
Identity Has Become a Critical Security Perimeter for Cloud Services — Campus Technology
Report: Identity Has Become a Critical Security Perimeter for Cloud Services
A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.
“Cloud services now sit at the center of modern operations, and identity has become one of the most critical security perimeters,” said a post exploring the report from the company’s FortiGuard Labs. “Cloud breaches are no longer limited to misconfigured storage buckets. As infrastructure migrates to the cloud, attackers are finding familiar footholds to exploit, such as over-permissioned identities, credential leaks in public code repositories, and lateral movement through cloud-native services.
“FortiCNAPP telemetry shows that attackers often begin by logging in from unfamiliar geographies, sometimes within hours of a developer’s legitimate activity. From there, they escalate privileges, establish persistence, and use legitimate services to blend into normal network traffic. In 2024, 25% of all cloud incidents began with reconnaissance, such as API enumeration, permission probing, and discovery of exposed assets.”
That telemetry is key to the report, which is based on Fortinet’s global sensor network and threat intelligence, and that intelligence suggests the advantage enjoyed by threat actors is growing, and will continue to do so until organizations change how they measure and manage risk.
One of the report’s key findings, “Cloud attacks are evolving, but misconfigurations still reign,” discusses the above finding in greater detail.
“Cloud environments remain a top target, with adversaries exploiting persistent weaknesses, such as open storage buckets, over-permissioned identities, and misconfigured services,” the report said. “Lacework FortiCNAPP telemetry shows a steady rise in cloud compromises, often involving identity abuse, insecure APIs, and privilege escalation. These vectors are frequently combined in multi-stage attacks that leverage automation and legitimate services for stealth and persistence. Reconnaissance remains the most prevalent tactic, with attackers probing APIs, enumerating permissions, and scanning for exposed assets. In 70% of observed incidents, attackers gained access through logins from unfamiliar geographies, highlighting the critical role of identity monitoring in cloud defense.”
The MITRE ATT&CK tactic distribution chart above shows some key takeaways of its own:
- Discovery (25.3%): The most common tactic in cloud attacks, indicating widespread scanning, enumeration of permissions, and probing of APIs and services.
- Initial Access (14.7%): Attackers most often gain entry through leaked or stolen credentials, phishing, or misconfigured authentication settings.
- Persistence (12.3%): Adversaries create or modify cloud identities and roles to maintain long-term access to compromised environments.
- Privilege Escalation (10.6%): Attackers manipulate permission policies or exploit cloud APIs to elevate their access rights.
- Impact (8.4%): Activities aimed at disrupting services, tampering with data, or initiating ransomware-like attacks in the cloud.
- Credential Access (7.9%): Techniques used to extract keys, passwords, or tokens for lateral movement or further exploitation.
- Lateral Movement (6.8%): Movement between cloud services, regions, or accounts after initial compromise, often undetected.
- Defense Evasion (6.1%): Methods used to avoid detection, such as using legitimate services or hiding malicious behavior in normal workflows.
- Collection (3.5%): Gathering sensitive data or metadata for later use or exfiltration.
- Exfiltration (3.3%): Stealing data from cloud storage, databases, or containers, often through abused APIs.
- Execution (1.2%): Running malicious scripts or binaries, typically through Bash, PowerShell, or Python in cloud workloads.
Source link