Capital One Breach

Last updated: June 29, 2025

Target Audience

Keywords

Introduction

Overview

The Capital One breach of 2019 was a major cybersecurity breach that exposed the sensitive data of over 100 million individuals. A former employee of a cloud service provider exploited a misconfiguration in Capital One's cloud firewall, gaining access to credit application data. Despite being a relatively simple attack, it went undetected until an outsider reported the data being publicly shared online. The breach highlighted the importance of cloud security, insider threat management, and continuous monitoring.

Vulnerability Details

The attacker was a former Amazon Web Services (AWS) employee who discovered a firewall misconfiguration in Capital One's infrastructure. Using knowledge of cloud systems and access controls, the attacker was able to query metadata services to retrieve credentials and extract customer data from cloud storage. The attack was not detected internally. Instead, a GitHub user who found the data publicly posted online notified Capital One. The FBI was involved in the investigation. This case underscores the importance of identity and access management, proper configuration audits, encryption, logging, and insider threat mitigation strategies.

Learning Objectives

  • Explain cloud security and web security
  • Describe security and privacy violations in the CapitalOne data breach
  • List common protection mechanisms for cloud security and web security

Download

  • Includes a PDF case study adapted from a real-world cyber breach
  • Guided questions for student engagement
  • Instructor materials including context and background
  • All content packaged in a downloadable ZIP file

Remote Terminal

Terminal Description

Module Questions

What happened in the Capital One data breach of 2019?
What are two effective security mechanisms to guard against vulnerabilities in cloud environments?
How can companies mitigate the risk of insider attacks in cloud-based environments?
How can companies improve monitoring and response times to detect breaches like the Capital One attack?
What weaknesses were present in Capital One's cloud security practices that led to the breach?