The top cloud security threats to be aware of in 2022

As more organizations move to the cloud, so do attackers. What can you do to better protect your cloud environment in 2022? Wiz Research has compiled the most pressing cloud security threats and how you can protect against them.

2 min read

As more organizations move to the cloud, so do attackers. What can you do to better protect your cloud environment in 2022? Wiz Research has compiled the most pressing cloud security threats and how you can protect against them.

Get the full report

Cloud adoption is growing so quickly that sometimes the technology is applied without the necessary security considerations or cloud knowledge. The cloud has new additional complexities that were not seen in standard on-premises environment: it is comprised of both CSPs and customer code, there is  a complicated permissions model, it can be owned by different teams (DevOps, engineering, cloud security, and more) in the organization, and not all cloud assets can be easily monitored.

Challenges like these have opened cloud environments up to new threats. The Wiz Research Team has created a new report to examine the most notable cloud security threats in 2022 with guidance on how best to protect yourself from the perspective of seasoned cybersecurity threat researchers.

For example, since developers started adopting cloud technology independently of security teams, it created a gap between how the cloud is used and how it should be used securely. It is common for a developer to inadvertently push into the CI/CD pipeline an asset with secrets, that is then deployed to an externally exposed resource which is easily abused by hackers. This is just one of the scenarios we examine in our report, and help you protect against.

Another security concern that has been on the news for a while now is supply chain risk. In the past year, we’ve seen how vulnerabilities in prevalent libraries like Azure OMI and Log4j. The latter affected dozens of software vendors and all 3 major CSPs – AWS, GCP and Azure. How can you detect all vulnerable Log4j assets (CVE-2021-44228/Log4Shell) in your environment without visibility into running compute workloads (VMs, containers, serverless functions and the software installed on them) and PaaS?

In the “2022 Cloud Security Threats” report, the Wiz Research Team looks back at the common, notable, and sophisticated cloud attacks in 2021. Read the report to learn about what threats to expect in 2022, and what you can do to better protect your organization. The report provides a focused analysis of the top four cloud-native security threats, and a complete checklist of cloud security best practices that you can start implementing right now to keep your cloud safe.

Tags:
#Research

Secure everything you build and run in the cloud

Organizations of all sizes and industries use Wiz to rapidly identify and remove the most critical risks in AWS, Azure, GCP, OCI, and Kubernetes so they can build faster and more securely.

Continue reading

Towards a better cloud vulnerability response model

Who is responsible for doing what when a new cloud vulnerability is disclosed? Right now, it can be hard to know.

Log4Shell: Wrap all your Log4j fixes before the holidays

The main challenge with Log4j is understanding your existing infrastructure, and identifying the location of all vulnerable Log4j libraries. Follow Wiz's recommendations to wrap it all before the Holidays!

NotLegit: Azure App Service vulnerability exposed hundreds of source code repositories

Read about the NotLegit vulnerability discovered by the Wiz Research Team, where the Azure App Service exposed hundreds of source code repositories