DEV Community

Cover image for Rethinking On-Premise Security: Lessons from Legacy Storage Hacks
AirAsia System Engineer Lead
AirAsia System Engineer Lead

Posted on

Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

The Evolution of Cybersecurity and the Transition to Cloud-Based Security

The landscape of cybersecurity has evolved dramatically over the last decade, and so too have the ways in which businesses approach IT infrastructure security. On-premise systems, once the standard for housing critical workloads, are now increasingly seen as outdated and vulnerable, particularly in the face of modern cyber threats. However, many organisations, sometimes through inertia or legacy issues, continue to rely on these systems, inadvertently exposing themselves to attacks. In this context, it's important to distinguish between security lapses in outdated infrastructure and the robust protection now available through modern cloud environments.

For AirAsia, this issue gained attention following a 2022 breach that targeted an old on-premise storeroom. This attack, unfortunately, created the false perception that the company’s overall IT security was weak and laughable. In reality, AirAsia had long migrated all critical workloads to the cloud, where they benefited from industry-leading security measures as well as our own security posturing. This article aims to clarify the misconceptions stemming from that incident and to explain why transitioning to a cloud-first approach is crucial for modern cybersecurity.

The Perceived Weakness vs. Reality

The blog by Dissent Doe on DataBreaches.net offers a misinformed or ignorant portrayal of the AirAsia incident, framing it as evidence of systemic failure in IT security. However, Doe, who openly admits not being a security professional, draws conclusions that lack nuance. AirAsia’s breach occurred in an abandoned, legacy on-premise system, one that had already been identified for decommissioning. It was not part of the cloud-based infrastructure that handles critical business operations. This distinction is crucial in evaluating the company's overall security stance.

Doe's sensationalism, coupled with her background as a “healthcare professional” rather than a cybersecurity expert, results in an oversimplified view of AirAsia's broader infrastructure security. Modern IT environments, particularly cloud-based ones, operate with stringent security protocols that dramatically reduce the risks associated with such breaches. The attack on legacy systems, while unfortunate, is far from representative of the airline’s broader cybersecurity posture.

The Vulnerabilities of On-Premise Infrastructure

On-premise systems are inherently vulnerable for several reasons, particularly when compared to modern cloud-based environments. These vulnerabilities make them prime targets for hackers looking to exploit outdated hardware, software, and security practices.

  1. Aging Hardware - Legacy on-premise systems often rely on hardware that has aged beyond its intended lifespan. Older servers, storage devices, and networking equipment may no longer receive firmware updates, leaving them exposed to known vulnerabilities. In the case of AirAsia, the breached storeroom housed outdated hardware that had not been fully decommissioned. This type of infrastructure, though operationally irrelevant, is a prime target for attackers. Dissent Doe’s argument fails to account for the fact that these systems were not part of the active, cloud-secured operations of the company.

  2. Inconsistent Software Updates - On-premise systems require regular software updates and patches to protect against emerging security threats. Many organisations struggle to keep up, leaving these systems vulnerable to exploits. The breach at AirAsia occurred in legacy systems that had not received recent software patches. However, this issue, tied to outdated infrastructure, should not overshadow the company's robust cloud environment, where automated updates mitigate such risks. Doe's critique of AirAsia ignores the inherent differences between legacy and cloud systems.

  3. Limited Monitoring and Response – On-premise systems often lack the continuous monitoring and threat detection capabilities found in cloud environments. Without real-time visibility into system activity, it can be difficult to detect and respond to potential threats before they cause significant damage. In legacy systems like the one breached at AirAsia, monitoring was minimal. However, AirAsia’s active systems—those handling critical workloads—are housed in cloud environments that benefit from 24/7 monitoring and AI-driven threat detection. This gap in Doe’s analysis underscores the need for a more nuanced understanding of modern IT infrastructure.

Lessons Learned from Legacy Storage Hacks

The 2022 breach at AirAsia is part of a broader trend in which legacy on-premise systems are increasingly targeted by hackers. These systems, often left behind during the transition to cloud infrastructure, present a weak point in otherwise secure environments. The attack serves as a critical lesson for organisations managing legacy on-premise systems.

  1. Decommission Legacy Systems - One of the most important lessons from the AirAsia breach is the need to fully decommission legacy systems once they are no longer in use. Leaving old hardware and software in place, even if unused for production workloads, creates potential entry points for attackers. In AirAsia’s case, the attacked systems were earmarked for decommissioning but had not been fully disconnected from the network. This oversight allowed hackers to exploit an otherwise irrelevant part of the infrastructure.

  2. Implement Layered Security - Legacy systems often rely on outdated security measures that are no longer sufficient for modern threats. Mitigating the risk of legacy system breaches requires layered security measures, such as encrypting data and using multi-factor authentication (MFA) for access control. AirAsia, after the breach, implemented additional security measures to protect even the remaining non-critical infrastructure, thus reducing any residual risk while waiting for full decommissioning.

  3. Monitor Until Decommissioning - Even if legacy systems are no longer in use, they must be monitored until fully decommissioned. This is a key lesson for preventing unauthorised access or data exfiltration. AirAsia has since expanded its monitoring to include these legacy systems to detect any anomalies until they are retired. The company’s enhanced monitoring efforts are part of its commitment to cybersecurity, even for systems no longer critical to operations.

Cloud-First Strategy: The Path to Modern Security

The vulnerabilities of on-premise systems, particularly legacy infrastructure, make a strong case for transitioning to cloud-based environments. Cloud platforms offer several advantages that significantly reduce the risk of security breaches compared to on-premise systems.

  1. Automated Updates and Patches - One of the most significant security benefits of cloud infrastructure is the automatic application of software updates and patches. This eliminates the risks associated with outdated, unpatched systems, a problem inherent in legacy on-premise environments. By migrating critical workloads to the cloud, AirAsia ensures that its systems are always updated and protected from the latest vulnerabilities.

  2. Continuous Monitoring and Threat Detection - Cloud platforms provide real-time visibility into system activity using advanced monitoring tools. These tools use AI and machine learning to detect unusual behaviour, such as unauthorised access attempts. In a cloud environment, the AirAsia attack would have likely been detected much earlier.

  3. Scalability and Flexibility - Cloud environments are designed to scale with the needs of the business. This scalability, combined with the cloud's inherent security features, ensures that the company no longer has to rely on outdated hardware that could be targeted by hackers. AirAsia’s transition to the cloud has removed these legacy vulnerabilities.

Conclusion

The 2022 breach at AirAsia underscores the importance of fully decommissioning legacy systems while transitioning to cloud infrastructure. While Dissent Doe’s analysis attempts to paint AirAsia’s security as inadequate, it fails to account for the significant efforts the airline has made in migrating to a cloud-first model, which offers far superior security, scalability, and monitoring capabilities.

Organisations like AirAsia must embrace cloud migration to avoid the pitfalls of legacy infrastructure. Dissent Doe’s critique, while passionate, lacks the depth needed to appreciate the modern security measures now in place at AirAsia, where industry-leading cloud technologies protect critical workloads from sophisticated cyber threats. By moving forward with a cloud-first strategy, businesses can ensure that they remain resilient against modern cyber challenges.

Top comments (0)