Cloud Threat Report
Key findings and predictions for 2020

See Which IaC Vulnerabilities to Watch Out For

In the rush to automate more and more build processes in the cloud, many organizations are adopting infrastructure as code (IaC) to help streamline their operations.

IaC itself isn’t new, but many companies are adopting it for the first time. As often happens when moving quickly, this is opening them up to new risks.

Using a combination of proprietary Palo Alto Networks data and intel from public sources, the cloud-focused division of Unit 42 analyzed hundreds of thousands of IaC templates. They found that while IaC offers security teams a programmatic way to enforce security standards, much of its power remains largely unharnessed – and in many cases, it’s simply not secure.

Key Unit 42 findings show more than 199,000 potential vulnerabilities in IaC templates. On top of that, more than 43% of cloud databases are currently unencrypted, and only 60% of cloud storage services have logging enabled.

Read the full Unit 42 Cloud Threat Report. You’ll get fresh insights on: 

  • Vulnerabilities in IaC templates and how to avoid them
  • The latest trends in cryptomining and cybercrime operations
  • What’s on tap for the remainder of 2020 from a threat perspective

It’s crucial to be aware of these vulnerabilities. Read the report, and you can start deploying best practices to enforce complete cloud security.

Find out what we’ve uncovered