How the cloud amplified supply chain risk and what you can do about it?

Blog AWS Security Cloud Infrastructure Cloud Security

As seen from recent security incidents involving cloud-based systems (for instance- numerous cyber incidents in the healthcare sector), reliance on cloud services can amplify cybersecurity risks associated with third parties and the supply chain. For example, some organizations allowed external contractors access to their Snowflake accounts for customization. Some contractors had very lax security posture (using the same laptop for downloading pirated software and gaming), yet they were given unlimited access (via user credentials) to live user accounts without any additional security means (such as MFA). This allowed threat actors who breached the contractors’ laptop to access multiple user accounts without the need to crack passwords, or to use social engineering. They were literally given the (access) keys to the kingdom.

The cloud is, essentially – A supply chain in itself

There are several reasons why the cloud has made the supply chain risk so much greater than before, and in the process, facilitated cyber attacks by less skilled hackers. The first is that cloud technology itself utilizes a technology stack comprising of several products and technologies made by companies (and sometimes, non-profit organizations) external to the organization. This introduces multiple new entry points that attackers can exploit, and it exponentially increases the attack surface. The fact that the organization no longer controls its own infrastructure but uses one by a vendor, requires a shared responsibility model between the cloud provider and the organization that consumes cloud services, which is inherently more complex to manage. Moreover, poor IT hygiene can be somehow overcome in on-prem environments with limited connection to the outside world (and some additional security layers such as firewall and compartmentalization), then with the use of cloud these bad habits create much greater security risk. For example, in the same Snowflake campaign, several attacks abused credentials to access demo accounts of employees who have left the organization years ago, but their accounts were still active and “protected” only by the same username and password. In other attacks, companies shared data with 3rd party vendors who then failed to delete it when it was no longer needed, stored it in their cloud environment and then the data was stolen, impacting the company who hired their services (who, in most cases, did not even realize its’ data was at risk ).

Identity is the modern firewall

Security vendors have tried to adopt traditional security thinking and implement it in cloud environments. However, due to the different usability, implementing “firewalls” or “segmentation” isn’t practical. The reason is that organizations must provide access to employees (login in from anywhere), partners and users. These users can then “hop” between different systems and roles according to their permissions. Attackers can exploit this “chain of roles” to traverse between systems. What’s even worse- using such attack technique would not raise any alert. Attackers can abuse one set of credentials to enter one system, then try to identify which other permissions this user has, hop to the next system and so on, until they reach their final goal- the crown Jewels (link to blog).

Identifying supply chain risks and preparing for the breach before it materializes

Because of the complexity and risk involved in cloud-based supply chain, it is prudent to prepare for a breach in advance.

Companies and organizations must acknowledge the risk and factor it in any time they contract a new vendor. And yet, it is impossible to vet and monitor all these external vendors, so organizations must deploy their own threat detection means and run ongoing simulations to identify and block potential attacks, some of which might originated from the supply chain.

Summary

3rd parties have always presented risks to organizations, but the cloud has exacerbated this risk to phenomenal levels. One contractor with access to several user accounts can seriously compromise the entire organization. Using Skyhawk Purple Team CTEM solution for enhanced preparedness, alongside Skyhawk Cloud Threat Detection and Response (CDR) can ensure that the supply chain risks, and their potential impact, will be reduced by employing:

  • Verified Alerts and Automated Responses: Skyhawk Security enhances the effectiveness of its Autonomous Purple Team by ensuring that all alerts are pre-verified. This means that security teams receive only actionable intelligence, significantly reducing the risk of responding to false positives- which are often triggered by the work of non-malicious 3rd parties.
    The platform’s automated responses are also verified, allowing for immediate and precise remediation of threats. This integration of verified alerts and automated responses helps prevent security incidents from escalating into breaches, providing peace of mind that your cloud environment is secure. This is a key component of CTEM, and Skyhawk Security delivers it.
  • Tailored AI driven incident detection solutions: Skyhawk Security’s multi-layered cloud incident detection AI approach is designed to work hand-in-hand with the Autonomous Purple Team. Custom-built machine learning models, updated daily, ensure that malicious activities are detected within minutes, preventing an incident from becoming a full-scale breach (which, in itself, can impact additional parts in the supply chain).

 

To learn more about Skyhawk’s cloud security solution, book a Purple Team Assessment today! We can get started in just one hour.

 

 

 

In recent Gartner® research, Emerging Tech Disruptors: Top 5 Early Disruptive Trends in Cybersecurity for 2025, it is noted that there will be a shift from detection and response to preemptive cyber defense using key AI-advancements like Simulation Digital Twins.

Blog

As cloud adoption continues to gain traction, so do the risks and challenges of its security. The latest Google Cloud Threat Horizons Report for the first half of 2025, titled:” Evolving Ransomware and Data Theft Risks in the Cloud”, highlights

Cloud BreachAICloud SecurityThreat Detection
Blog

The digital transformation of industries worldwide has been powered by advancements in Information Technology (IT). Over the past two decades, IT has reshaped nearly every facet of modern life, from communication to commerce, especially in developing countries. Within this growth,

Cloud BreachAICloud SecurityThreat Detection
Blog

MITRE ATT&CK® framework provides a comprehensive matrix detailing the tactics and techniques adversaries employ during cyber attacks on cloud environments But as recent attacks illustrate, hackers no longer need to tread the long an winding path described by MITRE ATT&CK®

Cloud BreachAICloud SecurityThreat Detection
Blog

As organizations continue to embrace cloud technology, they often overlook one of the most fundamental security risks: cloud credential theft. Securing the cloud itself is instrumental for organizations to operate in our time (see the very recent CISA Binding Operational

Cloud BreachCloud Security
Blog

The year is 1985. The movie Back to the Future is released, and the crowds are pouring to see Marty McFly travel through time. If you were in high school back then, it just might be that your school records

AIThreat Detection
See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.