{"id":40356,"date":"2021-04-08T18:00:02","date_gmt":"2021-04-08T18:00:02","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=93283"},"modified":"2021-04-08T18:00:02","modified_gmt":"2021-04-08T18:00:02","slug":"threat-matrix-for-storage-services","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/","title":{"rendered":"Threat matrix for storage services"},"content":{"rendered":"<p>The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat protection and mitigation strategies and tools in place as they manage their access to cloud storage. For example, Azure Defender treats data-centric services as part of the security perimeter and provides prioritization and mitigation of threats for Storage. To help you build a framework, we examined the attack surface of storage services. In this blog, we outline potential risks that you should be aware of when deploying, configuring, or monitoring your storage environment.<\/p>\n<h2>Methodology<\/h2>\n<p>Within cloud storage services, we witness users sharing various file types, such as Microsoft Office and Adobe files, and attackers taking advantage of this to deliver malware through email. Moreover, use cases of cloud storage go beyond internal interfaces, with business logic being shared with third parties. Therefore, the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/defender-for-storage-introduction\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Defender for Storage<\/a> security team has mapped the attack surface undertaken by leveraging Storage service.<\/p>\n<p>This post reflects our findings based on the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/06\/11\/blue-teams-helping-red-teams-a-tale-of-a-process-crash-powershell-and-the-mitre-attck-evaluation\/\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE ATT&amp;CK\u00ae framework<\/a>, which is a knowledge base for tactics and techniques employed in cyberattacks. MITRE matrices have become an industry standard and are embraced by organizations aiming to understand potential attack vectors in their environments and to ensure they have adequate detections and mitigations in place.<\/p>\n<p>While analyzing the security landscape of storage, and applying the same methodology we defined for Kubernetes, we noticed the resemblance and differences across techniques. Whilst Kubernetes underlies an operating system, its threat matrix is structured like MITRE matrices for Linux or Windows. Aiming to address the entire attack surface for storage, from data loss prevention (DLP) and sensitive content exposure to uncovering malicious content distribution over a file share Server Message Block (SMB), we adjusted the enterprise tactics to fit a data service.<\/p>\n<h2>The threat matrix stages<\/h2>\n<p>We expect this matrix to dynamically evolve as more threats are discovered and exploited, and techniques can also be deprecated as cloud infrastructures constantly progress towards securing their services. Below we will address each of the threat matrix stages in more detail.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93286 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/Threat-matrix.png\" alt=\"The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.\" width=\"1962\" height=\"883\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/Threat-matrix.png 1962w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/Threat-matrix-300x135.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/Threat-matrix-1024x461.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/Threat-matrix-768x346.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/Threat-matrix-1536x691.png 1536w\" sizes=\"auto, (max-width: 1962px) 100vw, 1962px\"><\/p>\n<p><em>Figure 1:&nbsp; Threat matrix for Storage.<\/em><\/p>\n<h3>Stage 1: Reconnaissance<\/h3>\n<p>Adversaries are trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve actively or passively gathering information that can be used to support targeting.<\/p>\n<ul>\n<li><strong>Storage account discovery:<\/strong> Adversaries may enumerate storage account names (or leverage an existing enumeration process) to find an active storage account. Examples of such methods can vary from search dorks (site:*.blob.core.windows.net) to brute-force account creations. Adversaries can also employ crawler results or leverage public toolkits, such as <a href=\"https:\/\/github.com\/NetSPI\/MicroBurst\" target=\"_blank\" rel=\"noopener noreferrer\">Microburst<\/a> and <a href=\"https:\/\/github.com\/cyberark\/blobhunter\" target=\"_blank\" rel=\"noopener noreferrer\">BlobHunter<\/a>.<\/li>\n<li><strong>Public containers discovery:<\/strong> Adversaries may enumerate container names (or leverage an existing enumeration process) for an already known storage account. Adversaries can employ crawler results or leverage public toolkits, such as <a href=\"https:\/\/github.com\/NetSPI\/MicroBurst\" target=\"_blank\" rel=\"noopener noreferrer\">Microburst<\/a> and <a href=\"https:\/\/github.com\/cyberark\/blobhunter\" target=\"_blank\" rel=\"noopener noreferrer\">BlobHunter<\/a>.<\/li>\n<\/ul>\n<h3>Stage 2: Initial access<\/h3>\n<p>Adversaries are trying to get into your network. Initial access consists of techniques that use various entry vectors to gain their initial foothold within a network. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords or keys.<\/p>\n<ul>\n<li><strong>Valid SAS URI: <\/strong>A shared access signature (SAS) is a uniform resource identifier (URI) that grants restricted access rights to storage resources. Adversaries may steal a SAS URI using one of the Credential Access techniques or capture a SAS URI earlier in their reconnaissance process through social engineering to gain initial access. Adversaries may also leverage identity and access management (IAM) privileges to <a href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/create-account-sas\" target=\"_blank\" rel=\"noopener noreferrer\">generate a valid SAS<\/a> offline based on a stolen storage account key.<\/li>\n<li><strong>Valid access key: <\/strong>Adversaries may steal an access key using one of Credential Access techniques or capture one earlier in their reconnaissance process through social engineering to gain initial access. Adversaries may leverage keys left in source code or configuration files. Sophisticated attackers may also obtain keys from hosts (virtual machines) that have <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/files\/storage-how-to-use-files-windows\" target=\"_blank\" rel=\"noopener noreferrer\">mounted File Share<\/a> on their system (SMB).<\/li>\n<li><strong>Valid Azure Active Directory (Azure AD) principal: <\/strong>Adversaries may steal account credentials using one of the Credential Access techniques or capture an account earlier in their reconnaissance process through social engineering to gain initial access. An authorized Azure AD account\/token can result in full control of storage account resources.<\/li>\n<li><strong>Use of public access: <\/strong>Adversaries may leverage publicly exposed storage accounts to list containers\/blobs and their properties, information that can be beneficial as the attack advances. Adversaries may employ application programming interfaces (APIs), such as the <a href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/list-blobs\" target=\"_blank\" rel=\"noopener noreferrer\">List Blobs<\/a> This technique is oftentimes reported as the exploitation vector used in targeted campaigns.<\/li>\n<\/ul>\n<h3>Stage 3: Persistence<\/h3>\n<p>Adversaries are trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across changed credentials and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems.<\/p>\n<ul>\n<li><strong>Firewalls and Virtual Networks configuration changes: <\/strong>Storage services offer a set of built-in security features. Administrators can leverage these capabilities to restrict access to storage resources. Restriction rules can operate at the IP level. When network rules are configured, only requests originated from authorized subnets will be served. Adversaries may insert additional rules to ensure persistent access.<\/li>\n<li><strong>Role-based access control (RBAC) changes: <\/strong>Storage services offer built-in RBAC roles that encompass sets of permissions used to access different data types. Definition of custom roles is also supported. Upon assignment of an RBAC role to an identity object (like Azure AD security principal) the storage provider grants access to that security principal. Adversaries may leverage the RBAC mechanism to ensure persistent access to their owned identity objects.<\/li>\n<\/ul>\n<h3>Stage 4: Defense evasion<\/h3>\n<p>Adversaries are trying to avoid being detected. Defense evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include abuse trusted processes to hide and masquerade their malicious intents. Other tactics\u2019 techniques are cross-listed here and include the added benefit of subverting defenses.<\/p>\n<ul>\n<li><strong>Firewalls and Virtual Networks configuration changes: <\/strong>Storage services offer a set of built-in security features. Administrators can leverage these capabilities to restrict access to storage resources. Restriction rules can operate at the IP level. When network rules are configured, only requests originated from authorized subnets will be served. Adversaries may insert additional rules to masquerade and\/or legitimatize their data exfiltration channel.<\/li>\n<li><strong>RBAC changes: <\/strong>Storage services offer built-in RBAC roles that encompass sets of permissions used to access different data types. Definition of custom roles is also supported. Upon assignment of an RBAC role to an identity object (like Azure AD security principal) the storage provider grants access to that security principal. Adversaries may leverage the RBAC mechanism to disguise their activities as typical within a compromised environment.<\/li>\n<li><strong>Storage data clone: <\/strong>Storage services offer different types of cloning or backup data stored on them. Adversaries may abuse these built-in capabilities to steal sensitive documents, source code, credentials, and other business crucial information. This technique was employed as part of <a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/capital-one-data-theft-impacts-106m-people\/\" target=\"_blank\" rel=\"noopener noreferrer\">Capital One data theft<\/a>.<\/li>\n<li><strong>Data transfer size limits: <\/strong>Adversaries may fragment stolen information and exfiltrate it on different size chunks to avoid being detected by triggering potentially predefined transfer threshold alerts.<\/li>\n<li><strong>Automated exfiltration: <\/strong>Adversaries may exploit legitimate automation processes, predefined by the compromised organization, with the goal of having their logging traces blend in normally within the company\u2019s typical activities. Assimilating or disguising malicious intentions will keep adversary actions, such as data theft, stealthier.<\/li>\n<li><strong>Access control list (ACL) modification: <\/strong>Adversaries may adjust <a href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/set-container-acl\" target=\"_blank\" rel=\"noopener noreferrer\">ACL configuration<\/a> at the granularity of specific a blob or container, to secure a channel to exfiltrate stolen data. These ACL modifications occur at the control-plane level, which is oftentimes overlooked. By narrowing existing exposure restrictions, adversaries may infiltrate an organization\u2019s internal and sensitive resources.<\/li>\n<\/ul>\n<h3>Stage 5: Credential Access<\/h3>\n<p>Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.<\/p>\n<ul>\n<li><strong>Access query key: <\/strong>Adversaries may leverage subscription\/account-level access to gather storage account keys and use these keys to authenticate at the resource level. This technique exhibits cloud resource pivoting in combination with control management and data planes. Adversaries can query management APIs to fetch primary and secondary storage account keys.<\/li>\n<li><strong>Access Cloud Shell profiles: <\/strong><a href=\"https:\/\/azure.microsoft.com\/en-us\/features\/cloud-shell\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Shell<\/a> is an interactive, authenticated, browser-accessible shell for managing cloud resources. It provides the flexibility of shell experience, either Bash or PowerShell. To support the Cloud Shell promise of being accessible from everywhere, Cloud Shell profiles and session history are saved on storage account. Adversaries may leverage the legitimate use of Cloud Shell to impersonate account owners and potentially obtain additional secrets logged as part of session history.<\/li>\n<\/ul>\n<h3>Stage 6: Discovery<\/h3>\n<p>Adversaries are trying to figure out your environment. Discovery consists of techniques adversaries may use to gain knowledge about the system. These techniques help adversaries observe the environment and orient themselves before deciding how to act. Tools witnesses, at the reconnaissance phase, are often used toward this post-compromise information-gathering objective.<\/p>\n<ul>\n<li><strong>Storage service discovery: <\/strong>Adversaries may leverage subscription\/account-level access to discover storage properties and stored resources. Tools witnessed, at the reconnaissance phase, are oftentimes used toward this post-compromise information-gathering objective, now with authorization to access storage APIs, such as the <a href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/list-blobs\" target=\"_blank\" rel=\"noopener noreferrer\">List Blobs<\/a> call.<\/li>\n<\/ul>\n<h3>Stage 7: Lateral movement<\/h3>\n<p>Adversaries are trying to move through your environment. Lateral movement consists of techniques that adversaries use to enter and control remote systems on a network. Reaching their objective often involves pivoting through multiple systems and accounts to gain access. Adversaries may install their own remote access tools (RAT) to accomplish lateral movement or use legitimate credentials with native network and operating system tools, which may be stealthier.<\/p>\n<ul>\n<li><strong>Malicious content upload: <\/strong>Adversaries may use storage services to store a malicious program or toolset that will be executed at later times during their operation. In addition, adversaries may exploit the trust between users and their organization\u2019s Storage services by storing phishing content. Furthermore, storage services can be leveraged to park gathered intelligence that will be exfiltrated when terms suit the actor group.<\/li>\n<li><strong>Malware distribution: <\/strong>Storage services offer different types of mechanisms <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/files\/storage-sync-files-deployment-guide?tabs=azure-portal%2Cproactive-portal\" target=\"_blank\" rel=\"noopener noreferrer\">to support auto-synchronization<\/a> between various resources and the storage account. Adversaries may leverage access to the storage account to upload malware and benefit from the auto-sync built-in capabilities to have their payload being populated and potentially weaponize multiple systems.<\/li>\n<li><strong>Trigger cross-service interaction: <\/strong>Adversaries may manipulate storage services to trigger a compute service (like <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-functions\/functions-bindings-storage-blob\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Functions<\/a>\/<a href=\"https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/with-s3.html\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Lambda<\/a> triggers), where an attacker already has a foothold on a storage container and can inject a blob that will initiate a chain of a compute process. This may allow an attacker to infiltrate another resource and cause harm.<\/li>\n<li><strong>Data manipulation: <\/strong>Content stored on a storage service may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Upon execution by a legitimate user of tainted content, the malicious portion runs the adversary\u2019s code on a remote system. Adversaries may use tainted shared content to move laterally.<\/li>\n<li><strong>Access Cloud Shell profiles: <\/strong><a href=\"https:\/\/azure.microsoft.com\/en-us\/features\/cloud-shell\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Shell<\/a> is an interactive, authenticated, browser-accessible shell for managing cloud resources. It provides the flexibility of shell experience, either Bash or PowerShell. To support the Cloud Shell promise of being accessible from everywhere, Cloud Shell profiles and session history are saved on storage account. Adversaries may leverage the legitimate use of Cloud Shell to impersonate account owners and potentially obtain additional secrets logged as part of session history.<\/li>\n<\/ul>\n<h3>Stage 8: Exfiltration<\/h3>\n<p>Adversaries are trying to steal data. Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they\u2019ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically includes transferring it over their command-and-control channel or an alternative channel and may also include putting size limits on the transmission.<\/p>\n<ul>\n<li><strong>Storage data clone: <\/strong>Storage services offer different types of cloning or backup data stored on them. Adversaries may abuse these built-in capabilities to steal sensitive documents, source code, credentials, and other business crucial information. This technique has been employed as part of data theft previously.<\/li>\n<li><strong>Data transfer size limits: <\/strong>Adversaries may fragment stolen information and exfiltrate it on different size chunks to avoid being detected by triggering potentially predefined transfer threshold alerts.<\/li>\n<li><strong>Automated exfiltration: <\/strong>Adversaries may exploit legitimate automation processes, predefined by the compromised organization, with the goal of having their logging traces blend in normally within the company\u2019s typical activities. Assimilating or disguising malicious intentions will keep adversary actions, such as data theft, stealthier.<\/li>\n<li><strong>ACL modification: <\/strong>Adversaries may adjust <a href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/set-container-acl\" target=\"_blank\" rel=\"noopener noreferrer\">ACL configuration<\/a> at the granularity of a specific blob or container, to secure a channel to exfiltrate stolen data. These ACL modifications occur at the control-plane level, which is oftentimes overlooked. By narrowing existing exposure restrictions, adversaries may infiltrate an organization\u2019s internal and sensitive resources.<\/li>\n<\/ul>\n<h3>Stage 9: Impact<\/h3>\n<p>Adversaries are trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.<\/p>\n<ul>\n<li><strong>Data corruption: <\/strong>Adversaries may corrupt data stored on storage services to disrupt the availability of systems or other lines of business.<\/li>\n<li><strong>Data encryption for impact (ransomware): <\/strong>Adversaries may encrypt data stored on storage services to disrupt the availability of systems or other lines of business. Making resources inaccessible by encrypting files or blobs and withholding access to a decryption key. This may be done to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware).<\/li>\n<\/ul>\n<h2>Get started today<\/h2>\n<p>Understanding the attack surface of data-focused services is the first step of building security solutions for these environments. The threat matrix for storage can help organizations identify gaps in their defenses. We encourage you to try <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/defender-for-storage-introduction\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Defender for Storage<\/a> and start protecting against potential threats targeting your blobs, containers, and file shares. Azure Defender for Storage should be enabled on storage accounts storing sensitive information. For a list of the Azure Defender for Storage alerts, see the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/alerts-reference#alerts-azurestorage\" target=\"_blank\" rel=\"noopener noreferrer\">reference table of alerts<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website.<\/a> Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/04\/08\/threat-matrix-for-storage\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Storage services are one of the most popular services in the cloud. In this blog, we outline potential risks that you should be aware of when deploying, configuring, or monitoring your storage environment.<br \/>\nThe post Threat matrix for storage services appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40357,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,9177],"class_list":["post-40356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-integrated-threat-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat matrix for storage services 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat matrix for storage services 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-08T18:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1962\" \/>\n\t<meta property=\"og:image:height\" content=\"883\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Threat matrix for storage services\",\"datePublished\":\"2021-04-08T18:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\"},\"wordCount\":2459,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png\",\"keywords\":[\"Cybersecurity\",\"Integrated Threat Protection\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\",\"name\":\"Threat matrix for storage services 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png\",\"datePublished\":\"2021-04-08T18:00:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png\",\"width\":1962,\"height\":883},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat matrix for storage services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat matrix for storage services 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/","og_locale":"en_US","og_type":"article","og_title":"Threat matrix for storage services 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-04-08T18:00:02+00:00","og_image":[{"width":1962,"height":883,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Threat matrix for storage services","datePublished":"2021-04-08T18:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/"},"wordCount":2459,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png","keywords":["Cybersecurity","Integrated Threat Protection"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/","url":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/","name":"Threat matrix for storage services 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png","datePublished":"2021-04-08T18:00:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/threat-matrix-for-storage-services.png","width":1962,"height":883},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/threat-matrix-for-storage-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Threat matrix for storage services"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40356"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40356\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40357"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}