using_the_cloud_securely2
using_the_cloud_securely2
| November 2016
IN THIS ISSUE...
• Overview
• Selecting a Cloud Provider
• Securing Your Data
1. Support: How easy is it to get help or have a question answered? Is there an email address you can contact, public
forums you can post questions to, or Frequently Asked Questions on their website?
OUCH! | November 2016
1. Authentication: Use a strong, unique passphrase to authenticate to your Cloud account. If your Cloud provider offers
two-step verification, we highly recommend that you enable it. This is one of the most important steps you can take to
protect your account.
2. Sharing Files/Folders: The Cloud makes it very simple to share, sometimes too simple. In a worst-case scenario,
you may think you are sharing your files with just a specific individual, but you may accidently make your files or even
entire folders publicly available to the entire Internet. The best way to protect yourself is to not share any of your files
with anyone by default. Then only allow specific people (or groups of people) access to specific files or folders on a
need-to-know basis. When someone no longer needs access to your files, remove them. Your Cloud provider should
provide an easy way to track who has access to your files and folders.
3. Sharing Files/Folders Using Links: One common feature of some Cloud services is the ability to create a web link
that points to your files or folders. This feature allows you to share these files with anyone you want by simply providing
OUCH! | November 2016
a web link. However, this approach has very little security. Anyone that knows this link may have access to your personal
files or folders. If you send the link to just one person, that person could share that link with others, or it could show up
on search engines. If you share data by using a link, be sure you disable the link once it is no longer needed by setting
an expiration date or, if possible, protect the link with a password.
4. Settings: Understand the security settings offered by your Cloud provider. For example, if you share a folder with
someone else, can they in turn share your data with others without your knowledge? Also, see if there are ways to see
who has viewed your shared content and when they viewed it. Can you restrict sharing to “read only” versus giving
read+write, which means people can also modify the files?
5. Antivirus: Make sure the latest version of antivirus software is installed on your computer and on any other computer
used to share your data. If a file you are sharing gets infected, other computers accessing that same file could also
get infected.
Resources
Two-Step Verification: https://securingthehuman.sans.org/ouch/2015#september2015
Passphrases: https://securingthehuman.sans.org/ouch/2015#april2015
Password Managers: https://securingthehuman.sans.org/ouch/2015#october2015
What is Malware: https://securingthehuman.sans.org/ouch/2016#march2016
SEC524: Cloud Security Fundamentals: https://sans.org/sec524
License
OUCH! is published by SANS Securing The Human and is distributed under the Creative Commons BY-NC-ND 4.0 license.
You are free to share or distribute this newsletter as long as you do not sell or modify it. For past editions or translated versions,
visit securingthehuman.sans.org/ouch/archives. Editorial Board: Bill Wyman, Walt Scrivens, Phil Hoffman, Bob Rudis, Cheryl Conley