ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

State of Cloud Security Risk, Compliance, and Misconfigurations
State of Cloud Security Risk, Compliance, and Misconfigurations

State of Cloud Security Risk, Compliance, and Misconfigurations

Release Date: 09/17/2021

Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or modification of resources, cause service interruptions, and otherwise wreak havoc on business operations. With recent breaches due to misconfigurations making major headlines, this survey was conducted to better understand the current state of cloud security programs, tools utilized to mitigate security risks, organizations’ cloud security posture, and barriers organizations face in reducing security risks.

The goal of this survey is to assess organizational readiness for mitigating public cloud security and compliance risks due to configuration mistakes. 

Key research topics include:
  • Current state of cloud security programs, including top risks and usage of security tools
  • Cloud Security Posture Management (CSPM) challenges faced by organizations in mitigating misconfiguration vulnerabilities
  • Organizational readiness, success KPIs, and teams responsible for different aspects of cloud security posture management
Key findings from the survey:
  1. Lack of knowledge and expertise continues to plague security teams
  2. Information security and IT operations are held responsible for reducing cloud misconfigurations
  3. DevSecOps approach to security is still out of reach
Download this Resource

Bookmark
Share
View translations
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
3 Vulnerabilities in Generative AI Systems and How Penetration Testing Can Help
3 Vulnerabilities in Generative AI Systems and How Penetration Test...
Published: 11/24/2025
How to Measure SOC Efficiency and Performance (Lessons from the Frontlines)
How to Measure SOC Efficiency and Performance (Lessons from the Fro...
Published: 11/24/2025
The Internet is a Single Point of Failure
The Internet is a Single Point of Failure
Published: 11/21/2025
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025

Interested in helping develop research with CSA?

Related Certificates & Training