What Analyzing Hundreds of Thousands of Cloud Environments Taught Us About Data Exposure

Wiz Research reveals the latest cloud data security trends across hundreds of thousands of real-world environments.

1 분 읽기

As cloud adoption continues to accelerate, so do the questions facing security teams: Where is our sensitive data? Who can access it?  And are we doing enough to protect it? 

To help answer those questions, Wiz Research analyzed hundreds of thousands of cloud accounts across organizations of all sizes. The resulting report—Cloud Data Security Snapshot: Current Exposure Trends—uncovers the most common data exposure risks and misconfigurations in use today, with a sharp focus on where toxic combinations of access and data are creating real risk. 

Here’s a preview of what we found. 

Sensitive data is hiding in plain sight 

Virtual machines and serverless instances are often core parts of cloud infrastructure—and surprisingly often, they’re also exposed to the public internet while containing sensitive data. We found that 54% of cloud environments have exposed VMs and serverless instances containing sensitive information like PII or payment data. 

Even more concerning: 35% of cloud environments have VMs or serverless instances that both expose sensitive data and are vulnerable to high or critical severity threats.

This isn’t just a misconfiguration—it’s an opportunity to dramatically reduce breach potential by targeting high-impact overlaps of exposure and exploitability. 

Public doesn’t always mean dangerous—but context matters 

Publicly accessible resources are a normal part of cloud operations. But 72% of cloud environments have publicly exposed PaaS databases lacking access controls, raising the risk that sensitive data could be unintentionally exposed. With the right context, teams can differentiate between acceptable public assets and those that pose a genuine threat—and prioritize action accordingly.

Containers still need attention 

Despite years of innovation in container security, 12% of cloud environments still have containers that are both publicly exposed and exploitable via known vulnerabilities
It’s a reminder that continuous monitoring and good hygiene are essential in even the most mature cloud-native environments. 

Get the report 

Misconfigurations, exposure, and over-permissioned accounts are still common. But they’re not inevitable. By focusing on the right context—what’s exposed, what’s vulnerable, and what’s sensitive—security teams can get ahead of potential incidents and build a more resilient cloud environment. 

Explore the full report to see how security teams are using DSPM to turn visibility into action, and risk into results. 

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자