{"id":17979,"date":"2020-12-28T12:24:29","date_gmt":"2020-12-28T12:24:29","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=17979"},"modified":"2022-11-17T12:46:14","modified_gmt":"2022-11-17T12:46:14","slug":"cloud-bucket-vulnerability","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/","title":{"rendered":"Cloud Bucket Vulnerability Management"},"content":{"rendered":"<p><a href=\"https:\/\/www.future-processing.com\/blog\/the-essential-guide-to-cloud-strategy\/\" target=\"_blank\" rel=\"noopener\">The movement to the cloud<\/a> means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage services \u2014 or \u201cbuckets\u201d \u2014 offer added <a href=\"https:\/\/www.esecurityplanet.com\/applications\/application-security-definition\/\">application security<\/a>, they have also consistently proven vulnerable.<\/p>\n<p>A bucket is a virtual storage unit provided and <em>partly<\/em> maintained by a cloud services provider. Much like a file folder on your computer, buckets store data in place of on-location IT infrastructure. As cloud computing has become increasingly popular, bucket breaches have exposed millions of records to the public Internet. The good news: most cloud bucket vulnerabilities are due to misconfiguration and are manageable with appropriate attention to detail.<\/p>\n<p><strong>Also Read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">Top Threat Intelligence Platforms (TIP) for 2021<\/a><\/p>\n<h2><a name=\"identify\"><\/a>Identify cloud bucket vulnerabilities<\/h2>\n<p>Since 2004, there have been <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/biggest-data-breaches-in-history\/\">11,000 US data breaches<\/a>. Organizations affected include Verizon, Accenture, Home Depot, Yahoo, Capital One, LinkedIn, and the Pentagon. These breaches left contact information, account passwords, credit card numbers, private photos, and more exposed.<\/p>\n<p>While buckets are private-by-default, plenty of buckets are for public use and reconfigured for that purpose. But in the process of adjusting the bucket\u2019s configurations comes the greatest risk to your <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">cloud security<\/a>. Enumeration of different cloud services has frequently found buckets granting read-only or full admin privileges to general platform users or anyone online. Missing just one security checkbox for your organization\u2019s cloud can open the door to any bad actor.<\/p>\n<p><strong>Also Read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">Top Vulnerability Scanning Tools<\/a><\/p>\n<h2><a name=\"reliance\"><\/a>Reliance on cloud computing grows<\/h2>\n<p>Gartner reports that by 2024, more than <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/cloud-shift-impacts-all-it-markets\/\">45% of IT spending<\/a> on infrastructure, application software, and business process outsourcing will shift from traditional solutions to the cloud.<\/p>\n<p>This increasing investment and reliance on cloud technology means that targeting misconfiguration for users isn\u2019t going away. Through a shared responsibility model, cloud providers are only responsible for the security of their cloud infrastructure\u2014everything you put into the cloud is your responsibility.<\/p>\n<p>Cloud vendors have been criticized for not emphasizing the risk of misconfiguration and cloud bucket vulnerability, but the primary culprit continues to be user error. <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/is-the-cloud-secure\/\">Gartner also predicts through 2025<\/a>, 90% of organizations that fail to control public cloud use will inappropriately share sensitive data, and 99% of cloud security failures will be the customer\u2019s fault.\u00a0 No matter the provider, misconfiguration is frequently rooted in <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity access management (IAM)<\/a>.<\/p>\n<p><strong>Also Read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/casb\/\">What is Cloud Access Security Broker (CASB)?\u00a0\u00a0<\/a><\/p>\n<h2><a name=\"secure\"><\/a>Secure your buckets<\/h2>\n<p>In 2020, three cloud providers made up <a href=\"https:\/\/www.canalys.com\/trends\/room\/worldwide-cloud-infrastructure-services-Q2-2020\">57% of the cloud market share<\/a>:<\/p>\n<ul>\n<li>Amazon Web Services (AWS) Simple Storage Service or S3<\/li>\n<li>Microsoft Azure\u2019s Blob Storage<\/li>\n<li>Cloud Storage for Google Cloud Platform (GCP)<\/li>\n<\/ul>\n<p>Whether you currently use one of these industry staples or are looking at the transition to cloud computing, recognizing vulnerabilities to your cloud bucket security and the action steps needed to resolve them is invaluable.<\/p>\n<h3>Amazon Web Services (AWS)<\/h3>\n<p>Since 2006, Amazon Web Services (AWS) has been the leading provider of cloud computing services. Common misconfigurations for S3 buckets include adding sensitive data to an incorrect bucket or a public bucket or incorrectly setting bucket and object permissions. AWS has been criticized for its \u201cany authenticated AWS users\u201d access option and inconsistent access control list (ACL) and bucket policies.<\/p>\n<p>Like other cloud vendors, AWS S3 buckets can be readily available online for users and potential bad actors. In the last year, vpnMentor\u2019s research team has uncovered multiple data leaks from AWS S3 buckets. For UK-based CHS Consulting, they found passport scans, tax documents, background checks, job applications, and salary details. For Canada-based Data Deposit Box, 270,000 private files including personally identifiable information (PII) like login credentials, IP addresses, email addresses, and data descriptions were exposed.<\/p>\n<p>Solutions offered by AWS include monitoring your S3 buckets using AWS Config, building your S3 monitoring solution with AWS CloudTrail or Lamda, command-line testing with S3 Inspector, AWS IAM, and the AWS Trusted Advisor tool. AWS offers several considerations for preventative <a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/security-best-practices.html\">security practices for S3 buckets<\/a>.<\/p>\n<h3>Microsoft Azure<\/h3>\n<p>In 2020, Microsoft Azure celebrated its tenth anniversary since joining the cloud environment marketplace. Common vulnerabilities for Azure blobs involve misconfigurations with role-based control access (RBAC) and multi-factor authentication (MFA), encryption for data at rest, activity logs, network security groups (NSGs) with overly permissive rules, and unintentionally exposing resources to the public.<\/p>\n<p>In 2019, misconfigured blobs <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/01\/22\/access-misconfiguration-for-customer-support-database\/\">exposed 250 million records to the public for 25 days<\/a> before Microsoft resolved the misconfiguration to restrict the database and prevent unauthorized access. Earlier in the same year, unsecured blobs for the UK-based Tesco parking app potentially exposed millions of time-stamped number plate images across 19 Tesco car parks.<\/p>\n<p>Azure is highly configurable by design leaving room for user error. <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/01\/22\/access-misconfiguration-for-customer-support-database\/\">Microsoft notes<\/a>, \u201cMisconfigurations are unfortunately a common error across the industry&#8230; As we\u2019ve learned, it is good to periodically review your configurations and ensure you are taking advantage of all protections available.\u201d<\/p>\n<p>Microsoft offers several <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/blobs\/security-recommendations\">security recommendations for Azure<\/a> regarding data protection, IAM, networking, logging, and monitoring. <a href=\"https:\/\/www.esecurityplanet.com\/products\/microsoft-azure-active-directory\/\">Azure Active Directory (Azure AD)<\/a> also offers added security and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/common\/storage-auth-aad\">ease of use for blob authorization<\/a>.<\/p>\n<h3>Google Cloud Platform (GCP)<\/h3>\n<p>The Google Cloud Platform (GCP) was founded in 2008 and has since seen Azure surpass their market position. GCP is vulnerable to mistakenly granting \u2018allUsers\u2019 or \u2018allAuthenticatedUsers\u2019 access to their bucket, exposing data to anyone online or Google users. Like AWS, moving objects between buckets or placing buckets under bucket folders with different configurations could put your private data in a publicly available bucket.<\/p>\n<p>In an enumeration of Google Cloud buckets in 2020, the <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/google-cloud-buckets-unauthorized-access-report\/\">CompariTech cybersecurity research team<\/a> found 131 (~6%) of 2,064 buckets were vulnerable due to misconfiguration. The more than 6,000 documents uncovered included passports, birth certificates, and personal profiles. In 2019, One GCP breach of 1.2 billion records exposed a mass database of social media profiles, 50 million unique phone numbers, and 622 million unique email addresses.<\/p>\n<p>To mitigate the risk of a breach, secure your organization\u2019s IAM permissions and policy, utilize GCP virtual private cloud (VPC) service controls, and encrypt your storage objects. GCP offers various <a href=\"https:\/\/cloud.google.com\/storage\/docs\/gsutil\/addlhelp\/SecurityandPrivacyConsiderations\">recommendations for security considerations<\/a> relating to transport layer security, local file storage, access control lists, proxy usage, encryption at rest, data privacy, and measurement data.<\/p>\n<p><strong>Also Read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">Top Security Information and Event Management (SIEM) Products<\/a><\/p>\n<h2><a name=\"preserve\"><\/a>Preserve your cloud bucket security<\/h2>\n<p>When managing your cloud infrastructure, relying solely on security pre-configurations or ignoring your bucket for lengths of time can be a recipe for disaster. If you are storing sensitive data in the cloud, additional steps to protect your <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\">network security<\/a> are essential. An evolving cloud ecosystem requires IT professionals to actively follow trends and take action to preserve your organization\u2019s cloud bucket security.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ee611d20c-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ee611d20c\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ee611d20c\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ee611d20c\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ee611d20c\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ee611d20c\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ee611d20c\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage services \u2014 or \u201cbuckets\u201d \u2014 offer added application security, they have also consistently proven vulnerable. A bucket is a virtual storage unit provided [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":17980,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21],"tags":[],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[389],"class_list":["post-17979","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","b2b_audience-implementation-and-support","b2b_product-managed-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Bucket Vulnerability Management | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Cloud bucket breaches have exposed millions of records to the public Internet. Here&#039;s how to avoid costly misconfigurations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Bucket Vulnerability Management | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Cloud bucket breaches have exposed millions of records to the public Internet. Here&#039;s how to avoid costly misconfigurations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-28T12:24:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-17T12:46:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1094\" \/>\n\t<meta property=\"og:image:height\" content=\"809\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Cloud Bucket Vulnerability Management\",\"datePublished\":\"2020-12-28T12:24:29+00:00\",\"dateModified\":\"2022-11-17T12:46:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\"},\"wordCount\":1088,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png\",\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\",\"name\":\"Cloud Bucket Vulnerability Management | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png\",\"datePublished\":\"2020-12-28T12:24:29+00:00\",\"dateModified\":\"2022-11-17T12:46:14+00:00\",\"description\":\"Cloud bucket breaches have exposed millions of records to the public Internet. Here's how to avoid costly misconfigurations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png\",\"width\":1094,\"height\":809},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Bucket Vulnerability Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Bucket Vulnerability Management | eSecurity Planet","description":"Cloud bucket breaches have exposed millions of records to the public Internet. Here's how to avoid costly misconfigurations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Bucket Vulnerability Management | eSecurity Planet","og_description":"Cloud bucket breaches have exposed millions of records to the public Internet. Here's how to avoid costly misconfigurations.","og_url":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/","og_site_name":"eSecurity Planet","article_published_time":"2020-12-28T12:24:29+00:00","article_modified_time":"2022-11-17T12:46:14+00:00","og_image":[{"width":1094,"height":809,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png","type":"image\/png"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Cloud Bucket Vulnerability Management","datePublished":"2020-12-28T12:24:29+00:00","dateModified":"2022-11-17T12:46:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/"},"wordCount":1088,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png","articleSection":["Cloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/","url":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/","name":"Cloud Bucket Vulnerability Management | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png","datePublished":"2020-12-28T12:24:29+00:00","dateModified":"2022-11-17T12:46:14+00:00","description":"Cloud bucket breaches have exposed millions of records to the public Internet. Here's how to avoid costly misconfigurations.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/cloud-vulnerabilities.png","width":1094,"height":809},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cloud Bucket Vulnerability Management"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17979"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17979"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17979\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17980"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=17979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=17979"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=17979"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=17979"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=17979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}