Data Leak
What is Data Leak?
Data LeakAccidental or negligent exposure of sensitive data, usually through misconfiguration or human error rather than an active attacker breaking in.
A data leak is the unintentional exposure of information that should have remained private. Unlike a data breach, where an attacker actively bypasses controls, a leak typically results from a misconfigured cloud bucket, an open database, a public source-code repository, an email sent to the wrong recipient, or a lost device. Once data is reachable, threat actors may discover, copy, and weaponise it. Defences include cloud security posture management (CSPM), strict bucket and IAM policies, DLP tools, secret-scanning in code repositories, configuration baselines, asset inventories, and ongoing security awareness training for staff handling sensitive data.
● Examples
- 01
Public S3 bucket exposing customer PDFs.
- 02
API key committed to a public GitHub repository.
- 03
Bulk email sent in CC instead of BCC, revealing all recipient addresses.
● Frequently asked questions
What is Data Leak?
Accidental or negligent exposure of sensitive data, usually through misconfiguration or human error rather than an active attacker breaking in. It belongs to the Attacks & Threats category of cybersecurity.
What does Data Leak mean?
Accidental or negligent exposure of sensitive data, usually through misconfiguration or human error rather than an active attacker breaking in.
How does Data Leak work?
A data leak is the unintentional exposure of information that should have remained private. Unlike a data breach, where an attacker actively bypasses controls, a leak typically results from a misconfigured cloud bucket, an open database, a public source-code repository, an email sent to the wrong recipient, or a lost device. Once data is reachable, threat actors may discover, copy, and weaponise it. Defences include cloud security posture management (CSPM), strict bucket and IAM policies, DLP tools, secret-scanning in code repositories, configuration baselines, asset inventories, and ongoing security awareness training for staff handling sensitive data.
How do you defend against Data Leak?
Defences for Data Leak typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Data Leak?
Common alternative names include: Information leak, Accidental disclosure.
● Related terms
- attacks№ 275
Data Breach
A confirmed security incident in which an unauthorised party accesses, exfiltrates, or discloses sensitive, protected, or confidential information.
- cloud-security№ 956
S3 Bucket Misconfiguration
A configuration error on an Amazon S3 bucket (or equivalent object store) that exposes objects, allows unintended writes, or grants broad cross-account access.
- cloud-security№ 188
Cloud Misconfiguration
A security gap caused by incorrect or insecure settings of cloud services, such as exposed storage, weak IAM policies, or open management ports.
- privacy№ 278
Data Loss Prevention (DLP)
A set of technologies and policies that detect and block unauthorized exfiltration of sensitive data across endpoints, networks, email, and cloud services.
- appsec№ 459
Hardcoded Secrets in Code
Embedding credentials, API keys, tokens, or cryptographic material directly in source code, configuration files, or container images, where they are easily discovered and abused.
- privacy№ 818
Personally Identifiable Information (PII)
Any data that can identify a specific individual on its own or when combined with other information, such as names, identifiers, or biometric records.