But what happens if data ends up being stored outside Switzerland or the European Union due to a configuration error? What steps can be taken to prevent such unintentional violations of Swiss or European data protection law (nDSG, GDPR)? We’ve analysed the causes of known compliance violations and investigated why cloud providers alone cannot guarantee full compliance.
Compliance violations in the cloud can have various causes: incorrect configurations, inadequate access controls and human error (based on the shared responsibility model where the user organisation takes charge), to name but a few.
An overview of notable examples, including an analysis of the cause, is provided below:
Cause |
Problem |
Analysis |
Misconfiguration of security systems |
A misconfiguration of the security systems allowed unauthorised access to phone numbers and personal data of millions of users due to incorrectly configured access rights in the database (Facebook 2019). |
The main cause was the incorrect configuration of access rights – i.e. human error. |
Data scraping* |
A software developer extracted information about millions of users from the Alibaba website due to inadequately protected API access (Alibaba 2019). |
Inadequate implementation of rate limits and access controls made this scraping possible. |
Data of millions of Linkedin users was extracted from publicly accessible profiles (LinkedIn 2021). |
This was due to insufficient monitoring of API access and a lack of mechanisms to detect and defend against automated queries. |
|
Inadequate access controls |
Several data leaks have occurred at Amazon Web Services (AWS). |
This happened because publicly accessible S3 buckets remained unprotected due to a lack of standard security settings and incorrectly implemented access controls. |
A data leak occurred at the provider FlexBooker. |
The data leak affected the data of over three million users. This was due to weak access controls and inadequate encryption, which allowed unauthorised access to the database. |
|
Unauthorised publication of data |
Data from 538 million users (Sina Weibo 2020) was published on the darknet. |
This incident is due to inadequate internal controls and a lack of monitoring of data access. Internal security vulnerabilities and human error were identified as the main causes. |
Incorrect configuration of data storage locations |
Incorrect geographical configurations of data storage locations have resulted in violations of data protection laws such as nDSG and GDPR. |
This is due to data being stored in the incorrect geographic location, which is not permitted. |
Misconfigured, public cloud storage buckets |
A misconfigured cloud storage bucket resulted in sensitive data being publicly accessible. |
This is due to the incorrect configuration of cloud resources, including the implementation of strict access controls and regular security checks. |
* Data scraping refers to the use of automated programs or scripts to extract information from websites.
Analysing past breaches provides valuable insights for improving security measures and preventing future incidents. It emphasises the need for a proactive and comprehensive security strategy to prevent cyber security incidents:
Although cloud providers guarantee robust security measures, the final responsibility for compliance lies with the company.
To ensure secure cloud computing, it is crucial that companies develop their own security strategies and measures and implement them carefully.
We recommend considering the following aspects to ensure compliance:
Preventing compliance violations requires a proactive approach that includes robust security measures, continuous monitoring and adherence to best practices:
The Cloud Security Alliance (CSA) lists its top eleven threats in the area of cloud computing for 2024. This list is consistent with our experience with our customers and is thus also worth mentioning here:
Compliance breaches in cloud environments can often be prevented through careful configuration management, strong access controls, regular security checks and continuous monitoring.
Lessons learnt from past breaches can contribute to the development of more robust security practices. While cloud providers offer basic security measures, the ultimate responsibility for compliance lies with the organisation.
A proactive and informed approach to cloud security is therefore important to minimise the risk of compliance breaches, protect sensitive data and maintain the trust of customers and regulators.
By integrating these practices into your cloud strategy, you can minimise the risk of compliance breaches, protect sensitive data and secure the trust of customers and regulators.
Ultimately, your goal is to use cloud-based services in your company with a clear conscience because compliance violations can be reliably ruled out. Do you want to be sure that you’ve taken all the necessary steps? Let our team of experts run a cloud security assessment to identify any risks in your security setup despite all the security measures.
And there’s more: our specialists will also provide you with specific technical, organisational and personnel recommendations for action and suggestions for implementing quick wins.
Are you planning to migrate your company’s IT to the cloud? A team of over 350 InfoGuard experts will support you. Whether with our Risk Management & Compliance Services or 24/7 Cyber Defence & Incident Response Services from our ISO 27001-certified Cyber Defence Center (CDC), we’ll support you with the implementation.
Caption: with AI generated image