#2481: How to Ask Cloud Vendors About Security (Without Sounding Clueless)

What to ask cloud vendors about security practices — and the technical red flags that actually matter.

0:000:00
Episode Details
Episode ID
MWP-2639
Published
Duration
22:09
Audio
Direct link
Pipeline
V5
TTS Engine
chatterbox-regular
Script Writing Agent
deepseek-v4-pro

AI-Generated Content: This podcast is created using AI personas. Please verify any important information independently.

How to Vet a Cloud Vendor’s Security (Even If You’re Not a Security Expert)

Most small business owners feel outgunned when they try to ask a cloud vendor about security. The vendor says, “Yes, we encrypt your data at rest,” and that sounds reassuring — but it’s meaningless if the storage bucket is publicly readable. The encryption is working hard while the door is wide open.

The good news: you don’t need to be a security professional to ask the right questions. You just need to know which questions matter and what answers to watch for.

How to Open the Conversation

The most effective opener is disarmingly simple. Send an email saying: “We’re reviewing our vendor security practices as part of our internal due diligence — can you point me to your security documentation or trust page?”

You’re not interrogating them. You’re framing it as your own process. And their response tells you a lot right there. A vendor with a mature security program will have a publicly accessible trust page, a security whitepaper, or a SOC 2 Type II report available under NDA. They’ll respond within a day or two with clear links and an offer to answer follow-ups. A vendor that gets evasive, takes two weeks, or sends a paragraph of vague reassurances — that’s your red flag before you’ve even asked a technical question.

The Questions That Actually Surface Problems

There are industry-standard frameworks for this. The Cloud Security Alliance’s Consensus Assessments Initiative Questionnaire (CAIQ) and the Shared Assessments Program’s Standardized Information Gathering (SIG) questionnaire are designed for enterprise vendor risk management, but a small business can adapt them down to about 20–50 questions.

The key domains to cover: vendor background and stability, data handling and storage (encryption at rest and in transit, geographic data location), security practices (multi-factor authentication, vulnerability scanning, penetration testing), compliance and privacy (Data Processing Agreements, GDPR if applicable), incident response and breach notification timelines, business continuity and disaster recovery, and subprocessors — who else is the vendor sharing your data with?

That last one is sneaky. You can vet the vendor and then find out they’re handing everything off to a third party you’ve never heard of. If a vendor is vague about subprocessors or won’t give you a clear list, that should prompt escalation — or walking away.

The Technical Red Flag: Unauthenticated Storage Buckets

The core technical red flag is security by obscurity in unauthenticated storage. This is when a vendor stores your data in a cloud storage bucket (like Amazon S3, Azure Blob Storage, or Google Cloud Storage) that’s publicly accessible — they’re just hoping nobody guesses the URL.

This isn’t a theoretical risk. Open-source tools like S3Scanner, BucketLoot, and Slurp systematically scan for open buckets across all major cloud providers. Services like GrayhatWarfare index publicly accessible S3 buckets and let anyone search by filename for about $25 a month. Even buckets that don’t allow directory listing can be brute-forced if they have predictable filenames like backup.zip or credentials.json.

The scale is staggering. According to Cybernews, over 660,000 misconfigured buckets across major cloud providers are leaking an estimated 200 billion files. Cloud-conscious intrusions jumped 37% year over year in 2025. And the average detection time for these configuration issues exceeds 180 days — half a year of your data sitting exposed.

The Question That Catches the Bucket Problem

Instead of asking “Do you encrypt data at rest?” (a yes-or-no question that misses the bucket problem), ask: “Do you enforce authentication on every request to access customer data, and can you describe how that enforcement works?”

If they hesitate, if they say something about “our URLs are complex,” if they mention that files are “unlisted” but not authenticated — that’s your smoking gun. “Unlisted” means “we’re hoping nobody looks.” And the tools to look are getting better every month.

Why Certifications Aren’t Enough

SOC 2 Type II and ISO 27001 certifications are valuable signals — but they’re point-in-time audits. A vendor could pass their SOC 2 audit in March, and in April a developer spins up a test bucket with real customer data and leaves it public. The certification doesn’t catch that.

Google Cloud’s Threat Horizons report found that weak or absent credentials accounted for 47.1% of observed cloud security incidents, and misconfigurations specifically accounted for 29.4%. Gartner projects that 99% of cloud security failures through this year will be the customer’s fault — meaning the cloud user, not the provider.

The question isn’t just “Are you certified?” It’s “How do you continuously monitor your cloud configuration, and can you demonstrate that?”

Downloads

Episode Audio

Download the full episode as an MP3 file

Download MP3
Transcript (TXT)

Plain text transcript file

Transcript (PDF)

Formatted PDF with styling

#2481: How to Ask Cloud Vendors About Security (Without Sounding Clueless)

Corn
Daniel sent us this one — he's asking how a private individual or a small business owner can respectfully ask a cloud service vendor about their security practices, and what technical red flags they should actually look for. The big one he flags is security by obscurity in unauthenticated storage buckets — this idea that a vendor thinks your data is safe just because the URL is hard to guess. There's a real tension here between what a non-technical person can realistically ask and what actually keeps data secure. Where do we even start?
Herman
Before we dig into the technical indicators, I want to talk about the asking part — because most small business owners feel completely outgunned walking into this conversation. And they're not wrong. The asymmetry is real. A vendor says "yes, we encrypt your data at rest," and that sounds reassuring. But it's meaningless if the storage bucket is publicly readable.
Corn
The encryption is working hard while the door's wide open. It's like locking your filing cabinet and then leaving it on the sidewalk.
Herman
And the research backs this up. Tenable's 2025 Cloud Security Risk Report found that 9% of publicly accessible cloud storage buckets contain restricted data. That's nearly one in ten. And CybelAngel's analysis from just this January found that more than half of all buckets they analyzed contained sensitive or personally identifiable information. We're not talking about theoretical risks here.
Corn
The first thing Daniel's asking is how to even open this conversation without sounding accusatory or — and I think this is key — without revealing that you don't know what you're talking about and getting handed a reassuring non-answer.
Herman
The answer, interestingly, is structure. There are industry-standard frameworks that exist specifically for this. The Cloud Security Alliance has something called the Consensus Assessments Initiative Questionnaire — the C. — and the Shared Assessments Program has the Standardized Information Gathering questionnaire, or S. These are designed for enterprise vendor risk management, but a small business can adapt them down to maybe twenty to fifty questions, depending on how critical the vendor is.
Corn
Twenty to fifty questions still sounds like a lot for someone running a five-person shop.
Herman
It does, but you don't need all of them. The key domains — and this comes from Anchor Cyber Security's S. checklist from last June — are really seven buckets. Vendor background and stability. Data handling and storage — that's your encryption at rest, encryption in transit, where the data lives geographically. Security practices — are they enforcing multi-factor authentication, are they doing vulnerability scanning and penetration testing. Compliance and privacy — do they have a Data Processing Agreement, are they handling G. properly if that applies. Incident response and breach notification timelines. Business continuity and disaster recovery. And subprocessors — who else are they sharing your data with?
Corn
That subprocessor one is sneaky. You can vet the vendor and then find out they're handing everything off to some third party you've never heard of.
Herman
That's explicitly a red flag in the Anchor Cyber Security guidance. If a vendor is vague about subprocessors or won't give you a clear list, that should prompt escalation or walking away.
Corn
Walk me through the actual conversation. I'm a small business owner. I've signed up for some cloud accounting platform or customer management tool. I send them an email. What do I actually say?
Herman
The most effective opener is disarmingly simple. You say something like, "We're reviewing our vendor security practices as part of our internal due diligence — can you point me to your security documentation or trust page?" That's it. You're not interrogating them. You're framing it as your own process. And their response tells you a lot right there.
Herman
A vendor with a mature security program will have a publicly accessible trust page, a security white paper, maybe a SOC Two Type Two report available under N. They'll respond within a day or two with clear links and an offer to answer follow-ups. A vendor that gets evasive, takes two weeks, sends you a paragraph of vague reassurances — that's your red flag right there, before you've even asked a technical question.
Corn
This is where I think the "respectful" part of Daniel's question matters. You're not demanding a full security audit as a small customer. You're asking what they already have. If they have nothing, that's useful information. If they have a lot and they're transparent about it, that's also useful.
Herman
Now, once you're in that conversation, you want to move beyond yes-or-no questions. "Do you encrypt data at rest" is a yes-or-no. The better question is, "Can you describe your encryption key management practices, and who has access to the keys?" Or instead of "Do you have access controls," you ask, "Can you walk me through how you ensure that only authenticated users can access customer data?" The second question catches the bucket problem. The first one doesn't.
Corn
Let's talk about that bucket problem directly, because this is the core technical red flag Daniel's asking about. Security by obscurity in unauthenticated storage. What does that actually look like in practice?
Herman
Imagine a vendor stores your uploaded documents in an Amazon S Three bucket, or an Azure Blob Storage container, or a Google Cloud Storage bucket. The correct way to do this is to require authentication — every request for a file has to come with credentials that prove you're allowed to access it. The wrong way is to leave the bucket publicly accessible and just hope nobody finds the U.
Corn
is something like — I'm making this up — ess three dot amazonaws dot com slash customer dash uploads dash seven three eight two nine?
Herman
That's exactly the kind of thing. The vendor thinks, well, nobody could possibly guess that string. And they're wrong. There are open-source tools — S Three Scanner, BucketLoot, Slurp — that systematically scan for open buckets across all the major cloud providers. No credentials needed. You just point the tool at a target and it finds exposed buckets.
Corn
It's not just targeted attacks. There are services that index this stuff.
Herman
GrayhatWarfare indexes publicly accessible S Three buckets and lets anyone search by filename for about twenty-five dollars a month. CybelAngel's January report highlighted this specifically. And here's the thing that should keep vendors up at night — even buckets that don't allow directory listing can be brute-forced. If the bucket is private but has predictable filenames — backup dot zip, credentials dot jason, index dot html — attackers can just guess. GrayhatWarfare found that about ten percent of supposedly private buckets have an exposed index dot html that acts as a breadcrumb.
Corn
The obscurity isn't just weak protection — it's practically no protection. And we're seeing the scale of this now.
Herman
The numbers are staggering. According to Cybernews reporting cited by S. World, over six hundred sixty thousand misconfigured buckets across major cloud providers are leaking an estimated two hundred billion files. Two hundred billion. And cloud-conscious intrusions jumped thirty-seven percent year over year in 2025.
Corn
The average detection time for these configuration issues exceeds one hundred eighty days, according to CybelAngel. So a bucket gets misconfigured in January, and nobody notices until July. That's half a year of your data sitting exposed.
Herman
There's another dimension here that I think is underappreciated — abandoned buckets. Researchers from watchTowr published work on this that The Record covered. Leftover buckets from old projects or test environments stay online and accessible indefinitely. Sometimes they're still receiving millions of requests. And attackers can actually hijack these abandoned buckets for malware delivery. The vendor moved on, but the infrastructure didn't.
Corn
You've got actively misconfigured buckets, you've got abandoned buckets, and then you've got what Microsoft calls "blob hunting" — which is a named threat vector now. What's that?
Herman
Blob hunting specifically targets Azure Blob Storage containers that allow unauthenticated public access. Attackers guess container U. s and exfiltrate data. Microsoft Defender for Cloud explicitly flags unusual unauthenticated reads on typically private accounts as a signal of potential compromise. This isn't a fringe thing — it's in Microsoft's official threat detection documentation.
Corn
If I'm that small business owner and I'm trying to assess a vendor, what specific question do I ask to surface whether they're relying on security by obscurity?
Herman
You ask, "Do you enforce authentication on every request to access customer data, and can you describe how that enforcement works?" If they hesitate, if they say something about "our U. s are complex," if they mention that files are "unlisted" but not authenticated — that's your smoking gun.
Corn
"Unlisted" is a great word to watch for. It sounds technical. It means nothing.
Herman
It means "we're hoping nobody looks." And the tools to look are getting better every month.
Corn
Let's talk about the certification question, because I think there's a trap here. A lot of small business owners hear "we're SOC Two compliant" or "we have ISO twenty-seven thousand one certification" and they stop asking questions. Is that enough?
Herman
It's not, and this is one of the most important things to understand. A SOC Two Type Two report or an ISO twenty-seven thousand one certificate is valuable — I don't want to dismiss it. SOC Two Type Two is particularly useful because it covers operating effectiveness over time, not just a point-in-time design review. ISO twenty-seven thousand one is broader and internationally recognized. If a vendor has both, that's a genuinely strong signal.
Corn
There's a but.
Herman
These are point-in-time audits. A vendor could pass their SOC Two audit in March, and in April a developer spins up a test bucket with real customer data and leaves it public. The certification doesn't catch that. The gap between compliance and actual security is where a lot of breaches happen.
Corn
This connects to something Google Cloud reported. Their threat horizons report for the first half of this year — so the first half of 2026 — found that weak or absent credentials accounted for forty-seven point one percent of observed cloud security incidents. That's nearly half. Misconfigurations specifically were twenty-nine point four percent. And Gartner projects that ninety-nine percent of cloud security failures through this year will be the customer's fault — meaning the cloud user, not the provider.
Herman
Which brings us to the shared responsibility trap. , Azure, Google Cloud — they've all shifted toward secure-by-default settings in recent years. But legacy configurations persist, and human error hasn't gone anywhere. The cloud provider might be perfectly secure. The vendor's use of the cloud might not be. And your contract is with the vendor, not with A.
Corn
The question isn't just "are you certified." It's "how do you continuously monitor your cloud configuration, and can you demonstrate that?
Herman
This is where tools like UpGuard's security ratings come in. Gartner has predicted that cybersecurity ratings will become as important as credit ratings for business relationships. The idea is you get an independent, real-time assessment of a vendor's external security posture. It catches risks that emerge between assessment cycles. A questionnaire captures a snapshot. Continuous monitoring catches the bucket that got opened last Tuesday.
Corn
For a small business, though, subscribing to a security ratings service might be overkill. What's the lightweight version?
Herman
The lightweight version is asking the vendor directly: "Do you have continuous cloud security posture management in place? How do you detect misconfigurations in real time?" A vendor who can answer that coherently is probably doing the right things. A vendor who looks confused probably isn't.
Corn
If you want to go a step further, you can ask for their most recent penetration test summary. Not the full report — that might be sensitive — but a summary of findings and remediation. A vendor that's never pen-tested their application is a vendor that's not taking security seriously.
Herman
There's a related point that I think gets overlooked. Bug bounty programs. If a vendor has a public bug bounty program — through HackerOne or Bugcrowd or even just a security at company dot com email address — that's a green flag. It means they're inviting scrutiny. They're not hiding behind obscurity.
Corn
The opposite of security by obscurity is security by transparency. You want the vendor who says, "Here's how we handle your data, here's who has access, here's our incident response plan, and please tell us if you find something wrong.
Herman
That transparency should extend to breach notification. The Anchor Cyber Security checklist specifically flags unclear breach notification plans as a red flag. You want to know, in writing, how quickly they'll tell you if something goes wrong. Forty-eight hours? If they won't commit to a timeline, walk away.
Corn
Let's pull this together into something practical. If I'm a small business owner and I've got a cloud vendor I'm evaluating, what's my actual playbook?
Herman
Step one — send the respectful email. "We're doing our vendor security review. Can you point me to your security documentation?" See how they respond. Step two — once you have documentation, look for specific evidence. A SOC Two Type Two report, an ISO twenty-seven thousand one certificate, a penetration test summary, a Data Processing Agreement. Step three — ask the authentication question. "Do you enforce authentication on every request to access customer data?" Step four — ask about continuous monitoring. "How do you detect cloud misconfigurations in real time?" Step five — ask about breach notification. "What's your commitment on notifying customers if there's a breach?
Corn
If at any point they're vague, evasive, or start talking about how their U. s are really complicated — that's your answer.
Herman
That's your answer. And here's the thing — none of these questions are aggressive. None of them require deep technical expertise to ask. You're not auditing their infrastructure. You're asking them to describe their own practices. A vendor with good practices will be happy to answer. A vendor without them will resist.
Corn
The cost of not asking? CybelAngel found that the average enterprise has over three thousand misconfigured cloud assets at any given time. That's the enterprise number — but the small business vendors are often worse, because they have fewer resources dedicated to security. The asymmetry cuts both ways. Small vendors are more likely to have gaps, and small customers are less likely to ask about them.
Herman
There's one more angle I want to touch on. Daniel mentioned "security by obscurity in unauthenticated storage buckets" specifically in his prompt. I think it's worth being really concrete about what that looks like from the attacker's perspective, because it helps understand why it's such a critical red flag.
Corn
Walk me through it.
Herman
An attacker wants to find exposed data. They fire up a tool like S Three Scanner. They configure it to scan a range of I. addresses or a specific domain. The tool sends requests to potential bucket U. s — it's trying variations of names, common keywords, anything that might match. When it finds a bucket that responds with a directory listing, jackpot — they can see every file. When it finds a bucket that doesn't allow listing but also doesn't require authentication, they switch to brute force. They try common filenames. Backup dot zip. Database dot sql. Config dot yaml. Credentials dot jason. And because humans are predictable, these filenames work often enough to be worth the effort.
Corn
This is all automated. Nobody's sitting there typing U. s one at a time.
Herman
A single attacker can scan thousands of buckets in an hour. And once they find something interesting, they can exfiltrate the data in minutes. The victim never knows, because there's no authentication log to check — nobody was supposed to be authenticating in the first place.
Corn
The obscurity isn't a lock. It's not even a closed door. It's a curtain, and there are machines systematically pulling back every curtain they can find.
Herman
And the tools keep improving. GrayhatWarfare now indexes these things and makes them searchable. You can literally search by filename across millions of exposed buckets for a modest monthly fee. That's not nation-state-level capability. That's available to anyone with a credit card.
Corn
Which brings us back to the core advice. If you're a small business or an individual entrusting data to a cloud vendor, you don't need to become a security expert. You need to ask the right questions, and you need to recognize when the answers aren't good enough. "We encrypt everything" isn't good enough if the bucket is public. "We're SOC Two certified" isn't good enough if they opened a test bucket last week. s are complex" is never, ever good enough.
Herman
I'll add — document everything. If a vendor tells you in writing that they enforce authentication on all customer data requests, and then there's a breach because they didn't, that email matters. It won't prevent the breach, but it establishes that you did your due diligence and they misrepresented their security posture.
Corn
There's a practical point there too. Some vendors will be more careful with their written answers than their verbal ones. Asking in writing is itself a form of pressure.
Herman
And it creates a record. For a small business, that record can be the difference between "we had no idea" and "we asked, and here's what they told us.
Corn
Daniel's question — how to ask respectfully, and what to look for — I think the answer is that respect and rigor aren't in tension here. The respectful approach is the structured one. You're not accusing them of anything. You're saying, "We take our data seriously, and we want to work with vendors who do the same." A good vendor will respect that. A bad vendor will reveal themselves.
Herman
Now: Hilbert's daily fun fact.
Corn
Wait, I'm doing it this time. And now: Hilbert's daily fun fact. The collective noun for a group of porcupines is a prickle.
Herman
What can listeners actually do with all this? Let's make it concrete. First, if you're evaluating a new vendor right now, send that email today. "We're reviewing our vendor security — can you point me to your security documentation?" It's one sentence. You'll learn something from the response no matter what.
Corn
Second, if you're already using cloud services, check what you can find publicly. Search for the vendor's name plus "security" or "trust center." See if they have a published SOC Two report or security white paper. The absence of public documentation isn't necessarily a dealbreaker, but it's worth asking about.
Herman
Third, when you're reviewing a vendor's security claims, look past the buzzwords. "Enterprise-grade encryption" means nothing without key management details. "Secure infrastructure" means nothing without authentication enforcement. Ask the follow-up question.
Corn
Fourth, if you're a small vendor yourself — and some of our listeners probably are — audit your own cloud storage configuration. Check whether any of your buckets are publicly accessible. Check whether authentication is enforced on every request. The tools to do this are built into A. , Azure, and Google Cloud consoles now. It's an afternoon of work that could prevent a catastrophic breach.
Herman
Fifth, build this into your vendor review process going forward. Before you sign up for any service that will handle customer data, employee data, financial data — ask the five questions. Security documentation, authentication enforcement, continuous monitoring, breach notification, subprocessors. Make it routine. It takes fifteen minutes and it signals to vendors that their customers care about this stuff.
Corn
One forward-looking thought. We're seeing a shift in the industry toward secure-by-default cloud configurations, and the major providers are making it harder to accidentally expose data. But the attack surface is also growing — more services, more buckets, more configurations to manage. The gap between "the cloud is secure" and "your particular use of the cloud is secure" is where the risk lives. And that gap isn't closing on its own.
Herman
Thanks to our producer Hilbert Flumingtop for keeping this show running, and to Daniel for the prompt. This has been My Weird Prompts. If you want more episodes like this one, head to myweirdprompts dot com.
Corn
We'll be back with a new one soon.

This episode was generated with AI assistance. Hosts Herman and Corn are AI personalities.