Download Publication
State of Cloud Security Risk, Compliance, and Misconfigurations
Release Date: 09/17/2021
Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or modification of resources, cause service interruptions, and otherwise wreak havoc on business operations. With recent breaches due to misconfigurations making major headlines, this survey was conducted to better understand the current state of cloud security programs, tools utilized to mitigate security risks, organizations’ cloud security posture, and barriers organizations face in reducing security risks.
The goal of this survey is to assess organizational readiness for mitigating public cloud security and compliance risks due to configuration mistakes.
Key research topics include:
- Current state of cloud security programs, including top risks and usage of security tools
- Cloud Security Posture Management (CSPM) challenges faced by organizations in mitigating misconfiguration vulnerabilities
- Organizational readiness, success KPIs, and teams responsible for different aspects of cloud security posture management
Key findings from the survey:
- Lack of knowledge and expertise continues to plague security teams
- Information security and IT operations are held responsible for reducing cloud misconfigurations
- DevSecOps approach to security is still out of reach
Download this Resource
Acknowledgements
Hillary Baron
Senior Technical Director - Research, CSA
Hillary Baron
Senior Technical Director - Research, CSA
John Yeoh
Global Vice President of Research, CSA
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Shamun Mahmud
Senior Research Analyst, CSA
Shamun Mahmud
Senior Research Analyst, CSA
Alex Kaluza
Research Analyst, CSA
Alex Kaluza
Research Analyst, CSA
Josh Buker
Research Analyst, CSA
Josh Buker
Research Analyst, CSA
Nikhil Girdhar
Nikhil Girdhar
Lauren van der Vaart
Lauren van der Vaart
Are you a research volunteer? Request to have your profile displayed on the website here.
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more