This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Sep 16, 2020
In the rush to automate more and more build processes in the cloud, many organizations are adopting infrastructure as code (IaC) to help streamline their operations. While IaC itself isn't new, many companies are adopting it for the first time. As often happens when moving quickly, this is opening them up to new risks.
Using a combination of proprietary Palo Alto Networks data and intel from public sources, Unit 42 cloud threat researchers analyzed hundreds of thousands of IaC templates. Research shows that IaC offers security teams a programmatic way to enforce security standards, but much of its power remains largely unharnessed--and in many cases, it's simply not secure.
Key findings show more than 199,000 potential vulnerabilities in IaC templates. On top of that, more than 43% of cloud databases are currently unencrypted, and only 60% of cloud storage services have logging enabled.
The full Unit 42 Cloud Threat Report offers insight on:
• Vulnerabilities in IaC templates and how to avoid them
• The latest trends in cryptomining and cybercrime operations
• What's on tap for the remainder of 2020 from a threat perspective
It's crucial to be aware of these vulnerabilities. Read the report, and you can start deploying best practices to enforce complete cloud security.