{"id":4935,"date":"2022-01-25T12:00:52","date_gmt":"2022-01-25T17:00:52","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4935"},"modified":"2022-01-27T12:59:40","modified_gmt":"2022-01-27T17:59:40","slug":"7-common-cloud-misconfigurations-to-avoid","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/","title":{"rendered":"7 Common Cloud Misconfigurations to Avoid"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4936\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-300x200.jpg\" alt=\"A person in a suit seen in profile works on a laptop with glowing cloud icons floating above the keyboard.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Cloud solutions have made it possible for many businesses to stay productive and competitive despite the uncertainty and upheaval of the past couple of years. However, despite all the advantages of moving applications to the cloud, the technology can also present new cybersecurity issues.<\/p>\n<p>Ninety-six percent of a group of cybersecurity professionals surveyed in May 2021 expressed at least moderate concern about public cloud security, according to the <a href=\"https:\/\/www.isc2.org\/Landing\/cloud-security-report\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">(ISC)\u00b2 2021 Cloud Security Report<\/a>. The respondents\u2019 top worries included data loss or leakage (named by 64 percent of security professionals), data privacy or confidentiality (62 percent), and accidental credential exposure (46 percent).<\/p>\n<div id=\"attachment_4951\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-4951\" class=\"wp-image-4951 size-full\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/2022-cloud-blog-image-1.jpg\" alt=\"An illustration of a white cloud containing a blue padlock against a blue background with a circuit diagram pattern. Text within the cloud states that 96 percent of security professionals are at least moderately concerned about public cloud security.\" width=\"1000\" height=\"1000\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/2022-cloud-blog-image-1.jpg 1000w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/2022-cloud-blog-image-1-300x300.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/2022-cloud-blog-image-1-150x150.jpg 150w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/2022-cloud-blog-image-1-768x768.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/2022-cloud-blog-image-1-200x200.jpg 200w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><p id=\"caption-attachment-4951\" class=\"wp-caption-text\">Source: The (ISC)\u00b2 2021 Cloud Security Report<\/p><\/div>\n<p>When asked to identify the most significant threats to public cloud security, 67 percent of professionals named the misconfiguration of cloud solutions.<\/p>\n<h2>What Is Cloud Misconfiguration?<\/h2>\n<p>A cloud misconfiguration occurs when the individual or team setting up the solution selects settings that don\u2019t provide the necessary level of data security, leaving openings that could allow malicious actors to access sensitive information, according to the Security Intelligence article \u201c<a href=\"https:\/\/securityintelligence.com\/articles\/misconfigurations-hidden-threat-to-cloud-data\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Misconfigurations: A Hidden but Preventable Threat to Cloud Data<\/a>.\u201d<\/p>\n<p>These mistakes can lead to expensive security incidents for your organization. In 2018 and 2019, data breaches stemming from cloud misconfigurations exposed 33.4 billion records and cost organizations around the world almost $5 trillion collectively, as stated in the <a href=\"https:\/\/divvycloud.com\/wp-content\/uploads\/2020\/02\/Cloud-Misconfiguration-Report-FINAL.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">DivvyCloud 2020 Cloud Misconfigurations Report<\/a>.<\/p>\n<p>As businesses have ramped up cloud adoption, many have failed to simultaneously implement official strategies and policies for the proper utilization of these types of products and services. Subsequently, through 2025, <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/is-the-cloud-secure\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Gartner has predicted<\/a> that customers \u2013 not cloud providers \u2013 will be responsible for 99 percent of cloud security failures through 2025.<\/p>\n<h2>7 Cloud Misconfigurations to Watch Out For<\/h2>\n<p>There are various errors you can make when setting up a cloud solution. Here are some of the common cloud misconfigurations that open the door to hackers and can lead to data leakage, according to industry experts.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Storage misconfigurations. <\/strong>It\u2019s common to see cloud storage bucket and blob breaches, according to the <a href=\"https:\/\/www.aquasec.com\/news\/cloud-misconfigurations-on-the-rise-2021-cloud-security-report\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2021 Cloud Security Report<\/a> from Aqua Security. Watch out for permissive storage policies, unencrypted cloud storage (at rest), storage open to the public, and misconfigured access control lists.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Unrestricted ICMP access. <\/strong>Leaving ICMP protocol exposed to the internet can allow hackers to locate your servers. As a result, you should block ICMP, according to the <a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2019\/11\/14\/4-common-cloud-misconfigurations-what-to-do-about-them\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Cloud Security Alliance (CSA)<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Unrestricted outbound access and inbound access on uncommon ports. <\/strong>The CSA advises restricting outbound traffic to what\u2019s absolutely necessary. Additionally, the Alliance urges limiting access to high-level ports to essential systems only where inbound traffic is concerned.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Unrestricted Non-HTTP\/HTTPS port access. <\/strong>You should either block these ports from the internet entirely or restrict traffic to a limited number of addresses, according to the CSA. Otherwise, if they\u2019re open to the internet, bad actors could brute force the authentication.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Database misconfigurations. <\/strong>Migrating from a relational database to a cloud-native one can easily lead to issues if you don\u2019t understand that traditional relational security layers will no longer protect your data, according to <a href=\"https:\/\/www2.deloitte.com\/us\/en\/blog\/deloitte-on-cloud-blog\/2021\/cloud-misconfiguration.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Deloitte<\/a>. You\u2019ll need to implement access management at the application level instead of the user level.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Search set-up errors: <\/strong>Make sure that search functions aren\u2019t misconfigured so that end users can utilize generic IDs to gain broad access to data, Deloitte cautions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Container misconfigurations. <\/strong>Cloud container platforms can present a significant security risk if you don\u2019t alter the default configurations (e.g., utilizing the default container names or leaving default service ports open to the public), according to <a href=\"https:\/\/unit42.paloaltonetworks.com\/misconfigured-and-exposed-container-services\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Palo Alto Networks<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>How to Avoid Data Breaches Caused by Cloud Misconfigurations<\/h2>\n<p>Although improperly setting up cloud solutions can lead to costly security incidents, there are steps you can take to prevent misconfigurations from occurring and identify threats in your cloud environment before they can do extensive damage. Here\u2019s how to safeguard your cloud data, according to Security Intelligence:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Establish a secure configuration management program to set baselines for your data.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Implement network monitoring solutions such as network detection and response (NDR).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Our advisors can help you identify a leading managed security service provider (MSSP) that can minimize your risk level with <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\" target=\"_blank\" rel=\"noopener\">cloud security posture management (CSPM) solutions<\/a>. They can enhance visibility across various cloud solutions and conduct an ongoing analysis of security risks.<\/p>\n<p>To learn more and take the first step toward better cloud security, give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud solutions have made it possible for many businesses to stay productive and competitive despite the uncertainty and upheaval of the past couple of years. However, despite all the advantages of moving applications to the cloud, the technology can also &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4936,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-4935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Top 7 Cloud Misconfigurations to Avoid| Stratosphere<\/title>\n<meta name=\"description\" content=\"These common cloud misconfigurations can open the door to hackers and lead to costly data breaches. Learn how to protect your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 7 Cloud Misconfigurations to Avoid| Stratosphere\" \/>\n<meta property=\"og:description\" content=\"These common cloud misconfigurations can open the door to hackers and lead to costly data breaches. Learn how to protect your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-25T17:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-27T17:59:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"7 Common Cloud Misconfigurations to Avoid\",\"datePublished\":\"2022-01-25T17:00:52+00:00\",\"dateModified\":\"2022-01-27T17:59:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\"},\"wordCount\":739,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\",\"name\":\"Top 7 Cloud Misconfigurations to Avoid| Stratosphere\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg\",\"datePublished\":\"2022-01-25T17:00:52+00:00\",\"dateModified\":\"2022-01-27T17:59:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"These common cloud misconfigurations can open the door to hackers and lead to costly data breaches. Learn how to protect your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"A person in a suit seen in profile works on a laptop with glowing cloud icons floating above the keyboard.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Common Cloud Misconfigurations to Avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Top 7 Cloud Misconfigurations to Avoid| Stratosphere","description":"These common cloud misconfigurations can open the door to hackers and lead to costly data breaches. Learn how to protect your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/","og_locale":"en_US","og_type":"article","og_title":"Top 7 Cloud Misconfigurations to Avoid| Stratosphere","og_description":"These common cloud misconfigurations can open the door to hackers and lead to costly data breaches. Learn how to protect your business.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2022-01-25T17:00:52+00:00","article_modified_time":"2022-01-27T17:59:40+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"7 Common Cloud Misconfigurations to Avoid","datePublished":"2022-01-25T17:00:52+00:00","dateModified":"2022-01-27T17:59:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/"},"wordCount":739,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/","name":"Top 7 Cloud Misconfigurations to Avoid| Stratosphere","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg","datePublished":"2022-01-25T17:00:52+00:00","dateModified":"2022-01-27T17:59:40+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"These common cloud misconfigurations can open the door to hackers and lead to costly data breaches. Learn how to protect your business.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/01\/businessman-accessing-the-cloud-on-a-laptop.jpg","width":2121,"height":1414,"caption":"A person in a suit seen in profile works on a laptop with glowing cloud icons floating above the keyboard."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/7-common-cloud-misconfigurations-to-avoid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Common Cloud Misconfigurations to Avoid"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4935"}],"version-history":[{"count":9,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4935\/revisions"}],"predecessor-version":[{"id":4952,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4935\/revisions\/4952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4936"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}