Incident: Facebook Data Exposure on Amazon Servers: Privacy Breach Impact.

Published Date: 2019-04-03

Postmortem Analysis
Timeline 1. The software failure incident where a vast collection of data on Facebook users was exposed on Amazon's cloud computing servers happened recently as per the article published on April 3, 2019 [Article 83491]. Therefore, the estimated timeline for the incident would be around March 2019.
System 1. Facebook's data storage policies and security measures [83491]
Responsible Organization 1. Two third-party Facebook app developers [83491]
Impacted Organization 1. Facebook users [83491]
Software Causes 1. Inadequate data storage practices by third-party Facebook app developers led to the exposure of user data on Amazon's cloud computing servers [83491]. 2. Failure to secure user data by the app developers, resulting in the storage of unprotected Facebook passwords for 22,000 users [83491]. 3. Exploitation of a bug on the Facebook platform by attackers, leading to the exposure of information of nearly 50 million users [83491].
Non-software Causes 1. Mass data collection practices by Facebook and third-party developers [83491] 2. Inadequate data storage practices by the third-party app developers [83491] 3. Lack of proper data protection measures by the third-party app developers [83491]
Impacts 1. User data of Facebook users, including comments, likes, reactions, and account names, was exposed on Amazon's cloud computing servers, potentially affecting a large number of users [Article 83491]. 2. Unprotected Facebook passwords for 22,000 users were stored by one of the third-party app developers on the Amazon servers, posing a significant security risk [Article 83491]. 3. The incident highlighted the ongoing struggle of Facebook to protect the data collected from its more than 2 billion users, leading to increased scrutiny on the company's data privacy practices [Article 83491].
Preventions 1. Implementing stricter data storage policies and regular audits to ensure compliance with those policies could have prevented the incident [83491]. 2. Conducting thorough security assessments and audits of third-party developers to ensure they adhere to data protection standards could have helped prevent the exposure of user data [83491]. 3. Enhancing data encryption and access controls for sensitive user information stored on cloud servers could have mitigated the risk of unauthorized access and exposure [83491].
Fixes 1. Implement stricter data storage policies and regular audits to ensure that third-party developers are not storing sensitive user data in public databases [83491]. 2. Enhance data security measures to prevent unauthorized access to user data, such as implementing encryption and access controls. 3. Conduct thorough vetting and monitoring of third-party app developers to ensure compliance with data protection regulations and best practices. 4. Improve oversight and enforcement mechanisms to hold companies accountable for mishandling user data, including imposing fines and penalties for violations.
References 1. UpGuard, a cybersecurity firm [83491] 2. Facebook spokesperson [83491] 3. Chris Vickery, director of cyber risk research at UpGuard [83491] 4. Bloomberg [83491]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to data exposure and improper storage of user data on Amazon's cloud computing servers involving Facebook has happened before within the same organization. Facebook has faced previous data privacy scandals, including the Cambridge Analytica incident where data from millions of users was accessed without their knowledge [83491]. (b) The incident involving data exposure and improper storage of user data on Amazon's servers is not unique to Facebook. Similar incidents of data breaches and unauthorized access have occurred at other organizations as well, highlighting a broader issue in the industry regarding data security and privacy [83491].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be attributed to the way third-party Facebook app developers stored user data on Amazon's cloud computing servers. The incident occurred because the developers stored data in a way that allowed it to be downloaded by the public, highlighting a problem with mass data collection [83491]. (b) The software failure incident related to the operation phase can be seen in the fact that Facebook allowed third-party developers to integrate apps and websites with its platform, leading to the exposure of user data. This incident occurred due to the operation of Facebook's platform, which allowed app developers to harvest data in mass, ultimately leading to the data exposure on Amazon's servers [83491].
Boundary (Internal/External) within_system (a) within_system: The software failure incident in the article is primarily due to the way two third-party Facebook app developers stored user data on Amazon's cloud computing servers, allowing it to be downloaded by the public [83491]. This failure originated within the system as a result of how the developers handled and stored the data, leading to the exposure of sensitive information.
Nature (Human/Non-human) non-human_actions (a) The software failure incident in Article 83491 occurred due to non-human actions. The incident involved a vast collection of Facebook user data being exposed on Amazon's cloud computing servers due to the way two third-party Facebook app developers stored the data, allowing it to be downloaded by the public [83491]. This exposure of data was not a direct result of human actions but rather a consequence of how the data was stored and accessed on the servers.
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The incident reported in the article does not directly point to a hardware failure as the root cause. The exposure of Facebook user data on Amazon's cloud computing servers was due to the way two third-party Facebook app developers stored the data, indicating a failure in data security protocols rather than hardware issues [83491]. (b) The software failure incident related to software: - The software failure incident reported in the article is primarily related to software issues. The exposure of Facebook user data on Amazon's servers was a result of how the third-party app developers stored the data, indicating a failure in software implementation and data security measures [83491].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident reported in Article 83491 is non-malicious. The incident involved a vast collection of Facebook user data being exposed to the public due to two third-party Facebook app developers storing the data on Amazon's cloud computing servers in a way that allowed it to be downloaded by the public. This exposure of user data was not intentional harm to the system but rather a result of improper data storage practices by the app developers [83491].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the exposure of Facebook user data on Amazon's cloud computing servers can be attributed to poor decisions made by the third-party Facebook app developers. These developers stored user data on Amazon's servers in a way that allowed it to be downloaded by the public, leading to a massive data breach [83491]. Additionally, Facebook's policy prohibits storing user information in a public database, indicating a lack of proper decision-making by the developers in handling sensitive data [83491].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article as it mentions how two third-party Facebook app developers stored user data on Amazon's servers in a way that allowed it to be downloaded by the public. This indicates a lack of professional competence in handling sensitive user data securely [83491]. (b) The software failure incident related to accidental factors is also present in the article as it describes how the data exposure on Amazon's cloud computing servers was discovered by researchers from UpGuard. The exposure of data was accidental in nature, as it was not intended for public access but was found to be accessible due to the way it was stored by the app developers [83491].
Duration temporary The software failure incident reported in Article 83491 can be categorized as a temporary failure. The incident involved a vast collection of Facebook user data being exposed on Amazon's cloud computing servers due to the actions of two third-party Facebook app developers. This exposure was not a permanent failure but rather a temporary one caused by specific circumstances, such as the developers storing the data in an insecure manner on the servers. Once the issue was identified, Facebook worked with Amazon to take down the exposed databases, indicating that the failure was not permanent but rather temporary in nature [83491].
Behaviour value, other (a) crash: The incident reported in the article does not involve a crash where the system loses state and does not perform any of its intended functions. The issue here is related to data exposure and improper storage rather than a system crash [83491]. (b) omission: The incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). Instead, the issue is related to the improper storage of user data by third-party app developers on Amazon's servers [83491]. (c) timing: The incident is not related to a failure due to the system performing its intended functions correctly but too late or too early. The core issue here is the exposure of user data due to improper storage practices rather than timing-related failures [83491]. (d) value: The software failure incident is primarily related to a failure due to the system performing its intended functions incorrectly. In this case, the incorrect function was the storage of user data in a way that allowed public access, violating Facebook's policies [83491]. (e) byzantine: The incident does not involve a failure due to the system behaving erroneously with inconsistent responses and interactions. The issue is more straightforward in terms of data exposure and improper data storage practices [83491]. (f) other: The behavior of the software failure incident can be categorized as a failure due to improper data handling and storage practices by third-party app developers, leading to the exposure of user data on Amazon's servers. This behavior falls under the category of data privacy and security breaches rather than specific software malfunctions like crashes or timing issues [83491].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident reported in Article 83491 involved a vast collection of data on Facebook users being exposed to the public due to the mismanagement of data by third-party Facebook app developers. The exposed data included comments, likes, reactions, account names, and even unprotected Facebook passwords for thousands of users. This incident resulted in a significant impact on the property of the affected users, as their personal data was compromised and exposed to potential misuse [83491].
Domain information (a) The software failure incident reported in the article is related to the industry of information. The incident involved a vast collection of data on Facebook users being exposed to the public due to the improper storage of user data by third-party Facebook app developers on Amazon's cloud computing servers [Article 83491].

Sources

Back to List