You've probably noticed that we continue to hear about server hacking and cloud security breach. It appears as though hosting providers are relying on traditional methods of keeping data secure. For example, I have used VPS for a long time, and it appears we are fighting against today's hackers with rules developed ten years ago? It's odd, isn't it?
Examples of current hacker techniques include: Memory Theft, (e.g. RAM) Container Escape (e.g. Docker) and Hypervisor Bugs. Old Models do not adequately cover any of these. Have you ever wondered how a brand new VPS can be hacked? The answer is simple.
The Old Model of Threats
The basis of nearly every hosting provider's security plan is thwarting DDoS attacks, weak passwords and running old software. All of which are relevant today; however, the methods hackers are using have advanced, and there are new ways to hack.Examples of current hacker techniques include: Memory Theft, (e.g. RAM) Container Escape (e.g. Docker) and Hypervisor Bugs. Old Models do not adequately cover any of these. Have you ever wondered how a brand new VPS can be hacked? The answer is simple.
The Way I Perceive Gaps
There are VPS Providers that would appear to be secure that do not:- Detect memory attacks that can compromise data.
- Consider the impact to shared servers with others.
- Keep their risk models updated with emerging hacking techniques.
Need For New Risk Models
Hosting Providers that have updated risk models:- Identify and fix the most critical security issues as a first priority.
- Recognize and defend against the most common modern attack vectors.
- Provide customers with an accurate understanding of their true risks and not just weak password policy.