As organizations increasingly transition to cloud-based systems, they unlock a wealth of opportunities, including enhanced scalability, cost efficiency, and streamlined operations. However, this shift is not without its complexities, particularly when it comes to navigating the intricate landscape of security challenges. From safeguarding sensitive data to aligning with compliance standards, agencies must address critical risks to ensure the integrity and reliability of their cloud environments.
Cloud Cybersecurity Risks
It’s important to remember that being in, or moving to the cloud, doesn’t mitigate risks. It only transfers risk to other servers and companies.
With more critical infrastructure and networks migrating to cloud-based tools and solutions, this also changes the focus on cyber threat actors who recognize that these organizations may struggle with proper migration, including understanding vulnerabilities, security and overall complexities of these networks. There’s potential to broaden the attack surface with increased reliance on digital technology.
Impact of Cloud Cyber Attacks
Critical networks in public safety and the public sector are (and must always be) on, so uptime is important. That is also what makes those networks a vulnerable and frequent target.
The main motivation behind targeting cloud-based technologies and the networks they are on is disruption, especially for sensitive, critical networks that require 24/7 up-time.
Data theft and resource hijacking are also motivators for attacking networks with cloud infrastructure because the nature of the sensitive data that can be stolen or encrypted, and the usage of always-on systems and networks is also extremely valuable.
The Ripple Effect of Cloud Intrusions in Public Safety
Cloud infrastructure can isolate certain aspects of networks, but any cyber intrusion can potentially spread through the network much faster and dangerously.
The impact of reputational damage from a cyber attack into cloud-based networks are no different than an attack on traditional or on-premise architecture. The distrust, especially as there is more push for NG911 adoption, would have a lasting impact and set back the organizations who have adopted it, with the communities they serve and how they’re funded.
Attacks also affect regulatory compliance as well, which could have an impact on funding. If certain compliances are violated, there are also financial implications in the way of fines.
Notable Cyber Threats Targeting Cloud Environments
Attacks in PSAPs doubled in 2024 according to the Public Safety Threat Alliance (PSTA) and cyber attacks on areas such as dispatch systems can spread to connected NG911 technologies and systems.
As the world becomes more connected and technology evolves through the adoption of NG911 solutions, cyber threats will also evolve in complexity. That means cybersecurity strategies must to evolve to be effective to protect critical services and sensitive networks in the public sector.
Key Cloud Risks for Public Safety
1. Data Privacy & Sovereignty
One of the critical challenges in cloud migration involves ensuring data privacy and sovereignty. Sensitive information, such as 911 call records, bodycam footage, or criminal records, might be stored in data centers located outside jurisdictional boundaries. This situation can lead to non-compliance with regulations such as CJIS, HIPAA, or state-specific data residency laws.
Mitigation: Agencies should select cloud providers with CJIS-compliant, U.S.-based data centers to ensure legal compliance and secure sensitive data. Establishing clear data governance policies, conducting regular audits, and using monitoring tools can further reinforce data protection. Collaboration with legal and compliance experts ensures adherence to evolving regulations.
2. Unauthorized Access & Identity Risks
Improper identity and access controls can expose systems to threats from both insiders and external attackers, resulting in significant risks to cloud environments. These vulnerabilities can lead to data leaks, command spoofing, or operational disruptions, highlighting the necessity of robust security measures to safeguard sensitive information and ensure reliable system functionality.
Mitigation: Adopt Zero Trust, requiring verification for all network traffic. Use Multi-Factor Authentication (MFA) to secure system access and Role-Based Access Control (RBAC) to limit permissions based on roles. Regularly audit frameworks to address emerging threats and changes.
3. Shared Responsibility Confusion
A lack of clarity regarding the division of security responsibilities between the cloud provider (i.e. AWS) and the agency can lead to critical gaps in security configurations and inadequate monitoring. These issues may ultimately compromise the integrity and reliability of the cloud environment, highlighting the importance of clearly defining roles and responsibilities.
Mitigation: Assign distinct roles and responsibilities for both agencies and cloud providers. Establish regular evaluations of the cloud security posture through audits, monitoring frameworks, and proactive adjustments to address any gaps or emerging threats.
4. Misconfiguration & Human Error
Improperly configured cloud services, such as open (publicly accessible) storage buckets, can pose a significant risk. These misconfigurations may lead to the exposure of public data or create open attack vectors, leaving systems vulnerable to exploitation.
Mitigation: Employ automated configuration management tools to ensure consistency and accuracy across cloud services. Conduct periodic audits coupled with continuous compliance scans. These measures help identify and rectify vulnerabilities swiftly, minimizing risks associated with misconfigurations.
5. Data Breaches
Cloud breaches pose significant risks by potentially exposing highly sensitive operational or Personally Identifiable Information (PII) data. The impact of such breaches can be far-reaching, including legal liabilities, operational compromises, and a loss of public trust.
Mitigation: Encrypt sensitive data both at rest and during transmission to protect against unauthorized access. Deploy comprehensive Data Loss Prevention (DLP) solutions to monitor and safeguard critical information. Implement continuous monitoring systems to swiftly detect and respond to potential breaches.
6. Denial of Service (DoS/DDoS)
Attackers may inundate cloud-hosted services with excessive traffic, disrupting their functionality and causing system outages. Such incidents can lead to critical downtime, particularly for emergency response systems that rely heavily on uninterrupted service availability.
Mitigation: Leverage provider DDoS protection and redundant architectures. Monitor for specific attacks with packet level awareness.
7. Vendor Lock-in & Dependency
Over-reliance on a single cloud vendor presents significant risks, as it limits flexibility and increases vulnerability if the vendor fails or changes its terms. This dependency can lead to cost spikes, migration challenges, or even regulatory non-compliance. Additionally, it may fail to align with NIST compliance requirements without supplementary third-party monitoring.
Mitigation: Implement hybrid or multi-cloud strategies to reduce reliance on a single vendor, using portable architectures such as containerization for seamless migration and enhanced flexibility.
8. Lack of Visibility & Logging
Traditional on-premise monitoring tools may not adequately cover cloud-native environments, leading to delayed detection of threats or anomalous activity.
Mitigation: Deploy robust packet-level monitoring solutions like SecuLore’s CyberSight, which are specifically designed for cloud environments to enhance threat detection and response capabilities.
9. Supply Chain & Third-Party Risks
Compromised third-party software or APIs integrated into the cloud ecosystem pose a significant risk. Such vulnerabilities can provide backdoor access to sensitive data or critical systems, amplifying the impact of potential breaches.
Mitigation: Conduct thorough evaluations of third-party providers, ensuring their security measures, reliability, and compliance align with organizational standards before integration into the cloud ecosystem.
10. Compliance Gaps
Not all cloud providers meet requirements such as CJIS, NIST 800-171, or NIST 800-53, posing significant regulatory risks. Failure to comply can lead to violations and may result in the loss of federal or state funding, underscoring the importance of careful provider selection.
Mitigation: Opt for cloud providers that possess certifications such as CJIS, NIST 800-171, or NIST 800-53, ensuring their services align with necessary compliance controls. Establish a thorough mapping of all cloud services to meet required regulatory standards.
Recommended Controls for Public Safety Cloud
Adopting cloud solutions for public safety still requires a proactive approach to mitigate risks such as third-party vulnerabilities and compliance gaps. By carefully selecting providers with necessary certifications, conducting regular security assessments, implementing independent cloud monitoring, and preparing well-tested incident response plans, organizations can ensure a secure and compliant environment. Additionally, comprehensive staff training on secure cloud practices will play a critical role in safeguarding sensitive data and maintaining regulatory alignment in the evolving cloud landscape.
Contents
Other Resources
- SecuLore Introduces CyberShapes™: AI-Enhanced Threat Detection for Public Safety & Critical Infrastructure
- CJIS Cybersecurity Requirements: What You Need to Know
- SonicWall Breach – Backup Files Exposed: Advice for Critical Networks
- Cybersecurity Awareness Month for Public Safety 2025 Guide
- Why PSAP Cybersecurity Leadership Matters: Lessons from Sean Scott

