Survey: Organizations Increase Risk with Over Reliance on Cloud Vendors for Security
According to a new survey from CyberArk, as global organizations increasingly move critical applications, regulated customer data and development work into public cloud environments, 36 percent say the number one benefit for moving workloads to the cloud is to offload security risk. This is despite many public cloud providers providing straightforward guidance on their shared responsibility models for security and compliance in cloud environments.
The results are part of the newly-released CyberArk Global Advanced Threat Landscape Report 2019: Focus on Cloud.
“The risks caused by a lack of clarity about who is responsible for security in the cloud is compounded by an overall failure by organizations to secure privileged access in these environments,” said Adam Bosnian, executive vice president, global business development, CyberArk. “Despite the often sensitive and highly regulated data being stored in the cloud, it was surprising to see that less than half of organizations don’t have a strategy in place for securing privileges in the cloud, a finding that remains unchanged since our last report.”
As organizations utilize the cloud to accelerate digital transformation, there must be greater awareness of where potential security risks exist:
- 49 percent of respondents migrate business critical applications (i.e., ERP, CRM or financial management) into the public cloud
- 45 percent store customer data subject to regulatory oversight in the public cloud.
- 39 percent use the public cloud for internal development, including DevOps
- 75 percent rely on the cloud provider’s built-in security, despite half (50 percent) of this number recognizing cloud providers’ built-in security is not sufficient
Privileged Access is the Greatest Cloud Security Concern
According to the survey, the greatest security concerns in public cloud usage are:
- Insiders, partners and contractors with privileged access (46 percent)
- Unauthorized access to cloud management consoles (46 percent)
- Shared credentials across compute, storage or application instances (44 percent)
The problem becomes critical when unsecured and unmanaged credentials provide privileged access, which can enable attackers to escalate privileges and gain elevated access within cloud infrastructure. According to the survey:
- A majority of organizations (62 percent) are unaware that credentials, secrets and privileged accounts exist in IaaS and PaaS environments
- Only 49 percent currently have a privileged access security strategy in place for cloud infrastructure and workloads
Latest Jobs
-
- Senior Data Privacy Consultant. Client Facing | London
- London
- N/A
-
Senior Data Privacy Consultant. Client Facing | London Senior Data Privacy Consultant needed for a key client facing opportunity. Must be willing to undergo SC Security Clearance. Hybrid role- onsite with customer / office 2-3 days a week. London Key Responsibilities: Lead and support client facing data privacy projects. Assess compliance, define and deliver strategic projects / implement privacy solutions. Manage project teams and develop business opportunities. Required Experience: Experience in data protection and privacy standards. Background in consulting. Skills and Qualifications: Business consulting experience IAPP Privacy Manager / Privacy Technologist Location Greater London UK based role. Not able to provide VISA sponsorship.
-
- Security Analyst - Internal role. London commutable. Permanent
- London
- N/A
-
Security Analyst - Internal role. London commutable opportunity. Operational Security - Investigate, escalate and proactively work to ensure household name remains protected. Project Security - Coordinate, log change requests with project delivery teams to meet security requirements Policy / compliance - work with team to aid in uplifting these as and where needed This role is role to investigate, escalate and proactively work to protect a globally recognised brand. You must have current hands on operational analytical security experience with Microsoft technology stack Someone with a SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- SailPoint File Access Manager Consultant/ Architect
- N/A
- discussed on applications
-
SailPoint File Access Manager (SailPoint FAM) Consultant/ Architect is required for an up coming projects, Ideally looking for someone with experience in Designing and deploying SailPoint FAM , this is a new Deployment, you will work with customer in the initial workshop phase, to understand requirements and to get the initial design, you will then be responsible for deploying the solution. This is a home based role, with some onsite visits required during the length of the project. We are looking for someone who has previous experience in Deploying SailPoint FAM (ideally done design work) Need to have experience with SharePoint and ideally Azure and Share file