Cloud 101CircleEventsBlog
CAIQ Lite is now accepted into the STAR Registry! Showcase your cloud security readiness with a simplified assessment. Learn more today!

Download Publication

State of Cloud Security Risk, Compliance, and Misconfigurations
State of Cloud Security Risk, Compliance, and Misconfigurations

State of Cloud Security Risk, Compliance, and Misconfigurations

Release Date: 09/17/2021

Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or modification of resources, cause service interruptions, and otherwise wreak havoc on business operations. With recent breaches due to misconfigurations making major headlines, this survey was conducted to better understand the current state of cloud security programs, tools utilized to mitigate security risks, organizations’ cloud security posture, and barriers organizations face in reducing security risks.

The goal of this survey is to assess organizational readiness for mitigating public cloud security and compliance risks due to configuration mistakes. 

Key research topics include:
  • Current state of cloud security programs, including top risks and usage of security tools
  • Cloud Security Posture Management (CSPM) challenges faced by organizations in mitigating misconfiguration vulnerabilities
  • Organizational readiness, success KPIs, and teams responsible for different aspects of cloud security posture management
Key findings from the survey:
  1. Lack of knowledge and expertise continues to plague security teams
  2. Information security and IT operations are held responsible for reducing cloud misconfigurations
  3. DevSecOps approach to security is still out of reach
Download this Resource

Bookmark
Share
View translations
Related resources
Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2
Informative Reference Details for the Mapping o...
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
The State of Security Remediation 2024
The State of Security Remediation 2024
Reflections on NIST Symposium in September 2024, Part 2
Reflections on NIST Symposium in September 2024, Part 2
Published: 10/10/2024
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
Published: 10/10/2024
AI and Data Protection: Strategies for LLM Compliance and Risk Mitigation
AI and Data Protection: Strategies for LLM Compliance and Risk Miti...
Published: 10/09/2024
FedRAMP Loves Compliance as Code: Insights from the OMB’s Recent Memo
FedRAMP Loves Compliance as Code: Insights from the OMB’s Recent Memo
Published: 10/08/2024

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Nikhil Girdhar Headshot Missing
Nikhil Girdhar

Nikhil Girdhar

Lauren van der Vaart Headshot Missing
Lauren van der Vaart

Lauren van der Vaart

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training