Data Loss in Cloud Storage – science & technology

NEWS: A recent legal dispute has brought the issue of data loss in cloud storage to the forefront. Adarsh Developers, a Bengaluru-based real estate firm, filed a complaint against Amazon Web Services (AWS). 

 

WHAT’S IN THE NEWS?

Background of the Case

  • On February 11, 2025, Adarsh Developers, a Bengaluru-based real estate company, officially filed a criminal complaint against Amazon Web Services (AWS), alleging that their entire financial and customer data repository had been permanently lost.
  • The company claimed that the data loss resulted in an estimated financial setback exceeding ₹150 crore, significantly disrupting their business operations.
  • This incident has raised several concerns related to data security in enterprise-grade cloud storage, the necessity of maintaining multiple backup versions of critical data, and the legal aspects surrounding cloud-based service failures.

 

The Incident: How the Data Loss Occurred

  • Usage of AWS Cloud Services:
    • Adarsh Developers had been using SAP Enterprise Resource Planning (ERP) software, specifically the SAP S/4HANA system, hosted on AWS for managing its financial transactions, customer records, supply chain operations, and business analytics.
  • AWS Representative’s Recommendation for an Upgrade:
    • In May 2023, an AWS business development representative named Saidalawi Safan recommended that Adarsh Developers upgrade their cloud storage and security infrastructure.
    • The stated reason for the upgrade was to enhance data protection and mitigate risks associated with cyber threats such as hacking, cyberterrorism, or sabotage.
    • Adarsh Developers complied with the suggestion and proceeded with the recommended service enhancements.
  • Sudden and Complete Data Loss:
    • On January 9, 2025, at precisely 10:48 AM, Adarsh Developers discovered that their entire SAP S/4HANA data environment hosted on AWS had been permanently deleted.
    • The company immediately launched an internal inquiry in an attempt to trace the reason behind this unexpected data deletion.
    • Upon reaching out to SAVIC Technologies Pvt. Ltd., their technology partner, Adarsh Developers was informed that the deletion was allegedly caused by actions taken by certain individuals from Redington (a vendor) and AWS personnel.
  • Unclear Circumstances Surrounding the Deletion:
    • The specific details regarding the exact actions performed, the intent behind them, and the technical aspects of the alleged deletion remain unknown.
    • A thorough forensic investigation is required to determine whether this was an accidental misconfiguration, unauthorized access, a cyberattack, or a deliberate act of data destruction.

 

Impact on Adarsh Developers

  • Immediate Business Disruptions:
    • The loss of data led to a complete breakdown of all essential business functions, including:
      • Inability to process customer payments, leading to cash flow issues.
      • Inability to file statutory tax returns, potentially inviting legal and regulatory penalties.
      • Disruptions in financial management, preventing the company from calculating and paying interest to lenders and stakeholders.
      • Loss of supply chain records, making it difficult to track ongoing projects, vendor payments, and procurement.
  • Financial Losses:
    • As of January 31, 2025, Adarsh Developers estimated the total loss at approximately ₹150 crore.
    • Additionally, the company calculated that the daily financial loss due to halted operations amounted to ₹5 crore starting from January 9, 2025.

 

Legal Action and Charges Filed

  • FIR Registration and Applicable Laws:
    • Adarsh Developers filed a First Information Report (FIR) on February 11, 2025, leading to a formal cybercrime investigation.
    • The case has been registered under the following provisions of Indian law:
      • Information Technology (IT) Act (specific sections yet to be disclosed).
      • Section 318(4) of the Bharatiya Nyaya Sanhita (BNS) – This section pertains to cheating and fraud, which Adarsh Developers alleges AWS and other involved parties have committed.
      • Section 319(2) of the BNS – This section deals with impersonation, suggesting that unauthorized access or identity misuse may have played a role in the data loss.
  • Ongoing Cybercrime Investigation:
    • The cybercrime police are currently investigating the allegations, seeking to determine whether the deletion was:
      • A result of intentional actions by Redington or AWS personnel.
      • A case of unauthorized access or cyberattack.
      • A misconfiguration or accidental deletion due to human error.

Possible Causes of Data Loss

  • Not Necessarily Malicious Intent:
    • While major data loss incidents are often attributed to hacking attempts or insider threats, they can also result from various technical and operational issues, including:
  • Cloud Misconfiguration:
    • Improper cloud storage settings, security policies, or system architecture could lead to accidental data deletion.
    • Weak database security, poorly managed access controls, or unprotected cloud environments can also make data vulnerable to loss.
  • Human Error:
    • Mistakes by IT administrators, miscommunication between vendors, or improper execution of system commands could have resulted in unintended deletion of critical data.
  • Vendor or Third-Party Involvement:
    • In the FIR, Adarsh Developers specifically mentioned that employees of Redington had allegedly accessed the company’s AWS storage environment at the root level and deleted their account entirely.
    • However, without concrete forensic evidence, it is not possible to pinpoint the exact cause of the data loss.
  • Requirement for a Comprehensive Investigation:
    • A full-fledged technical analysis involving AWS, Redington, SAVIC, and Adarsh Developers is necessary to verify the claims made by each party and establish accountability.

 

Amazon Web Services’ (AWS) Response

  • AWS categorically denied any responsibility for the data loss, stating:
    • "The claims against AWS are false."
    • "AWS operated as designed and is not responsible for the deletion of Adarsh Developers’ data."
  • AWS also informed Adarsh Developers that retrieving or restoring the lost data was not possible, which compelled the real estate firm to pursue legal action.

 

Similar Cases of Cloud Data Loss in the Past

Several instances of data loss involving cloud service providers have been reported globally, including:

  • Microsoft Azure Outage (January 29, 2019):
    • Affected Azure SQL databases, leading to partial data loss for some users.
    • Microsoft compensated customers by waiving cloud usage charges for 2-3 months, depending on the severity of the impact.
  • Code Spaces AWS Breach:
    • Code Spaces, a cloud-based code hosting service, suffered a Distributed Denial of Service (DDoS) attack.
    • Hackers gained access to its AWS account, deleted all primary and backup data, and caused irreparable damage.
    • The company was forced to shut down operations permanently due to the complete loss of its stored information.

 

Key Takeaways and Lessons Learned

  • Cloud Storage Risks: Organizations must ensure robust security measures, regular monitoring, and proper access control to prevent accidental or malicious deletions.
  • Multiple Data Backups are Essential:
    • Relying on a single cloud provider is risky; businesses should maintain redundant backups in offsite locations.
  • Legal and Contractual Clarity:
    • Service-level agreements (SLAs) must clearly define data recovery policies, responsibility in case of data loss, and vendor accountability.
  • Growing Need for Cybersecurity Compliance:
    • Companies must invest in cybersecurity training and audits to minimize vulnerabilities in cloud-based systems.

 

Ongoing Investigation and Future Implications

  • The cybercrime police are continuing their investigation, seeking further technical evidence.
  • The case could potentially set a legal precedent for cloud service liability and enterprise data protection laws in India.
  • A final verdict from the courts or investigative agencies will determine whether AWS, Redington, or other involved parties can be held accountable for the incident.

What are the Key Points about the Draft Digital Personal Data Protection Act (DPDP Act) Rules, 2025? 

  • About: It is a set of rules that operationalize the Digital Personal Data Protection Act (DPDP Act), 2023, to protect citizens' digital personal data while fostering India’s digital economy and innovation. 
  • Data Transfer: The rules allow the transfer of certain personal data outside India, as approved by the government. 
  • Citizens at the Core: Citizens are granted rights to demand data erasure, appoint digital nominees, and have user-friendly mechanisms to manage their data by Data Fiduciaries. 
    • Entities such as social media platforms, e-commerce companies and online gaming platforms, etc, that collect and process an individual's personal data are data fiduciaries. 
  • Data Erasure: Data retention is allowed for up to three years from the last interaction with the Data Principal (Users) or the effective date of the rules, whichever is later. 
    • The Data Fiduciary must notify the Data Principal at least 48 hours before erasure. 
  • Digital-First Approach: The rules also prescribe a "digital by design" Data Protection Board of India (DPBI) for consent mechanisms and grievance redressal, for faster resolution of complaints and grievances online.  
  • Graded Responsibilities: Graded responsibilities cater to startups and MSMEs with lower compliance burden, while Significant Data Fiduciaries have higher obligations.  
    • Digital platforms with a large number of users such as Facebook, Instagram, YouTube, Amazon, Flipkart, Netflix, etc, will qualify as significant data fiduciaries. 
  • Consent Managers: The digital platform may also collect consent through consent managers. 
    • A Consent Manager handles the collection, storage, and use of user consent, mainly for data privacy and digital interactions. 
    • Consent Manager must be a company incorporated in India with sound financial and operational capacity, having a minimum net worth of two crore rupees.   
  • DPBI: Draft rules have spelt out a framework for setting up the DPBI that will have civil court powers for personal data breach complaints.

 

What is Cloud Computing?

Cloud computing refers to the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing, allowing users to access computing services without the need for upfront investments in physical infrastructure.
Instead of purchasing, owning, and maintaining physical data centers and servers, individuals and businesses can access a wide range of technology services—including computing power, storage, networking, and databases—from a cloud service provider such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).

 

Usage of Cloud Computing

Organizations across various industries, regardless of their size, type, or business model, are leveraging cloud computing for a broad range of use cases, including:

  • Data backup and disaster recovery: Ensures that critical business data is securely stored and can be recovered in case of system failures or cyber-attacks.
  • Email and communication services: Enables cloud-hosted email solutions and collaboration tools for businesses.
  • Virtual desktops: Provides employees with remote access to desktop environments from anywhere in the world.
  • Software development and testing: Offers developers a scalable and flexible environment to build, test, and deploy applications.
  • Big data analytics: Supports processing and analyzing large volumes of data to gain actionable business insights.
  • Customer-facing web applications: Hosts websites, e-commerce platforms, and mobile applications to serve global audiences efficiently.

 

Types of Cloud Computing

1. Infrastructure as a Service (IaaS)

IaaS provides virtualized computing resources, such as servers, storage, and networking, allowing businesses to build and manage their own IT infrastructure without investing in physical hardware.

  • Key Features:
    • Highly scalable and flexible infrastructure.
    • Users have full control over operating systems, applications, and networking settings.
    • Offers on-demand access to computing power, allowing businesses to scale resources up or down based on needs.
  • Use Case:
    • Suitable for businesses that require customizable IT environments for hosting applications, databases, or enterprise systems.
    • Commonly used by companies running large-scale web applications, data processing workloads, and storage solutions.

2. Platform as a Service (PaaS)

PaaS provides a development and deployment platform that enables users to build, run, and manage applications without worrying about the underlying hardware, software, or network configurations.

  • Key Features:
    • Includes pre-configured tools and frameworks for application development.
    • Supports automated infrastructure management, reducing operational burden.
    • Developers can focus entirely on writing and optimizing code while the cloud provider handles server management, security, and updates.
  • Use Case:
    • Ideal for software developers who want to create, test, and deploy applications efficiently without managing the infrastructure.
    • Commonly used for developing web applications, mobile apps, and enterprise software.

3. Software as a Service (SaaS)

SaaS delivers fully managed, cloud-hosted software applications that users can access over the internet, eliminating the need for software installation, maintenance, and manual updates.

  • Key Features:
    • Software is maintained, updated, and secured by the provider.
    • Accessible from any device with an internet connection and web browser.
    • Subscription-based pricing model, often billed monthly or annually.
  • Use Case:
    • Widely used for email services (e.g., Gmail, Outlook), customer relationship management (CRM) tools (e.g., Salesforce), productivity suites (e.g., Microsoft 365, Google Workspace), and enterprise resource planning (ERP) solutions.
    • Beneficial for businesses that want cost-effective, scalable software solutions without the need for in-house IT maintenance.

 

Source: https://www.thehindu.com/sci-tech/technology/what-does-the-aws-adash-developers-case-tell-about-cloud-data-management-explained/article69250253.ece