Survey: Organizations Increase Risk with Over Reliance on Cloud Vendors for Security
.jpg)
According to a new survey from CyberArk, as global organizations increasingly move critical applications, regulated customer data and development work into public cloud environments, 36 percent say the number one benefit for moving workloads to the cloud is to offload security risk. This is despite many public cloud providers providing straightforward guidance on their shared responsibility models for security and compliance in cloud environments.
The results are part of the newly-released CyberArk Global Advanced Threat Landscape Report 2019: Focus on Cloud.
“The risks caused by a lack of clarity about who is responsible for security in the cloud is compounded by an overall failure by organizations to secure privileged access in these environments,” said Adam Bosnian, executive vice president, global business development, CyberArk. “Despite the often sensitive and highly regulated data being stored in the cloud, it was surprising to see that less than half of organizations don’t have a strategy in place for securing privileges in the cloud, a finding that remains unchanged since our last report.”
As organizations utilize the cloud to accelerate digital transformation, there must be greater awareness of where potential security risks exist:
- 49 percent of respondents migrate business critical applications (i.e., ERP, CRM or financial management) into the public cloud
- 45 percent store customer data subject to regulatory oversight in the public cloud.
- 39 percent use the public cloud for internal development, including DevOps
- 75 percent rely on the cloud provider’s built-in security, despite half (50 percent) of this number recognizing cloud providers’ built-in security is not sufficient
Privileged Access is the Greatest Cloud Security Concern
According to the survey, the greatest security concerns in public cloud usage are:
- Insiders, partners and contractors with privileged access (46 percent)
- Unauthorized access to cloud management consoles (46 percent)
- Shared credentials across compute, storage or application instances (44 percent)
The problem becomes critical when unsecured and unmanaged credentials provide privileged access, which can enable attackers to escalate privileges and gain elevated access within cloud infrastructure. According to the survey:
- A majority of organizations (62 percent) are unaware that credentials, secrets and privileged accounts exist in IaaS and PaaS environments
- Only 49 percent currently have a privileged access security strategy in place for cloud infrastructure and workloads

Latest Jobs
-
- Senior Presales Consultant | Managed Security Services | London
- London
- N/A
-
Senior Presales Consultant – Managed Security Services Location: London-commutable (Hybrid) A well-established cyber consultancy is seeking a Senior Presales Consultant to drive growth across its managed security services / advisory portfolio. This hybrid role bridges commercial and technical expertise supporting solution design, shaping customer proposals, and guiding conversations from scoping through to delivery. Key experience: Background in managed security services, including SOC operations and threat detection Strong knowledge of cloud and on-prem security tooling (SIEM, EDR, IAM) Penetration testing Proven ability to translate technical concepts into clear business value Confident in customer-facing engagements and pre-sales delivery Experience contributing to bids, proposals, and RFI/RFP responses To find out more contact me on 07884666351 Visa sponsorship is unfortunately not available for this role.
-
- Senior SOC Engineer - Microsoft | Splunk. Permanent. London
- London
- N/A
-
Senior SOC Engineer – Hybrid London Type: Full-Time A well-established cyber security provider is seeking a Senior SOC Engineer to strengthen its managed services function. This role is ideal for someone with a strong operational background in SIEM and EDR tools who can confidently lead customer onboarding, fine-tune detection strategies, and act as a senior point of contact for technical escalations. You will need to be SC clearable. Bonus points if you have SC clearance currently. You will be responsible for ensuring smooth integration of new clients into the service, optimising alerting capabilities and delivering meaningful outcomes during investigations. This is a hands-on position, working closely with internal teams and external stakeholders to maintain robust security operations across multiple environments. Prior experience in a cyber-focused MSP or MSSP Strong hands-on capability with platforms such as Microsoft Sentinel, Defender for Endpoint, or similar Proficiency in scripting and query languages such as KQL or PowerShell Knowledge of detection logic, investigation workflows, and cloud-based infrastructure Confident communicator with strong documentation and reporting skills Apply today for more information.