x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu

Report finds old misconfiguration woes continue to hammer corporate clouds

May 12, 2021

SC Media

Misconfigured buckets and leaky APIs continue to be the biggest and most impactful cloud security holes for businesses.

New research from security vendor Aqua Security, which draws on the past year of internal customer data, finds that businesses continue to suffer fallout from their poorly configured cloud assets in the form of data breaches. That jives with previous research: cloud misconfiguration errors compose close to half of all “miscellaneous error”-related breaches tracked in Verizon’s 2020 Data Breach and Incident Response report, while the percentage of misconfigured assets discovered continues to rise each year.