{"id":5998,"date":"2017-03-16T00:00:00","date_gmt":"2017-03-16T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/03\/16\/iaas-security-threats-and-protection-methodologies\/"},"modified":"2022-08-17T20:06:21","modified_gmt":"2022-08-17T20:06:21","slug":"iaas-security-threats-and-protection-methodologies","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/","title":{"rendered":"IaaS Security: Threats and Protection Methodologies"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><em style=\"color: #000000; font-family: 'Helvetica Neue 55 Roman', Helvetica, Arial, san-serif; font-size: 12px; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; background-color: #ffffff;\">By Maxim Sovetkin, Itransition<\/em><\/p>\n<p>Cloud services are becoming the main part of the infrastructure for many companies. Enterprises should pay maximum attention to security issues, moving away from typical approaches used in physical infrastructures, which are often insufficient in an atmosphere of constantly changing business requirements. Although cloud providers do all they can to guarantee infrastructure reliability, some of them limit their services to standard security measures, which can and should be significantly expanded.<\/p>\n<h2>Typical Cloud Information Security Threats<\/h2>\n<p>According to the <a href=\"https:\/\/cloudsecurityalliance.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Security Alliance<\/a> the list of the main cloud security threats includes the following:<\/p>\n<h3>Data Leaks<\/h3>\n<p>Data in the cloud is exposed to the same threats as traditional infrastructures. Due to the large amount of data, platforms of cloud providers become an attractive target for attackers. Data leaks can lead to a chain of unfortunate events for IT companies and infrastructure as a service (IaaS) providers.<\/p>\n<h3>Compromising Accounts and Authentication Bypass<\/h3>\n<p>Data leaks often result from insufficient attention to authentication verification. More often than not, weak passwords in conjunction with poor management of encryption keys and certificates are to blame. In addition, IT organizations are faced with problems of managing rights and permissions when users are assigned with much greater powers than they actually need. The problem can also occur when a user takes another position or leaves the company: no one is in a rush to update permissions under the new user roles. As a result, the account has rights to more features than necessary.<\/p>\n<p>Moreover, cloud environments are often prone to use of all kinds of phishing, scams, exploits and various attempts to manipulate data.<\/p>\n<p>The threat may also come from current or former employees, system administrators, contractors or business partners. Insiders may have different motives, ranging from data theft to simple revenge. In the case of IaaS, the consequences of such actions can even take the form of full or partial infrastructure destruction, data access or even data destruction.<\/p>\n<h3>Interface and API Hacking<\/h3>\n<p>Today, it is impossible to imagine cloud services and applications without friendly user interfaces (UIs) and application program interfaces (APIs). The security and availability of cloud services depends on reliable mechanisms of data access control and encryption. Weak interfaces become bottlenecks in matters of availability, confidentiality, integrity and security of systems and data.<\/p>\n<h3>Cyberattacks<\/h3>\n<p>Targeted cyberattacks are common in our times. An experienced attacker, who has secured his presence in a target infrastructure, is not so easy to detect. Remote network attacks may have significant impact on the availability of infrastructure in general.<\/p>\n<p>Despite the fact that denial-of-service (DoS) attacks have a long history, the development of cloud computing has made them more common. DoS attacks can cause business critical services to slow down or even stop. DoS attacks consume a large amount of computing power that comes with a hefty bill. Despite the fact that the principles of DoS attacks are simple at first glance, you need to understand their characteristics at the application level: the focus on the vulnerability of web servers, databases and applications.<\/p>\n<h3>Permanent Data Loss<\/h3>\n<p>Data loss due to malicious acts or accidents at the provider\u2019s end is no less critical than a leak. Daily backups and their storage on external protected alternative platforms are particularly important for cloud environments.<\/p>\n<p>In addition, if you are using encryption before moving data to the cloud, it is necessary to take care of secure storage for encryption keys. As soon as keys fall into the wrong hands, data itself becomes available to attackers, the loss of which can wreak havoc on any organization.<\/p>\n<h3>Vulnerabilities<\/h3>\n<p>A common mistake when using cloud-based solutions in the IaaS model is paying too little attention to the security of applications, which are placed in the secure infrastructure of the cloud provider. And the vulnerability of applications becomes a bottleneck in enterprise infrastructure security.<\/p>\n<h3>Lack of Awareness<\/h3>\n<p>Organizations moving to the cloud without understanding the capabilities the cloud has to offer are faced with many problems. If a team of specialists is not very familiar with the features of cloud technologies and principles of deploying cloud-based applications, operational and architectural issues arise that can lead not only to downtime but also to much more serious problems.<\/p>\n<h3>Abuse of Cloud Services<\/h3>\n<p>The cloud can be used by legal and illegal businesses. The purpose of the latter is to use cloud resources for criminal activity: launching DoS attacks, sending spam, distributing malicious content, etc. It is extremely important for suppliers and service users to be able to detect such activities. To do this, detailed traffic inspections and cloud monitoring tools are recommended.<\/p>\n<h2>Protection Methodology<\/h2>\n<p>In order to reduce risks associated with information security, it is necessary to determine and identify the levels of infrastructure that require attention and protection. For example, the computing level (hypervisors), the data storage level, the network level, the UI and API level, and so on.<\/p>\n<p>Next you need to define protection methods at each level, distinguish the perimeter and cloud infrastructure security zones, and select monitoring and audit tools.<\/p>\n<p>Enterprises should develop an information security strategy that includes the following, at the very least:<\/p>\n<ul>\n<li>Regular software update scheduling<\/li>\n<li>Patching procedures<\/li>\n<li>Monitoring and audit requirements<\/li>\n<li>Regular testing and vulnerability analysis<\/li>\n<\/ul>\n<h3>IaaS Information Security Measures<\/h3>\n<p>Some IaaS providers already boast advanced security features. It is necessary to carefully examine the services and systems service providers offer at their own level, as well as conditions and guarantees of these offerings. Alternatively, consider implementing and utilizing them on your own.<\/p>\n<h3>Data Encryption<\/h3>\n<p>Encryption is the main and also the most popular method of data protection. Meticulously managing security and encryption key storage control is an essential condition of using any data encryption method.<\/p>\n<p>It is worth noting that the IaaS provider must never be able to gain access to virtual machines and customer data.<\/p>\n<h3>Network Encryption<\/h3>\n<p>It is mandatory also to encrypt network connections, which is already a gold standard for cloud infrastructure.<\/p>\n<h3>Access Control<\/h3>\n<p>Attention must also be paid to access control, for example, by using the concept of federated cloud. With the help of federated services, it\u2019s easy to organize a flexible and convenient authentication system of internal and external users. The use of multi-factor authentication, including OTP, tokens, smart cards, etc., will significantly reduce the risks of unauthorized access to the infrastructure.<\/p>\n<p>Be sure not to forget hardware and virtual firewalls as a means of providing network access control.<\/p>\n<h3>Cloud Access Security Broker (CASB)<\/h3>\n<p>A <a href=\"https:\/\/www.esecurityplanet.com\/products\/casb-security-vendors\/\">CASB<\/a> is a unified security tool that allows administrators to identify potential data loss risks and ensure a high level of protection. The solution works in conjunction with the IaaS provider&#8217;s cloud infrastructure by enabling users to monitor shared files and prevent data leakage. This way, administrators know where important content is stored and who has access to the data.<\/p>\n<h3>Vulnerability Control<\/h3>\n<p>Implementing and using vulnerability control, together with regular software updates, can significantly reduce the risks associated with information security, and it is an absolute must for both the IaaS provider and its clients.<\/p>\n<h3>Monitor, Audit and Identify Anomalies<\/h3>\n<p>Monitoring and auditing systems allow you to track standard indicators of infrastructure performance and identify abnormalities related to system and service security. Using deep packet inspection (DPI) or intrusion detection and prevention solutions (IDS\/IPS) helps detect network anomalies and attacks.<\/p>\n<h3>Staff Training<\/h3>\n<p>Conducting specialized training and adopting a general attitude of focused attention to the technical competence of staff that have access to the virtual infrastructure will enhance the overall level of information security.<\/p>\n<h2>Don&#8217;t Let Cloud Security Concerns Hold You Back<\/h2>\n<p>In conclusion, it is worth noting that cloud computing, despite obvious concerns about security that often occur because of ignorance and lack of knowledge about cloud capabilities, is increasingly used for solving serious problems. With proper attention to information security, the cloud can bring substantial economic and technical benefits to IT companies.<\/p>\n<p><em>Maxim Sovetkin, lead system engineer, joined <a href=\"https:\/\/www.itransition.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Itransition<\/a> in 2010. He has broad experience in system and network administration and engineering, hardware evaluation, internal project management, systems and network security, incident analysis and recovery. His technical interests are in automation, hardware, *nix, networking, SAN, security, system integration, planning and design, virtualization, VoIP, wireless technologies, Windows and workforce management. Sovetkin graduated from Belarusian State University with a degree in mathematics, system analysis and IT systems modeling.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6ee417c44d-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ee417c44d\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ee417c44d\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ee417c44d\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ee417c44d\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ee417c44d\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ee417c44d\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; By Maxim Sovetkin, Itransition Cloud services are becoming the main part of the infrastructure for many companies. Enterprises should pay maximum attention to security issues, moving away from typical approaches used in physical infrastructures, which are often insufficient in an atmosphere of constantly changing business requirements. Although cloud providers do all they can to [&hellip;]<\/p>\n","protected":false},"author":198,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,22796,860,9547,4218],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[223,225,143,379],"class_list":["post-5998","post","type-post","status-publish","format-standard","hentry","category-networks","tag-cloud-security","tag-cyberattack","tag-encryption","tag-threats","tag-vulnerabilities","b2b_audience-awareness-and-consideration","b2b_product-cloud-infrastructure-and-iaas","b2b_product-cloud-security","b2b_product-security","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IaaS Security: Threats and Protection Methodologies<\/title>\n<meta name=\"description\" content=\"Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IaaS Security: Threats and Protection Methodologies\" \/>\n<meta property=\"og:description\" content=\"Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-16T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-17T20:06:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Guest Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\"},\"author\":{\"name\":\"Guest Author\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/dc1028377ead7da975f0343697404d2d\"},\"headline\":\"IaaS Security: Threats and Protection Methodologies\",\"datePublished\":\"2017-03-16T00:00:00+00:00\",\"dateModified\":\"2022-08-17T20:06:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\"},\"wordCount\":1390,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"cloud security\",\"cyberattack\",\"encryption\",\"threats\",\"vulnerabilities\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\",\"name\":\"IaaS Security: Threats and Protection Methodologies\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2017-03-16T00:00:00+00:00\",\"dateModified\":\"2022-08-17T20:06:21+00:00\",\"description\":\"Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IaaS Security: Threats and Protection Methodologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/dc1028377ead7da975f0343697404d2d\",\"name\":\"Guest Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1cf6b6749c8afa63efa78a6594503a91?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1cf6b6749c8afa63efa78a6594503a91?s=96&d=blank&r=g\",\"caption\":\"Guest Author\"},\"url\":\"https:\/\/www.esecurityplanet.com\/author\/guest-author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IaaS Security: Threats and Protection Methodologies","description":"Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/","og_locale":"en_US","og_type":"article","og_title":"IaaS Security: Threats and Protection Methodologies","og_description":"Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/","og_site_name":"eSecurity Planet","article_published_time":"2017-03-16T00:00:00+00:00","article_modified_time":"2022-08-17T20:06:21+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Guest Author","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Guest Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/"},"author":{"name":"Guest Author","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/dc1028377ead7da975f0343697404d2d"},"headline":"IaaS Security: Threats and Protection Methodologies","datePublished":"2017-03-16T00:00:00+00:00","dateModified":"2022-08-17T20:06:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/"},"wordCount":1390,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["cloud security","cyberattack","encryption","threats","vulnerabilities"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/","url":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/","name":"IaaS Security: Threats and Protection Methodologies","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2017-03-16T00:00:00+00:00","dateModified":"2022-08-17T20:06:21+00:00","description":"Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"IaaS Security: Threats and Protection Methodologies"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/dc1028377ead7da975f0343697404d2d","name":"Guest Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1cf6b6749c8afa63efa78a6594503a91?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1cf6b6749c8afa63efa78a6594503a91?s=96&d=blank&r=g","caption":"Guest Author"},"url":"https:\/\/www.esecurityplanet.com\/author\/guest-author\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5998"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=5998"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5998\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=5998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=5998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=5998"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=5998"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=5998"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=5998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}