- Most common cloud vulnerabilities: Vulnerable APIs and misconfigurations can unravel an organization’s cloud aspirations. “Rogue” APIs are estimated to afflict every 3 out of 4 businesses, comprising up to 50% of their entire API environment. Meanwhile, common misconfigurations have opened companies up to devastating data breaches – such as Log4j, Spring4Shell and the PAN-OS firewall CVE. Read more about how these threats take shape.
- Challenges to resourcing and visibility: 1 in 3 IT and security professionals believe their organization is insufficiently staffed to manage cloud environments. Another 79% of respondents reported staff-related issues to managing cloud deployments for the remote workforce. Meanwhile, organizations struggle to maintain visibility over cloud assets as they contend with microservices, segmented storage and different teams assuming different ownership of cloud properties.
- Security recommendations: There are a handful of tactics and tools that organizations can call on to help secure their public cloud today. For example, we look at the rise of automated tools such as infrastructure-as-code, which reduces risk of misconfiguration. Cloud inventory platforms also have a role to play in centralizing cloud assets in one location for shared access and visibility. Finally, getting developers, IT operations, and security analysts on the same page can radically impact how an organization anticipates and responds to attacks on the cloud.
These are the different levels of risk an organization is trying to identify, and they’re trying to do all of it in real time and on a continual basis. To resolve these risks, you have to work across multiple teams. The security analysts and IT teams have to coordinate in an effective way, and yet it often happens that each one has their own definition of what the riskiest assets are.
Scott Clinton, Vice President of Marketing at Qualys
Executive management needs to know what to care about, but on the other hand, we cannot constantly tell them that the sky is falling. Information security risk is just one of many risks facing the business, but for those of us in infosec this is what we eat, sleep and breathe—so we must keep our perspective when escalating issues.
Kenneth G. Hartman, Certified Instructor at SANS Institute