46% of organisations are using unmanaged users with long-lived credentials

Datadog has published its new report, the State of Cloud Security 2024. The report found that long-lived credentials continue to be a major risk for organizations across all cloud providers.

  • Monday, 28th October 2024 Posted 1 year ago in by Phil Alsop

Long-lived cloud credentials never expire and frequently get leaked in source code, container images, build logs and application artifacts, making them a major security risk. Research has shown that they are the most common cause of publicly documented cloud security breaches. While the risks are well documented, Datadog’s report found that almost half (46%) of organizations are still using unmanaged users with long-lived credentials.

According to the report, not only are long-lived credentials widespread across all major clouds, they are also often old and even unused. 62% of Google Cloud service accounts, 60% of AWS IAM users and 46% of Microsoft Entra ID applications have an access key older than one year.

“The findings from the State of Cloud Security 2024 suggest it is unrealistic to expect that long-lived credentials can be securely managed,” said Andrew Krug, Head of Security Advocacy at Datadog. “In addition to long-lived credentials being a major risk, the report found that most cloud security incidents are caused by compromised credentials. To protect themselves, companies need to secure identities with modern authentication mechanisms, leverage short-lived credentials and actively monitor changes to APIs that attackers commonly use.”

Other key findings from the report include:

● Adoption of cloud guardrails is on the rise—79% of S3 buckets are covered by an account-wide or bucket-specific S3 Public Access Block, up from 73% a year ago—thanks to cloud providers starting to enable guardrails by default.

● More than 18% of AWS EC2 instances and 33% of Google Cloud VMs have sensitive permissions to a project. This puts organizations at risk as any attacker compromising the workload is able to steal associated credentials and access the cloud environment.

● 10% of third-party integrations have risky cloud permissions, allowing the vendor to access all data in the account or to take over the whole AWS account. 2% percent of third-party integration roles don't enforce the use of External IDs, which allows an attacker to compromise them through a "confused deputy" attack.

Identity security meets real-time threat response

Posted 2 weeks ago by Sophie Milburn
SailPoint announces new integrations with CrowdStrike to bolster identity-based threat response, advancing security operations and decision-making...

Small businesses face rising cybersecurity attacks

Posted 2 weeks ago by Sophie Milburn
Nearly half of US SMBs faced cyberattacks, yet many remain underprepared and reliant on untrained staff for security, Guardz study finds.
TCS strengthens its alliance with Aviva by expanding its policy administration services, embracing advanced digital solutions for customer-focused...
Hammer teams up with Nexsan to offer storage solutions across EMEA, enhancing modern data management capabilities.

Nordic security expertise expands in Europe

Posted 2 weeks ago by Sophie Milburn
MetaCompliance expands its foothold in Europe by acquiring Nordic leader Junglemap, enhancing its capacity to offer advanced security and compliance...

CrowdStrike launches Falcon AIDR for AI security

Posted 2 weeks ago by Sophie Milburn
CrowdStrike unveils Falcon AIDR, a unified platform to secure AI interactions, marking a new era in enterprise AI security.

Storage platform receives HPE validation for integration

Posted 2 weeks ago by Sophie Milburn
StorONE's platform meets HPE's standards, enabling organisations to efficiently leverage HPE ProLiant Gen11 servers.
Keepit partners with Ingram Micro to extend its data protection solution to French resellers and MSPs, enhancing reach and robustness.