Unit 42 Cloud Threat Report, Volume 7
Navigating the expanding attack surface.
Don't Let Today's Security Gap Become Tomorrow's Headline
While cloud technology is not new, and many organizations have been on the cloud journey for years, cloud service providers continue evolving with new features and services.
The fast change and growth make it difficult for organizations to catch up, and, as a result, many inadvertently introduce security weaknesses into their environments.
In its annual Cloud Threat Report, Unit 42™ analyzed workloads in 210,000 cloud accounts across 1,300 different organizations and found:
They're learning from new security strategies and finding creative ways to work around them, exploiting hidden weak spots and using vulnerabilities to their advantage.
76% of organizations don't enforce MFA for console users, and 58% of organizations don't enforce MFA for root/admin users.
The prevalence of open-source usage and the complexity of software dependency make securing the software supply chain difficult.
63% of the codebases in production have unpatched vulnerabilities rated high or critical (CVSS >= 7.0), and 11% of the hosts exposed in public clouds have high or critical vulnerabilities.
What we learned throughout our research is that threat actors have become masters at exploiting common oversights in cloud security.
Get the report to learn about the greatest risks to your cloud environment and how to manage them effectively. You'll also:
Short on time? Read the Executive Summary.
Read the Report