloud service that is available to anyone who has created a free Apple ID. There are many utilities within the iCloud suite including a mail client, calendar, a device locator, and file storage. On August 31, 2014 in an event dubbed as “The Fappening,” numerous A-list celebrities had nude photographs of themselves leaked onto the Internet. The pictures that were released were all at one point stored in Apple’s iCloud using each celebrity’s Apple ID user name and password to protect it. The initial assumption was that the entire iCloud infrastructure had been attacked and that any files stored in the cloud were compromised. This would prove to be a huge impact on the integrity of cloud service providers as a whole because the ability for an advanced persistent threat to compromise such a high-profile environment would numb both personal and business users from trusting 3rd parties to store their information without strict control over the security of their private data. However, after an internal investigation by Apple, the company released a statement announcing that “these celebrity accounts were compromised by a targeted attack on user names, passwords, and security questions.” This implies that the celebrities that were affected by “The Fappening” mass photo release all had weak passwords and weak security questions protecting those passwords. What is evident is that weak security practices from both Apple and end users of Apple’s iCloud provided malicious attackers with the opportunity to gain privileged access to accounts that they did not own.
In the next blog, I will continue to explain how both Apple and the celebrities could have implemented some best practices to completely avoid this event from occurring.