Threat Landscape
Cloud and data centre operators are the infrastructure of every other sector's infrastructure. Their exposure is the cumulative exposure of the global economy.
Cloud and data centre operators occupy a position in the global cybersecurity threat landscape that is, in important respects, foundational. The hyperscale cloud providers — AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud, Alibaba Cloud — host the computational, storage, and networking infrastructure on which essentially every other industry now depends. The colocation and managed-data-centre operators — Equinix, Digital Realty, NTT, KDDI Telehouse, and others — host the physical infrastructure underlying both the hyperscalers and direct-customer deployments. The cybersecurity posture of this layer is the cumulative cybersecurity exposure of the contemporary economy.
The 2024 Snowflake-customer-credential-attack campaign is the definitive recent illustration of multi-tenant exposure. Mandiant tracked UNC5537 / ShinyHunters compromise of approximately 165 Snowflake customer accounts via stolen credentials harvested from infostealer malware — Snowflake itself was not compromised, but the customer-side configuration weaknesses (missing MFA, dormant accounts, stolen credentials dating to 2020) produced exposure of hundreds of millions of records. The "shared responsibility model" — in which the cloud or SaaS provider is responsible for the security of the platform, and the customer is responsible for the security of what runs on the platform — produced predictable failure when applied to customers without resources or expertise to fulfill their portion of the model. [01]
In 2024, the largest cybersecurity events in the global economy were not breaches of large enterprises. They were breaches of the cloud and SaaS infrastructure on which large enterprises depended. The threat surface migrated upward to a layer where the customer cannot deploy controls.
The 2023 Microsoft Exchange Online compromise by China-affiliated Storm-0558 (later determined by the US Cyber Safety Review Board to have been preventable through better Microsoft security practices) exemplifies a different category of exposure: the cloud provider itself is the breach point, and the consequence propagates to every customer of the affected service. The 2024 Microsoft Midnight Blizzard / APT29 disclosure of compromise of senior Microsoft executive email accounts via password-spray attack demonstrated the same pattern continuing.
For data centre operators specifically, the 2024 incident catalogue includes both cybersecurity events (breach disclosures by colocation providers) and availability events (regional power and cooling failures producing extended customer outages). The structural concentration of digital infrastructure into a small number of hyperscale and colocation operators produces concentration risk that — in the event of an adversary willing to absorb the consequence of attacking infrastructure on which the global economy depends — would be strategically significant.