Cloud Security
AWS
Azure
GCP
๐
April 2025 ยท ๐ 10 min read ยท By HackersFood Pen Test Team
Cloud misconfigurations remain the #1 cause of cloud data breaches. Our security engineers review hundreds of cloud environments annually across AWS, Azure, and GCP. Here are the 10 misconfigurations we find most frequently โ and exactly how to fix them.
01
๐ด Critical Risk
Publicly Exposed S3 Buckets / Blob Storage
Misconfigured storage buckets with public read (or worse, write) access expose sensitive data directly to the internet. We've discovered databases, backups, API keys, and PII in publicly accessible buckets.
Fix:
- Enforce S3 Block Public Access at the account and bucket level
- Use bucket policies that explicitly deny public access
- Enable AWS Config rule
s3-bucket-public-read-prohibited
- Regularly audit with tools like Prowler or ScoutSuite
02
๐ด Critical Risk
Overpermissive IAM Roles & Policies
Using wildcard permissions (*:*) or attaching AdministratorAccess to compute roles is extremely common. This turns a compromised EC2 instance into full account takeover.
Fix:
- Apply the principle of least privilege โ grant only what's needed
- Use IAM Access Analyzer to identify overpermissive policies
- Regularly review and rotate access keys
- Enforce MFA for all IAM users with console access
03
๐ High Risk
Security Groups Open to 0.0.0.0/0 on Sensitive Ports
SSH (22), RDP (3389), databases (3306, 5432, 27017), and management interfaces exposed to all of the internet are trivially discoverable and exploitable.
Fix:
- Never allow 0.0.0.0/0 on SSH, RDP, or database ports
- Use a bastion host, VPN, or AWS Systems Manager Session Manager
- Automate security group audits with AWS Config rules
04
๐ High Risk
No Encryption for Data at Rest
Unencrypted EBS volumes, RDS instances, and S3 buckets are a compliance failure waiting to happen โ and an easy win for attackers with storage access.
Fix:
- Enable encryption by default for all EBS, RDS, and S3 resources
- Use AWS KMS with customer-managed keys (CMKs) for sensitive data
- Enforce encryption via SCPs in AWS Organizations
05
๐ High Risk
CloudTrail / Audit Logging Disabled
Without logging, you're flying blind. Attackers love environments with disabled audit logs โ there's no trail to follow, and breaches go undetected for months.
Fix:
- Enable CloudTrail across all regions, including S3 data events
- Store logs in a separate, protected S3 bucket
- Enable CloudWatch alarms for suspicious API activity
- Use AWS Security Hub or GuardDuty for continuous monitoring
06
๐ High Risk
No MFA on Root Account & IAM Users
The root account is the "god mode" of your AWS environment. Without MFA, a phished password = complete account takeover.
Fix:
- Enable MFA on the root account immediately โ use a hardware token
- Don't use root for day-to-day operations
- Enforce MFA via an SCP: deny all actions if MFA is not present
- Use AWS IAM Identity Center (SSO) for human access
07
๐ก Medium Risk
Kubernetes (EKS/AKS/GKE) Dashboard Exposed
The Kubernetes dashboard exposed without authentication is a classic entry point. We find it on public load balancers regularly โ sometimes with cluster-admin bindings.
Fix:
- Don't expose the K8s dashboard publicly โ use kubectl proxy or VPN
- Restrict RBAC โ no cluster-admin for service accounts
- Run kube-bench to check CIS Kubernetes Benchmark compliance
08
๐ก Medium Risk
Hardcoded Secrets in Source Code / Environment Variables
API keys, database passwords, and AWS credentials committed to GitHub repositories (even private ones) are found by attackers within minutes using automated scanners.
Fix:
- Use AWS Secrets Manager or Azure Key Vault โ never hardcode secrets
- Implement pre-commit hooks with git-secrets or Gitleaks
- Scan existing repos with Trufflehog or GitLeaks
- Rotate any leaked secrets immediately
09
๐ก Medium Risk
Unrestricted Egress Traffic
When compute instances can reach any internet destination without restriction, attackers can easily exfiltrate data and establish C2 communications post-compromise.
Fix:
- Implement egress filtering at the VPC/NSG level
- Use DNS firewall (Route 53 Resolver DNS Firewall) to block malicious domains
- Route egress through an inspection proxy or firewall
10
๐ก Medium Risk
No Vulnerability Management for Cloud Workloads
Running outdated AMIs, unpatched container images, and vulnerable OS packages is rampant. Without continuous scanning, you don't know what you're exposed to.
Fix:
- Enable Amazon Inspector or Microsoft Defender for Cloud
- Scan container images in CI/CD pipelines using Trivy or Snyk
- Implement automated patching for EC2/VMs with AWS Systems Manager Patch Manager
- Enforce a maximum image age policy in your container registry
๐ง Recommended Cloud Security Toolset
ProwlerScoutSuiteCloudSploitTrivykube-benchGitleaksAWS Security HubGuardDutyMicrosoft Defender for Cloud
Cloud SecurityAWSAzureGCPMisconfigurationIAM
Want a Cloud Security Assessment?
HackersFood performs comprehensive cloud configuration reviews across AWS, Azure, and GCP. Get a scoped proposal from our cloud security team.