Discover what’s really driving the shift toward unified security
Discover how geopolitical tensions are fueling advanced cyber campaigns
Is the Quantum Threat Closer Than You Think?
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials

Research Reports
Apr 12, 2022

Unit 42 Cloud Threat Report, Volume 6

Unit 42 Cloud Threat Report, Volume 6

English
Preview PDF Download
Preview PDF Download
asset thumbnail

Cloud Threat Actors Have IAM Misconfigurations in Sight

As the cloud evolves, so should your security strategy. But before you commit to a plan, make sure your cloud security teams are asking the right questions. These include:

  • Who is attacking cloud infrastructure?
  • How are they doing this?
  • What are they targeting?

Knowing what makes you a more vulnerable target is just as important. Misconfigurations tend to be at the center of the majority of known cloud security incidents, and poorly written identity and access management (IAM) policies are often the culprits. While IAM is a complex component that governs the authentication and authorization of every resource in a cloud environment, it is also the most critical because of its role as the first line of defense against attack. 

For this edition of the “Cloud Threat Report,” the Unit 42® Cloud Threat Research team wanted to understand how cloud security teams today implement IAM and where the gaps in protection are. 

Analyzing 680,000+ identities across 18,000 cloud accounts from over 200 different organizations was shocking. Unit 42 found a staggering 99% of the cloud users, roles, services and resources were granted excessive permissions, which were left unused. 

The result? Bad actors have an open door to utilize cloud-specific tactics, techniques and procedures (TTPs) to gain wider access to organizations’ cloud environments. 

Download your copy of this report for a deep dive into:

  • Who attacks cloud infrastructure, how they carry out these attacks and what they target.
  • Why effective IAM is essential to achieving security, and more eye-opening statistics around the current state of IAM for most organizations.
  • Recommendations on how to protect your organization from being targeted.

Get your free copy now.

Share page on facebook Share page on linkedin Share page by an email
CREATE AN ACCOUNT LOG IN

Already have an account? Sign in to
continue reading.

Sign in here if you are a customer, partner or an employee.

Sign in with SSO
or
{* #signInForm *}

Sign in if you are a member

{* signInEmailAddress *} {* currentPassword *}
forgot password
or

Log In via Social Media

{* loginWidget *}
{* /signInForm *}

Sign In

Welcome back, {* welcomeName *}!

{* loginWidget *}
Use another account

Sign In

Welcome back!

{* #signInForm *} {* signInEmailAddress *} {* currentPassword *}
{* /signInForm *}
Use another account

Deactivated Account

Your account has been deactivated.

Almost Done!

Please confirm the information below before signing in.

{* #socialRegistrationForm *} {* First_Name__c *} {* Last_Name__c *} {* Business_Email *} {* Normalized_Email *} {* Business_Phone *} {* Company *} {* Job_Level__c *} {* Job_Role__c *} {* Country *} {* Alt_State_Province__c *} {* province *} {* Zip_or_Postal_Code *}
{* Want_to_speak_to_Specialist_registration *} {* Subscribe_To_All_Categories__c *}

By clicking on "Create Account", you agree to our Terms of Use and acknowledge our Privacy Statement.

{* backButton *}
{* /socialRegistrationForm *}

For unlimited access to ebooks and other resources, create an account today.

Sign up with social media

{* loginWidget *}
or

Join Us To Become A Member


* All fields are required {* #registrationForm *}
{* First_Name__c *} {* Last_Name__c *} {* Business_Email *} {* Normalized_Email *} {* newPassword *} {* Company *} {* Job_Level__c *} {* Job_Role__c *} {* Business_Phone *} {* Country *} {* Alt_State_Province__c *} {* province *} {* Zip_or_Postal_Code *}
{* Want_to_speak_to_Specialist_registration *} {* Subscribe_To_All_Categories__c *}
{* captcha *}

By clicking on "Join us to become a member", you agree to our Terms of Use and acknowledge our Privacy Statement.

{* /registrationForm *}

Thank you for registering!

We have sent a confirmation email to {* emailAddressData *}. Please check your email and click on the link to activate your account.

Create a new Password

We'll send you a link to create a new password.

{* #forgotPasswordForm *} {* signInEmailAddress *}
{* backButton *}
{* /forgotPasswordForm *}

Create a new Password

If the email supplied exists in our system, you will receive an email with instructions to create a new password.

Return to Login

Create a new Password

If the email supplied exists in our system, you will receive an email with instructions to create a new password.

Return to Login
{* mergeAccounts {"custom": true} *}
{| rendered_current_photo |}
{| current_displayName |}
{| current_emailAddress |}

{| foundExistingAccountText |} {| current_emailAddress |}.

{| moreInfoHoverText |}
{| existing_displayName |} - {| existing_provider |} : {| existing_siteName |} {| existing_createdDate |}
{| moreInfoText |}
{| rendered_existing_provider_photo |}
{| existing_displayName |}
{| existing_provider_emailAddress |}
Created {| existing_createdDate |} at {| existing_siteName |}
Validating
{| connect_button |} {| create_button |}

Sign in to complete account merge

{* #signInForm *} {* signInEmailAddress *} {* currentPassword *}
{* backButton *}
{* /signInForm *}

Resend Email Verification

Sorry we could not verify that email address. Enter your email below and we'll send you another email.

{* #resendVerificationForm *} {* signInEmailAddress *}
{* /resendVerificationForm *}

Your Verification Email Has Been Sent

Check your email to verify your email address prior to gaining access to the website.

Sign in

You did it!

Thank you for verifiying your email address.

Sign in

Your email has not been verified.

You must verify your email address before signing in. If you did not receive a verification email, click on Submit below to resend.

Resend email verification.

{* #resendVerificationForm *} {* signInEmailAddress *}
{* /resendVerificationForm *}

Change password

{* #changePasswordFormNoAuth *} {* newPassword *} {* newPasswordConfirm *}
{* /changePasswordFormNoAuth *}

Your password has been changed

Password has been successfully updated.

Sign in

Create a new password

We didn't recognize that password reset code. Enter your email address to get a new one.

{* #resetPasswordForm *} {* signInEmailAddress *}
{* /resetPasswordForm *}

Create a new password

We&39;ve sent an email with instructions to create a new password. Your existing password has not been changed.

Check your email to verify your email address prior to gaining access to the website.

Change password

{* #changePasswordForm *} {* currentPassword *} {* newPassword *} {* newPasswordConfirm *}
{* /changePasswordForm *}

Deactivate your Account

Are you sure you want to deactivate your account? You will no longer have access to your profile.

{* deactivateAccountForm *}
No
{* /deactivateAccountForm *}

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language