According to one cybersecurity firm, this can happen if organizations allow a triad of critical risk factors to remain unaddressed

Third, the data showed that 23% of cloud identities (both human and non-human), had critical or high severity excessive permissions: analyses of Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure identities of its customers had critical or high severity excessive permissions. Also:

  • Critical vulnerabilities persisted in the analyzed cloud assets. One example was CVE-2024-21626, which was not remediated in over 80% of workloads analyzed, even 40 days after the date of widespread disclosure.
  • 74% of organizations in the data were running publicly exposed storage assets, including those in which sensitive data resided, a factor for attracting ransomware attacks.
  • 78% of organizations analyzed had publicly accessible Kubernetes API servers. Of these, 41% also allowed inbound internet access.
  • 58% of organizations analyzed had cluster-admin role bindings, meaning that certain users had unrestricted control over all the Kubernetes environments.