Palo Alto Networks white logo Palo Alto Networks logo
  • Introduction
  • Research Techniques
  • Recommendations
  • Read the report
CLOUD THREAT RESEARCH

Unit 42 Cloud Threat Report, Volume 6

Learn how IAM governs the security of cloud infrastructure
Read the report
Introduction

IAM is the first line of defense
in cloud environments

Both during and after the pandemic, cloud adoption skyrocketed – and there doesn’t seem to be any plan to return to pre-pandemic usage. Consequently, the growing number of cloud identities has also made them major attack vectors, rendering effective identity and access management (IAM) a must for any modern enterprise.

For their latest report, Unit 42 cloud threat researchers discovered shocking statistics surrounding overly permissive IAM policies. New analysis reveals that Cloud Threat Actors are stealing cloud credentials. This led Unit 42 to compile an industry-first Cloud Threat Actor Index, designed as a living set of dossiers on who is targeting cloud infrastructure. We hope that by reading this report, you gain an understanding of the scope of Cloud Threat Actors’ tactics, techniques, and procedures and, as a result, are left well-equipped with techniques to achieve security in your cloud environments.

John Morello signature John Morello
Vice President, Prisma Cloud
Palo Alto Networks
Get the report
Short on time? Read the Executive Summary
RESEARCH TECHNIQUES

By the numbers …

Unit 42 cloud threat researchers wanted to answer the questions:

research icon

Who is attacking cloud infrastructure?

research icon

How are they doing this?

research icon

What are they targeting?


This opened the door for a new type of threat unique to the cloud: Cloud Threat Actors

Find out how Cloud Threat Actors use vulnerable IAM credentials
RECOMMENDATIONS

How can your organization stay protected?

Download the report to learn how to prevent Cloud Threat Actors from exposing your organization’s low-hanging fruit, such as overly permissive IAM policies. Our elite threat research team provides three actionable recommendations your organization can implement immediately to help achieve security.

Download now to stay protected
THREAT REPORT

Unit 42 Cloud Threat Report, Volume 3

Download more cloud identity threat research

Read it now
PRISMA CLOUD

See how Prisma Cloud can address the cloud threats in your enterprise.

Learn more
register brochure
Get your copy now!
By submitting this form, you agree to our Terms. View our Privacy Statement.

Your guide is ready for download!

We hope you find the report insightful as you implement cloud identity security controls.
Download the report
guide brochure

Cloud Infrastructure Entitlement Management

Learn about Palo Alto Networks’ cloud native security solution for CIEM and IAM.

Why IAM Security Must Be An Essential Component of CSPM

Read the blog post.

5-Minute Guide to Understanding CIEM                  

Download now.                  
Request an exclusive briefing
By submitting this form, you agree to our Terms. View our Privacy Statement.

Thank you for your interest!

We will be contacting you shortly to set up your briefing.
complex picture
research modal

Get the latest news, invites to events and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Tech Insider
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Newsroom
  • Careers
  • Contact Us
  • Product Certifications
  • Manage Email Preferences
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved