The good, the bad, and the vulnerable

Get the tl;dr on Wiz's methodology for cloud vulnerability triage in our new report, "The good, the bad, and the vulnerable."

2 분 읽기

Vulnerability management in the cloud presents new challenges and opportunities. The Wiz threat research team presents a new report focusing on how the ability to manage vulnerabilities in the cloud requires an understanding of both Application Security (AppSec) and Cloud Security (CloudSec). Using recent vulnerabilities as examples, the report explores insights on vulnerability management in cloud environments, along with Wiz’s methodology for using vulnerability intelligence. 

The good

Let's begin by exploring the positive aspects of vulnerability management in cloud environments. One notable advantage is the ease of reducing the attack surface. Cloud environments offer opportunities for minimizing the attack surface through techniques like employing smaller images. Additionally, the adoption of serverless and Software-as-a-Service (SaaS) models has accelerated and simplified the patching process. It's worth mentioning that many third-party software vulnerabilities have less impact in the cloud, and we'll delve into this further. 

The bad

Despite the advantages mentioned above, certain vulnerabilities can have a greater impact in cloud environments compared to on-prem environments. While SaaS and serverless architectures offer convenience, the overall complexity increases when dealing with their appliance counterparts. In such cases, organizations are reliant on vendors for patches, and achieving visibility can become challenging. 

The vulnerable

Now, let's explore how we determine which vulnerabilities truly matter in cloud environments. With the multitude of Common Vulnerabilities and Exposures (CVEs) in the cybersecurity landscape, prioritizing which vulnerabilities to patch becomes crucial to any organization. When analyzing vulnerabilities, we must consider the technologies prevalent in the cloud and the attack surface they expose. Additionally, it is essential to assess the value of a vulnerability to threat actors targeting cloud environments in light of their potential goals. 

For example, the following graph serves as a model for estimating vulnerability impact in the cloud based on perceived “tech value” and initial-access potential. 

Many vulnerabilities exist in cloud environments but in practice have limited impact due to the cloud’s unique nature and design. 

Learn more

To learn more about how to determine which technologies hold the most potential value to attackers, as well as how to gauge the impact and likelihood of vulnerabilities in your cloud environment, check out our talk from fwd: cloudsec. And click the button below to download the report!

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자