There are two main attributes to these buckets that should not be ignored. First, cloud storage and thereby storage buckets are a shared service that resides outside of the private cloud and firewall perimeter; and second, cloud buckets are based on object storage, which doesn’t enforce file system Access Control Lists (ACLs) that have been used for years by organisations to define file-level granular permissions. The inherent weaknesses of cloud buckets coupled with the immaturity of cloud storage administration relative to the decades of enterprise IT experience with tradition or legacy storage results in unprotected storage, likely to fall prey in the hands of hackers who constantly run their scans searching for the next victim.