burger menu
Cloud-Native: The Infrastructure-as-a-Service (IaaS) Adoption and Risk Report

Cloud-Native: The Infrastructure-as-a-Service (IaaS) Adoption and Risk Report

    Add to bookmarks
SUMMARY

Companies are using IaaS as the new IT environment by default to create and host applications.

The paper notes that firms assume on not a few occasions that security is taken care of completely by cloud providers. However, the security of what cloud customers host in the cloud is essentially their responsibility, the paper states.

According to this study, several breaches have taken place in IaaS environments. In the majority of cases, what’s described as the Cloud-Native Breach comes as an attack that is the result of data left open by errors related to the cloud environment configuration. Cyber attackers can take advantage and access data through cloud-native functions, rather than malware, the document says.

The research shows that companies using IaaS don’t notice the vast majority of misconfigurations. According to the survey, companies reported 37 misconfiguration incidents on a monthly basis. However, this is confronted with real-world data that shows that organizations are actually experiencing around 3,500 of these attacks.

The findings also suggest that only a quarter of respondents admitted having the appropriate security tools in place to audit configurations in IaaS. The paper refers to this issue as a practitioner-leadership disconnect. Security experts should think about enabling their employees with the appropriate tools to keep up with security problems, the report states.

Report download requires free registration on the publisher's website.

OUTLINE

Executive Summary

Cloud-native breaches

IaaS

Recommendations

Methodology

DETAILS

Overview

Researchfinder Rating
4 out of 5 stars
Title
Cloud-Native: The Infrastructure-as-a-Service (IaaS) Adoption and Risk Report
Region
Global
Published
Sept. 25, 2019
Publisher
McAfee
Price
FREE
Language
ENGLISH

Content

Number of Pages
17
Number of Tables
10
Number of Exhibits
0
Topics
cloud, security
Tags
cloud computing, cloud security, cyber security, global, IaaS, McAfee, security
Companies mentioned
Microsoft, AWS, Google
Methodology
This report is based on survey of 1,000 IT professionals in 11 countries. The results were compared to aggregated, anonymized cloud usage data for over 30 million McAfee® MVISION Cloud users.
EVALUATION

This report stands out for its clear Executive Summary, appealing design, and good graphs.

Positives:

  • Appealing design
  • Great graphs
  • Clear Executive Summary

Negatives:

  • Pretty technical report

Similiar Reports

Internet Trends 2019

FREE

2019 Global eCommerce Fraud Management Report

FREE

Internet of Things

FREE