

Recent Posts
Cumplimiento de normativas impulsado por IA: Desbloquear la eficiencia y mejorar la seguridad en la nube, también para CMMC
Junio 9th, 2025
CDOs: La IA, la colaboración en equipo y la gobernanza de datos son fundamentales para el éxito de los datos
Mayo 27th, 2025
El resurgimiento de la nube privada: Por qué el 90% de las empresas se replantean sus estrategias en la nube'
Mayo 19th, 2025
Rack devuelve el favor: Compasión en acción
Abril 28th, 2025
Related Posts
Cloud Insights
Cumplimiento de normativas impulsado por IA: Desbloquear la eficiencia y mejorar la seguridad en la nube, también para CMMC
Junio 9th, 2025
Cloud Insights
CDOs: La IA, la colaboración en equipo y la gobernanza de datos son fundamentales para el éxito de los datos
Mayo 27th, 2025
Cloud Insights
El resurgimiento de la nube privada: Por qué el 90% de las empresas se replantean sus estrategias en la nube'
Mayo 19th, 2025
Cloud Insights
Optimizar la tecnología para transformar la atención al paciente
Mayo 5th, 2025
Culture & Talent
Rack devuelve el favor: Compasión en acción
Abril 28th, 2025
A secure cloud environment is possible, provided cloud users understand the threat landscape and employ a robust security strategy.
The security of Rackspace and our customers is of the utmost importance to us, and so, when a cybersecurity breach makes the news, we always want to put it in context, and offer recommendations when appropriate.
First, a reassurance: it is possible to have a secure cloud environment, provided cloud users understand the threat landscape and employ a robust security strategy, including proper cyber hygiene.
That said, constant vigilance is required. The recent attack is an example of a cyber hygiene problem resulting in significant business risks. Server-side Request Forgery, or SSRF, attacks are enabled when overly permissive entitlements granted to cloud components are mis-used by attackers, leading to a preventable breach.
When unnecessary entitlements are allocated to application components or users, they can be misused to accomplish malicious or unintended goals, such as capturing and exfiltrating sensitive data. SSRF attacks are well known but are currently difficult to detect and block while they are occurring.
However, they are largely preventable, by employing “least privilege” configurations in the cloud environment. Ideally, the best practice of least privilege is included in initial system architecture, deployment and ongoing system operation and maintenance.
For existing environments, we recommend review the configuration of their environments, confirm that any components or user accounts, particularly those facing the Internet, do not have excess privileges or entitlements, and eliminate any identified excess privileges.
To minimize SSRF risks, Rackspace security experts recommend cloud users:
- Establish preventative protections in the form of tuned web application firewalls or intrusion prevention systems that specifically include protections against SSRF attacks.
- Ensure least privilege for all accesses and entitlements for components and users of your cloud applications.
- Review firewall and security group configurations to ensure least privilege connectivity for both inbound and outbound traffic.
- Monitor cloud telemetry for indications of anomalous activity that could represent an SSRF attack.
- Use multi-factor authentication where possible.
SSRF attacks are but one of a constellation of potential vulnerabilities cloud users must be aware of. This potential vulnerability can be addressed by employing good cyber hygiene based upon least privilege concepts, proactive patching and configuration control and continuous security monitoring.
Our Support Center contains articles on basic security and best practices. If you need assistance, please contact your support team for more information. We are here to help.
Tags: