{"id":25800,"date":"2022-11-17T17:00:00","date_gmt":"2022-11-17T17:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25800"},"modified":"2022-11-17T13:11:23","modified_gmt":"2022-11-17T13:11:23","slug":"cloud-storage-buckets-expose-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/","title":{"rendered":"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data"},"content":{"rendered":"\n<p>Public-facing cloud storage buckets are a data privacy nightmare, according to a study released today.<\/p>\n\n\n\n<p>Members of Laminar Labs&#8217; research team recently found that one in five public-facing cloud storage buckets contains personally identifiable information (PII) \u2013 and the majority of that data isn&#8217;t even supposed to be online in the first place.<\/p>\n\n\n\n<p>The information uncovered by the researchers includes physical addresses, email addresses, phone numbers, driver&#8217;s license numbers, names, loan details, and credit scores.<\/p>\n\n\n\n<p>&#8220;Because this data contains such highly sensitive information as loan details, Bitcoin addresses and conversations about unemployment benefits, we believe that this data has the potential to put the organizations to whom the information belongs at risk,&#8221; Laminar Labs said in a statement.<\/p>\n\n\n\n<p>&#8220;Organizations cannot properly protect data they do not know is exposed,&#8221; the company added. &#8220;And in the shared responsibility model, keeping this data secure is the responsibility of the organization that owns the buckets in which the data resides.&#8221;<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Bucket Vulnerability Management<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Data-Centric View<\/h2>\n\n\n\n<p>According to Laminar, the sensitive data found online includes the following \u2013 it&#8217;s quite a list:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A file containing PII of people who used a third-party chatbot service on different websites, including names, phone numbers, email addresses, and messages sent to the bot (such as people seeking unemployment benefits)<\/li><li>A file containing loan details \u2013 names, loan amounts, credit scores, interest rates, and more<\/li><li>A participant report for an athletic competition, including names, physical addresses, zip codes, email addresses, and medical information<\/li><li>A VIP invite list, including names, email addresses, and physical addresses<\/li><li>A file with names, Ethereum and Bitcoin address information, and block card email addresses<\/li><\/ul>\n\n\n\n<p>Companies need to know what publicly exposed sensitive data is in their environment, Laminar said. Still, doing so can be harder than it seems, since non-public Amazon S3 buckets can contain specific files and objects that are public \u2013 and conversely, buckets that are intentionally public, like hosted websites, can contain PII placed there by mistake.<\/p>\n\n\n\n<p>The answer, according to Laminar, is a data-centric view rather than an infrastructure-centric one, cataloging all data in your cloud environment to ensure that sensitive information is kept private while public files remain accessible.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-shared-responsibility-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Security: The Shared Responsibility Model<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Pervasive Privacy Problem<\/h2>\n\n\n\n<p>Several other companies have warned of similar issues, such as UpGuard, which has detected thousands of breaches related to misconfigured Amazon S3 security settings over the past four years \u2013 including 1.8 million personal records from a database of <a href=\"https:\/\/www.upguard.com\/breaches\/cloud-leak-chicago-voters\" target=\"_blank\" rel=\"noreferrer noopener\">Chicago voters<\/a>, 14 million <a href=\"https:\/\/www.upguard.com\/breaches\/verizon-cloud-leak\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon<\/a> customer records, and <a href=\"https:\/\/www.upguard.com\/breaches\/public-domain-how-configuration-information-for-the-worlds-largest-domain-name-registrar-was-exposed-online\" target=\"_blank\" rel=\"noreferrer noopener\">GoDaddy<\/a> trade secrets and infrastructure information.<\/p>\n\n\n\n<p>&#8220;As long as S3 buckets can be configured for public access, there will [be] data exposures through S3 buckets,&#8221; UpGuard chief marketing officer Kaushik Sen wrote in a <a href=\"https:\/\/www.upguard.com\/blog\/s3-security-is-flawed-by-design\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> earlier this year.<\/p>\n\n\n\n<p>The Mitiga Research Team also recently found hundreds of databases containing PII exposed via the Amazon Relational Database Service (RDS). While RDS snapshots can be used to back up data, those snapshots can expose a range of highly sensitive information.<\/p>\n\n\n\n<p>As the researchers noted in a <a href=\"https:\/\/www.mitiga.io\/blog\/how-mitiga-found-pii-in-exposed-amazon-rds-snapshots\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>, &#8220;a Public RDS snapshot is a valuable feature when a user wants to share a snapshot with colleagues, while not having to deal with roles and policies. In this manner, the user can share the snapshot publicly for just a few minutes&#8230; What could possibly happen?&#8221;<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cnap-platforms-the-next-evolution-of-cloud-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">CNAP Platforms: The Next Evolution of Cloud Security<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Assume the Worst<\/h2>\n\n\n\n<p>Among the data the Mitiga researchers found exposed between September 21 and October 20 of this year was a MySQL database with about 10,000 rows recording car rental transactions, including names, phone numbers, email addresses, marital status, and rental information.<\/p>\n\n\n\n<p>Another MySQL database contained information on about 2,200 users of a dating app, including email addresses, password hashes, birthdates, links to personal images, and private messages.<\/p>\n\n\n\n<p>The researchers recommend leveraging <a href=\"https:\/\/aws.amazon.com\/premiumsupport\/technology\/trusted-advisor\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Trusted Advisor<\/a> to assess your security posture, using CloudTrail logs to check for historical use of public snapshots, and separately checking for all currently available RDS snapshots.<\/p>\n\n\n\n<p>&#8220;We think it&#8217;s not an overstatement to assume the worst-case scenario \u2013 when you are making a snapshot public for a short time, someone might get that snapshot&#8217;s metadata and content,&#8221; the researchers wrote. &#8220;So, for your company and, more importantly, your customers&#8217; privacy \u2013 don&#8217;t do that if you are not 100% sure there is no sensitive data in the content or in the metadata of your snapshot.&#8221;<\/p>\n\n\n\n<p>The risks of publicly exposing personal data are two-fold. The first is loss of customer confidence. And the second can be costly fines under data privacy regulations like GDPR and CCPA \u2013 see <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Security Compliance &amp; Data Privacy Regulations<\/strong><\/a> for important compliance information on those laws and China&#8217;s new data privacy law too.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d7007e18d75-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7007e18d75\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7007e18d75\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7007e18d75\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7007e18d75\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7007e18d75\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7007e18d75\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Public-facing cloud storage buckets are a data privacy nightmare, according to a study released today. Members of Laminar Labs&#8217; research team recently found that one in five public-facing cloud storage buckets contains personally identifiable information (PII) \u2013 and the majority of that data isn&#8217;t even supposed to be online in the first place. The information [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":22314,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21],"tags":[2369,4633,3790,627,3414,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,71,225,385,380,31775],"class_list":["post-25800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","tag-cloud-security","tag-compliance","tag-cybersecurity","tag-data-privacy","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-cloud-development","b2b_product-cloud-security","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-policy-compliance","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"More than 20 percent of public-facing cloud storage buckets expose sensitive data, creating a data privacy nightmare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"More than 20 percent of public-facing cloud storage buckets expose sensitive data, creating a data privacy nightmare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-17T13:11:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data\",\"datePublished\":\"2022-11-17T17:00:00+00:00\",\"dateModified\":\"2022-11-17T13:11:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\"},\"wordCount\":790,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"keywords\":[\"cloud security\",\"compliance\",\"cybersecurity\",\"Data privacy\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\",\"name\":\"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"datePublished\":\"2022-11-17T17:00:00+00:00\",\"dateModified\":\"2022-11-17T13:11:23+00:00\",\"description\":\"More than 20 percent of public-facing cloud storage buckets expose sensitive data, creating a data privacy nightmare.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"width\":1088,\"height\":725,\"caption\":\"cloud security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data | eSecurity Planet","description":"More than 20 percent of public-facing cloud storage buckets expose sensitive data, creating a data privacy nightmare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/","og_locale":"en_US","og_type":"article","og_title":"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data | eSecurity Planet","og_description":"More than 20 percent of public-facing cloud storage buckets expose sensitive data, creating a data privacy nightmare.","og_url":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/","og_site_name":"eSecurity Planet","article_published_time":"2022-11-17T17:00:00+00:00","article_modified_time":"2022-11-17T13:11:23+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data","datePublished":"2022-11-17T17:00:00+00:00","dateModified":"2022-11-17T13:11:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/"},"wordCount":790,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","keywords":["cloud security","compliance","cybersecurity","Data privacy","network security","security","Web security"],"articleSection":["Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/","url":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/","name":"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","datePublished":"2022-11-17T17:00:00+00:00","dateModified":"2022-11-17T13:11:23+00:00","description":"More than 20 percent of public-facing cloud storage buckets expose sensitive data, creating a data privacy nightmare.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","width":1088,"height":725,"caption":"cloud security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-storage-buckets-expose-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25800"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25800"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25800\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22314"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25800"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25800"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25800"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}