Data Loss in
Cloud Storage – science & technology
NEWS: A recent legal dispute has brought the issue of
data loss in cloud storage to the forefront. Adarsh Developers, a
Bengaluru-based real estate firm, filed a complaint against Amazon Web
Services (AWS).
WHAT’S IN THE NEWS?
Background of the Case
- On February 11,
2025, Adarsh Developers, a Bengaluru-based real estate company, officially
filed a criminal complaint against Amazon Web Services (AWS), alleging
that their entire financial and customer data repository had been
permanently lost.
- The company
claimed that the data loss resulted in an estimated financial setback
exceeding ₹150 crore, significantly disrupting their business operations.
- This incident has
raised several concerns related to data security in enterprise-grade cloud
storage, the necessity of maintaining multiple backup versions of critical
data, and the legal aspects surrounding cloud-based service failures.
The Incident: How the Data Loss
Occurred
- Usage of AWS Cloud Services:
- Adarsh Developers had been using SAP
Enterprise Resource Planning (ERP) software, specifically the SAP S/4HANA
system, hosted on AWS for managing its financial transactions, customer
records, supply chain operations, and business analytics.
- AWS Representative’s Recommendation for an Upgrade:
- In May 2023, an AWS business development
representative named Saidalawi Safan recommended that Adarsh Developers upgrade
their cloud storage and security infrastructure.
- The stated reason for the upgrade was to enhance
data protection and mitigate risks associated with cyber threats such as
hacking, cyberterrorism, or sabotage.
- Adarsh Developers complied with the suggestion
and proceeded with the recommended service enhancements.
- Sudden and Complete Data Loss:
- On January 9, 2025, at precisely 10:48 AM,
Adarsh Developers discovered that their entire SAP S/4HANA data
environment hosted on AWS had been permanently deleted.
- The company immediately launched an internal
inquiry in an attempt to trace the reason behind this unexpected data
deletion.
- Upon reaching out to SAVIC Technologies Pvt.
Ltd., their technology partner, Adarsh Developers was informed that the
deletion was allegedly caused by actions taken by certain individuals
from Redington (a vendor) and AWS personnel.
- Unclear Circumstances Surrounding the Deletion:
- The specific details regarding the exact
actions performed, the intent behind them, and the technical aspects of
the alleged deletion remain unknown.
- A thorough forensic investigation is required
to determine whether this was an accidental misconfiguration,
unauthorized access, a cyberattack, or a deliberate act of data
destruction.
Impact on Adarsh Developers
- Immediate Business Disruptions:
- The loss of data led to a complete breakdown
of all essential business functions, including:
- Inability to process customer payments, leading to cash flow issues.
- Inability to file statutory tax returns, potentially inviting legal and regulatory
penalties.
- Disruptions in financial management, preventing the company from calculating and
paying interest to lenders and stakeholders.
- Loss of supply chain records, making it difficult to track ongoing
projects, vendor payments, and procurement.
- Financial Losses:
- As of January 31, 2025, Adarsh Developers
estimated the total loss at approximately ₹150 crore.
- Additionally, the company calculated that the daily
financial loss due to halted operations amounted to ₹5 crore starting
from January 9, 2025.
Legal Action and Charges Filed
- FIR Registration and Applicable Laws:
- Adarsh Developers filed a First Information
Report (FIR) on February 11, 2025, leading to a formal cybercrime
investigation.
- The case has been registered under the
following provisions of Indian law:
- Information Technology (IT) Act (specific sections yet to be disclosed).
- Section 318(4) of the Bharatiya Nyaya Sanhita
(BNS) – This section pertains to cheating
and fraud, which Adarsh Developers alleges AWS and other involved
parties have committed.
- Section 319(2) of the BNS – This section deals with impersonation, suggesting that
unauthorized access or identity misuse may have played a role in the
data loss.
- Ongoing Cybercrime Investigation:
- The cybercrime police are currently
investigating the allegations, seeking to determine whether the deletion
was:
- A result of
intentional actions by Redington or AWS personnel.
- A case of
unauthorized access or cyberattack.
- A misconfiguration
or accidental deletion due to human error.
Possible Causes of Data Loss
- Not Necessarily Malicious Intent:
- While major data loss incidents are often
attributed to hacking attempts or insider threats, they can also result
from various technical and operational issues, including:
- Cloud Misconfiguration:
- Improper cloud storage settings, security
policies, or system architecture could lead to accidental data deletion.
- Weak database security, poorly managed access
controls, or unprotected cloud environments can also make data vulnerable
to loss.
- Human Error:
- Mistakes by IT administrators, miscommunication
between vendors, or improper execution of system commands could have
resulted in unintended deletion of critical data.
- Vendor or Third-Party Involvement:
- In the FIR, Adarsh Developers specifically
mentioned that employees of Redington had allegedly accessed the
company’s AWS storage environment at the root level and deleted their
account entirely.
- However, without concrete forensic evidence,
it is not possible to pinpoint the exact cause of the data loss.
- Requirement for a Comprehensive Investigation:
- A full-fledged technical analysis involving
AWS, Redington, SAVIC, and Adarsh Developers is necessary to verify the
claims made by each party and establish accountability.
Amazon Web Services’ (AWS) Response
- AWS categorically
denied any responsibility for the data loss, stating:
- "The claims against AWS are false."
- "AWS operated as designed and is not
responsible for the deletion of Adarsh Developers’ data."
- AWS also informed
Adarsh Developers that retrieving or restoring the lost data was not
possible, which compelled the real estate firm to pursue legal action.
Similar Cases of Cloud Data Loss in
the Past
Several instances of data loss involving cloud
service providers have been reported globally, including:
- Microsoft Azure Outage (January 29, 2019):
- Affected Azure SQL databases, leading to partial
data loss for some users.
- Microsoft compensated customers by waiving
cloud usage charges for 2-3 months, depending on the severity of the
impact.
- Code Spaces AWS Breach:
- Code Spaces, a cloud-based code hosting
service, suffered a Distributed Denial of Service (DDoS) attack.
- Hackers gained access to its AWS account,
deleted all primary and backup data, and caused irreparable damage.
- The company was forced to shut down operations
permanently due to the complete loss of its stored information.
Key Takeaways and Lessons Learned
- Cloud Storage Risks:
Organizations must ensure robust security measures, regular monitoring,
and proper access control to prevent accidental or malicious deletions.
- Multiple Data Backups are Essential:
- Relying on a single cloud provider is risky;
businesses should maintain redundant backups in offsite locations.
- Legal and Contractual Clarity:
- Service-level agreements (SLAs) must clearly
define data recovery policies, responsibility in case of data loss, and
vendor accountability.
- Growing Need for Cybersecurity Compliance:
- Companies must invest in cybersecurity
training and audits to minimize vulnerabilities in cloud-based systems.
Ongoing Investigation and Future
Implications
- The cybercrime
police are continuing their investigation, seeking further technical
evidence.
- The case could
potentially set a legal precedent for cloud service liability and
enterprise data protection laws in India.
- A final verdict
from the courts or investigative agencies will determine whether AWS,
Redington, or other involved parties can be held accountable for the
incident.
What are the Key Points about the Draft Digital
Personal Data Protection Act (DPDP Act) Rules, 2025?
- About: It is
a set of rules that operationalize the Digital Personal Data
Protection Act (DPDP Act), 2023, to protect citizens' digital personal
data while fostering India’s digital economy and
innovation.
- Data Transfer: The
rules allow the transfer of certain personal data outside India, as
approved by the government.
- Citizens at the Core:
Citizens are granted rights to demand data erasure, appoint digital
nominees, and have user-friendly mechanisms to manage their data
by Data Fiduciaries.
- Entities such as social media
platforms, e-commerce companies and online gaming platforms, etc,
that collect and process an individual's personal data are data
fiduciaries.
- Data Erasure: Data
retention is allowed for up to three years from the last
interaction with the Data Principal (Users) or the effective
date of the rules, whichever is later.
- The Data Fiduciary must notify the Data
Principal at least 48 hours before erasure.
- Digital-First Approach: The rules also prescribe a "digital by
design" Data Protection Board of India (DPBI) for consent mechanisms
and grievance redressal, for faster resolution of complaints and
grievances online.
- Graded Responsibilities: Graded responsibilities cater to startups
and MSMEs with lower compliance burden, while Significant
Data Fiduciaries have higher obligations.
- Digital platforms with a large number of users
such as Facebook, Instagram, YouTube, Amazon, Flipkart, Netflix, etc,
will qualify as significant data fiduciaries.
- Consent Managers: The digital platform may also collect consent through consent
managers.
- A Consent Manager handles the collection,
storage, and use of user consent, mainly for data privacy and digital
interactions.
- Consent Manager must be a company
incorporated in India with sound financial and operational
capacity, having a minimum net worth of two crore
rupees.
- DPBI: Draft
rules have spelt out a framework for setting up the DPBI that
will have civil court powers for personal data breach
complaints.
What is Cloud Computing?
Cloud computing refers to the on-demand delivery of
IT resources over the Internet with pay-as-you-go pricing, allowing users to
access computing services without the need for upfront investments in physical
infrastructure.
Instead of purchasing, owning, and maintaining physical data centers and
servers, individuals and businesses can access a wide range of technology
services—including computing power, storage, networking, and databases—from a cloud
service provider such as Amazon Web Services (AWS), Microsoft Azure, or Google
Cloud Platform (GCP).
Usage of Cloud Computing
Organizations across various industries, regardless
of their size, type, or business model, are leveraging cloud computing for a
broad range of use cases, including:
- Data backup and disaster recovery: Ensures that critical business data is
securely stored and can be recovered in case of system failures or
cyber-attacks.
- Email and communication services: Enables cloud-hosted email solutions and
collaboration tools for businesses.
- Virtual desktops:
Provides employees with remote access to desktop environments from
anywhere in the world.
- Software development and testing: Offers developers a scalable and flexible
environment to build, test, and deploy applications.
- Big data analytics:
Supports processing and analyzing large volumes of data to gain actionable
business insights.
- Customer-facing web applications: Hosts websites, e-commerce platforms, and
mobile applications to serve global audiences efficiently.
Types of Cloud Computing
1. Infrastructure
as a Service (IaaS)
IaaS provides virtualized computing resources, such
as servers, storage, and networking, allowing businesses to build and manage
their own IT infrastructure without investing in physical hardware.
- Key Features:
- Highly scalable and flexible infrastructure.
- Users have full control over operating
systems, applications, and networking settings.
- Offers on-demand access to computing power,
allowing businesses to scale resources up or down based on needs.
- Use Case:
- Suitable for businesses that require customizable
IT environments for hosting applications, databases, or enterprise
systems.
- Commonly used by companies running large-scale
web applications, data processing workloads, and storage solutions.
2. Platform as a
Service (PaaS)
PaaS provides a development and deployment platform
that enables users to build, run, and manage applications without worrying
about the underlying hardware, software, or network configurations.
- Key Features:
- Includes pre-configured tools and frameworks
for application development.
- Supports automated infrastructure management,
reducing operational burden.
- Developers can focus entirely on writing and
optimizing code while the cloud provider handles server management,
security, and updates.
- Use Case:
- Ideal for software developers who want to
create, test, and deploy applications efficiently without managing the
infrastructure.
- Commonly used for developing web applications,
mobile apps, and enterprise software.
3. Software as a
Service (SaaS)
SaaS delivers fully managed, cloud-hosted software
applications that users can access over the internet, eliminating the need for
software installation, maintenance, and manual updates.
- Key Features:
- Software is maintained, updated, and secured
by the provider.
- Accessible from any device with an internet
connection and web browser.
- Subscription-based pricing model, often billed
monthly or annually.
- Use Case:
- Widely used for email services (e.g., Gmail,
Outlook), customer relationship management (CRM) tools (e.g.,
Salesforce), productivity suites (e.g., Microsoft 365, Google Workspace),
and enterprise resource planning (ERP) solutions.
- Beneficial for businesses that want cost-effective,
scalable software solutions without the need for in-house IT maintenance.
Source: https://www.thehindu.com/sci-tech/technology/what-does-the-aws-adash-developers-case-tell-about-cloud-data-management-explained/article69250253.ece