{"id":11881,"date":"2025-07-02T10:25:40","date_gmt":"2025-07-02T17:25:40","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11881"},"modified":"2025-07-02T10:34:13","modified_gmt":"2025-07-02T17:34:13","slug":"why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/","title":{"rendered":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads"},"content":{"rendered":"<p>As someone who has spent years working with cloud environments, I\u2019ve seen firsthand how the landscape is changing. Cloud workloads operate in dynamic environments, interacting with diverse services, APIs and third-party platforms.<\/p>\n<p>While allowlisting outbound destinations is a common security practice, it\u2019s operationally challenging and difficult to keep allowlists current as cloud services, workloads and endpoints rapidly evolve. Managing third-party dependencies adds complexity, and even trusted domains can be hijacked or compromised, limiting the effectiveness of allowlisting alone.<\/p>\n<p>Relying solely on allowlisting is like locking your front door but leaving the windows open. This blog explores both the operational limitations and the security gaps of allowlist-based approaches, illustrating real-world breach scenarios that expose these vulnerabilities.<\/p>\n<h3>Limitations of Allowlist-Only Security<\/h3>\n<ol class=\"list-spacing\">\n<li><strong>Allowlisted Destinations Can Be Compromised<\/strong><br \/>\nEven trusted, allowlisted services, like GitHub, Dropbox or Slack, can be abused by attackers for data exfiltration or command and control (C2).<\/p>\n<p><strong>Example<\/strong>: Attackers use GitHub repositories or Gist as a C2 channel. If GitHub is allowlisted, malicious workloads can still \u201cphone home.\u201d<\/li>\n<li><strong>Third-Party Dependencies or SaaS Integrations Can Be Hijacked<\/strong><br \/>\nCloud workloads often communicate with APIs or services (e.g., NPM, PyPI, S3 buckets) that can be tampered with.<\/p>\n<p><strong>Example<\/strong>: The SolarWinds Orion breach included an update from a trusted, signed source that was weaponized. If SolarWinds\u2019 update server was allowlisted, the malicious update would still go through.<\/li>\n<li><strong>DNS Tunneling or Domain Fronting Inside Allowed Domains<\/strong><br \/>\nDNS requests to allowed domains (like *.google.com) can be used to tunnel data.<\/p>\n<p><strong>Example<\/strong>: The Cobalt Strike beacon can use DNS tunneling. Even if the domain is allowed, the data going over it is malicious.<\/li>\n<li><strong>IP Allowlisting in Cloud Is Fragile<\/strong><br \/>\nMany SaaS and cloud services use shared IP pools or content delivery networks (CDNs), like Cloudflare. A malicious service hosted on the same IP range can bypass filters.<\/p>\n<p><strong>Example<\/strong>: An attacker uses the same CDN as an allowlisted SaaS to exfiltrate data.\n<\/li>\n<li><strong>Zero-Day Exploits or Supply Chain Attacks<\/strong><br \/>\nWorkloads can be breached due to vulnerabilities in libraries, containers or APIs, and those workloads may then make malicious outbound calls to allowlisted services.<\/p>\n<p><strong>Example<\/strong>: In the Log4Shell (Log4j) vulnerability, exploited systems could make outbound Java Naming and Directory Interface (JNDI) lookups to allowlisted Lightweight Directory Access Protocol (LDAP) servers hosting malicious payloads.\n<\/li>\n<li><strong>Misconfigurations in Allowlists<\/strong><br \/>\nIf a domain like *.amazonaws.com is allowlisted, a compromised workload can access attacker-controlled Amazon S3 buckets or Elastic Compute Cloud (EC2) instances.<\/p>\n<p><strong>Example<\/strong>: Attacker sets up malicious content in a region-specific S3 bucket (malicious-bucket.s3.us-west-2.amazonaws.com) that is covered by a broad allowlist.<\/li>\n<\/ol>\n<h4>Real-World Breach Examples<\/h4>\n<p>Sophisticated attackers have developed techniques to bypass allowlisting, demonstrating that even traffic restricted to \u201capproved\u201d destinations can facilitate malicious communications through legitimate channels.<\/p>\n<ol class=\"list-spacing\">\n<li><strong>Domain Fronting: Exploiting CDNs<\/strong><br \/>\nDomain fronting is a potent method to evade allowlisting by masking malicious traffic as legitimate communication via CDNs. Using HTTPS encryption, attackers disguise traffic to malicious destinations as interactions with allowlisted domains. For example, if a workload is allowed to connect to a legitimate Akamai-hosted service like www.disney[.]com, it can communicate with any domain on the same IP (e.g., 23.214.98.69), as firewalls only see the allowlisted CDN domain during DNS and TLS negotiations.<\/p>\n<p>Tools like Psiphon have exploited domain fronting to bypass network restrictions, enabling malware in cloud workloads to establish C2 channels while appearing to interact with approved services.<sup>1<\/sup><\/li>\n<li><strong>Compromised SaaS Services: The VEILDrive Campaign<\/strong><br \/>\nThe 2024 <a href=\"https:\/\/www.hunters.security\/en\/blog\/veildrive-microsoft-services-malware-c2\" target=\"_blank\"><strong>VEILDrive<\/strong><\/a> campaign highlights how attackers leverage trusted, allowlisted SaaS platforms for persistent control. This attack used Microsoft services like Teams, SharePoint, Quick Assist and OneDrive as C2 channels, with a unique OneDrive-based method to manage malware. Since Microsoft services are often allowlisted, such attacks are challenging to detect.<\/li>\n<li><strong>Cloud Storage Compromise: AWS S3 Bucket Attacks<\/strong><br \/>\nAmazon S3 buckets, frequently allowlisted for business needs, can become attack vectors when misconfigured or compromised. Attackers can use them to host malicious content or operate C2 servers. Research indicates 46 percent of S3 buckets may be misconfigured, posing significant risks.<\/p>\n<p>Notable breaches include the <a href=\"https:\/\/www.securityhq.com\/blog\/security-101-compromised-aws-s3-buckets\/\" target=\"_blank\"><strong>2020 Twilio incident<\/strong><\/a>, where attackers accessed an unprotected S3 bucket to upload a potentially harmful software development kit (SDK), and the <a href=\"https:\/\/cisomag.com\/premier-diagnostics-data-exposed\/\" target=\"_blank\"><strong>2021 Premier Diagnostics<\/strong><\/a> breach, exposing over 50,000 patient records due to publicly accessible buckets.<\/li>\n<\/ol>\n<h4>Best Practices to Strengthen Security<\/h4>\n<ul class=\"list-spacing\">\n<li>Use Protective DNS solutions like Infoblox Threat Defense\u2122 to spot anomalies in DNS traffic.<\/li>\n<li>Enrich policies with threat intelligence to block known malicious destinations within allowlisted categories.<\/li>\n<li>Apply deep packet inspection and behavioral analytics for suspicious activity detection.<\/li>\n<li>Implement Zero Trust Segmentation and least-privilege access to limit network permissions.<\/li>\n<li>Monitor cloud-native logs and telemetry using SIEM\/SOAR tools.<\/li>\n<\/ul>\n<h4>Conclusion<\/h4>\n<p>Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws. To protect your cloud workloads, you need a layered defense that incorporates Protective DNS, threat intelligence, behavioral monitoring and Zero Trust principles. Organizations must evolve beyond simple allow\/deny rules to counter both external threats and internal misuse of approved pathways.<\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.bamsoftware.com\/papers\/fronting\/\" target=\"_blank\"><strong>Blocking-resistant communication through domain fronting<\/strong><\/a>, Fifield, David, Lan, Chang, Hynes, Rod, Wegmann, Percy, Paxson, Vern, De Gruyter, June 8, 2015.<\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('Why Allowlisting Alone Is Not Sufficient to <span class=\"gradient\">Protect Cloud Workloads<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As someone who has spent years working with cloud environments, I\u2019ve seen firsthand how the landscape is changing. Cloud workloads operate in dynamic environments, interacting with diverse services, APIs and third-party platforms. While allowlisting outbound destinations is a common security practice, it\u2019s operationally challenging and difficult to keep allowlists current as cloud services, workloads and [&hellip;]<\/p>\n","protected":false},"author":408,"featured_media":11912,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1249,1250,405,1251,1252],"class_list":{"0":"post-11881","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-allowlist-limitation","9":"tag-cloud-workload-security","10":"tag-zero-trust","11":"tag-cloud-security-best-practices","12":"tag-dns-threat-protection","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads<\/title>\n<meta name=\"description\" content=\"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads\" \/>\n<meta property=\"og:description\" content=\"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-02T17:25:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-02T17:34:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Albert Chew\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads\" \/>\n<meta name=\"twitter:description\" content=\"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Albert Chew\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/\"},\"author\":{\"name\":\"Albert Chew\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/539a20a25a420bce380bb13ccc072bf7\"},\"headline\":\"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads\",\"datePublished\":\"2025-07-02T17:25:40+00:00\",\"dateModified\":\"2025-07-02T17:34:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg\",\"keywords\":[\"Allowlist Limitation\",\"Cloud Workload Security\",\"Zero Trust\",\"Cloud Security Best practices\",\"DNS Threat Protection\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/\",\"name\":\"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg\",\"datePublished\":\"2025-07-02T17:25:40+00:00\",\"dateModified\":\"2025-07-02T17:34:13+00:00\",\"description\":\"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/539a20a25a420bce380bb13ccc072bf7\",\"name\":\"Albert Chew\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/albert-chew-photo-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/albert-chew-photo-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/albert-chew-photo-96x96.jpg\",\"caption\":\"Albert Chew\"},\"description\":\"Albert Chew is a Senior Product Marketing Manager for Security at Infoblox, specializing in the Security Ecosystem and Hyperscalers. Before joining Infoblox, Albert spent over 25+ years at Microsoft, where he was a key pioneer in building the Microsoft Security business. Over the last decade, he held roles in both product marketing and product management, playing a pivotal role in launching Microsoft Sentinel, Microsoft Defender XDR, and Azure Network Security solutions.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/albert-chew\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads","description":"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/","og_locale":"en_US","og_type":"article","og_title":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads","og_description":"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/","og_site_name":"Infoblox Blog","article_published_time":"2025-07-02T17:25:40+00:00","article_modified_time":"2025-07-02T17:34:13+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg","type":"image\/jpeg"}],"author":"Albert Chew","twitter_card":"summary_large_image","twitter_title":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads","twitter_description":"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg","twitter_misc":{"Written by":"Albert Chew","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/"},"author":{"name":"Albert Chew","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/539a20a25a420bce380bb13ccc072bf7"},"headline":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads","datePublished":"2025-07-02T17:25:40+00:00","dateModified":"2025-07-02T17:34:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/"},"wordCount":866,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg","keywords":["Allowlist Limitation","Cloud Workload Security","Zero Trust","Cloud Security Best practices","DNS Threat Protection"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/","url":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/","name":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg","datePublished":"2025-07-02T17:25:40+00:00","dateModified":"2025-07-02T17:34:13+00:00","description":"Allowlisting is a critical security layer for cloud workloads, but it\u2019s not enough on its own. Sophisticated attackers can exploit legitimate channels using domain fronting, compromised SaaS services, misconfigured cloud storage and implementation flaws.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/why-allowlisting-alone-is-not-sufficient-to-protect-cloud-workloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Why Allowlisting Alone Is Not Sufficient to Protect Cloud Workloads"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/539a20a25a420bce380bb13ccc072bf7","name":"Albert Chew","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/albert-chew-photo-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/albert-chew-photo-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/albert-chew-photo-96x96.jpg","caption":"Albert Chew"},"description":"Albert Chew is a Senior Product Marketing Manager for Security at Infoblox, specializing in the Security Ecosystem and Hyperscalers. Before joining Infoblox, Albert spent over 25+ years at Microsoft, where he was a key pioneer in building the Microsoft Security business. Over the last decade, he held roles in both product marketing and product management, playing a pivotal role in launching Microsoft Sentinel, Microsoft Defender XDR, and Azure Network Security solutions.","url":"https:\/\/www.infoblox.com\/blog\/author\/albert-chew\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11881"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11881\/revisions"}],"predecessor-version":[{"id":11884,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11881\/revisions\/11884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/11912"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}