Cathay Pacific Cyber Attack Occurs as Airline Moves to the Cloud
FEI HUANG Cyber Attacks Network Security Exploits Leave a Comment
By Fei Huang
A lot of people were shocked by the recent top headline “Cathay Pacific Cyber Attack Is World’s Biggest Airline Data Breach.” Looking at the past breaches reported by British Airways and Delta Air Lines, it pains me greatly that every couple of months or even weeks we are hearing such bad news. To make things worse, Cathay Pacific took 7 months to alert passengers to the massive data leak.
At the AWS Summit Hong Kong in 2017, it was reported that Cathay Pacific was in the process of replacing their legacy systems in their move to a hybrid cloud infrastructure. The airline is reportedly using software from RedHat to build the underlying open platform infrastructure, and using Amazon Web Services to hold customer-facing applications such as the online check-in system, flight schedule, fares and web hosting. The front-end applications are migrating to modern cloud services or micro-services that will be accessing customer data at the back-end.
Cathay Pacific didn’t disclose the details of the origin of the attack. But it was said that there was malicious network activity which happened in their internal network. Actually, a lot of enterprises are lacking the tools to lock down their internal environments, for example the databases that hold sensitive customer information. Most traditional security solutions focus on protecting the front-end or entry to data center, but in a cloud and container based environment the internal systems and networks must be protected as well.
Traditional platform security solutions also rely too much on built-in scanning capabilities that report numbers of known vulnerabilities or produce a compliance report. But once a security flaw is accidentally introduced in database code by a developer, or if a new zero-day network threat hits the service, the attack quickly becomes an insider attack within the data center.
Here is a snapshot by breachlevelindex.com which tracks world wide data breaches:
These top breach sources can tell us something about the weakness of today’s defenses:
Cloud applications based on containers are growing faster and faster, with almost all enterprises including Cathay Pacific deploying containers to their private/public/hybrid cloud. At these enterprises most basic security protections are already in place, for example scanning, CIS benchmarking, image assurance, encryption, compliance and so on. But this is really not enough; they can’t efficiently address the top runtime breaches in a modern cloud deployment.
In a production Kubernetes environment security has to be integrated deeply with a container native security mesh. This is the best way to achieve defense in depth. We are experiencing an exciting technology revolution era, with cloud services and where data are available everywhere 24×7 all the time. It makes sense that the same requirements should apply to security protections on around these services.
I know I will still fly with Cathay Pacific airline, but at the same time I hope companies, especially large enterprises could make it their top priority to include cloud security products and their security teams when adopting new cloud native architectures.
Finally, I would like to say that cloud security issues are impacting everyone’s life indeed, whether you are a technologist, security specialist or just a consumer.
Categories
- Container Security (75)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Container Threats (18)
- Network Security (18)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)