Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Research 发现普遍存在的云配置错误造成关键数据与机密信息泄露

Insecure cloud configurations create widespread risk, highlighting the urgent need for unified cloud exposure management

June 18, 2025 · Columbia, MD

Tenable Research 发现普遍存在的云配置错误造成关键数据与机密信息泄露

Tenable®, the exposure management company, today released its 2025 Cloud Security Risk Report. The research revealed that 9% of publicly accessible cloud storage contains sensitive data, 97% of which is classified as restricted or confidential. These exposures increase the risk of exploitation, particularly when paired with misconfigurations or embedded secrets. 

Cloud environments face dramatically increased risk due to exposed sensitive data, misconfigurations, underlying vulnerabilities and poorly stored secrets – such as passwords, API keys and credentials. The 2025 Cloud Security Risk Report provides a deep dive into the most prominent cloud security issues impacting data, identity, workload and AI resources and offers practical mitigation strategies to help organizations proactively reduce risk and close critical gaps.

Key findings from the report include: 

  • Secrets found in diverse cloud resources are putting organizations at risk: Over half of organizations (54%) store at least one secret directly in Amazon Web Services (AWS) Elastic Container Service (ECS) task definitions — creating a direct attack path. Similar issues were found among organizations using Google Cloud Platform (GCP) Cloud Run (52%) and Microsoft Azure Logic Apps workflows (31%). Alarmingly, 3.5% of all AWS Elastic Compute Cloud (EC2) instances contain secrets in user data — major risk given how widely EC2 is used.
  • Cloud workload security is improving, but toxic combinations persist: While the number of organizations with a “toxic cloud trilogy” – a workload that is publicly exposed, critically vulnerable, and highly privileged – has decreased from 38% to 29%, this dangerous combination still represents a significant and common risk.
  • Using Identity Providers (IdPs) alone doesn’t eliminate risk: While 83% of AWS organizations are exercising best practices in using IdP services to manage their cloud identities, overly-permissive defaults, excessive entitlements, and standing permissions still expose them to identity-based threats.

“Despite the security incidents we have witnessed over the past few years, organizations continue to leave critical cloud assets, from sensitive data to secrets, exposed through avoidable misconfigurations,” said Ari Eitan, Director of Cloud Security Research, Tenable. 

“The path for attackers is often simple: exploit public access, steal embedded secrets or abuse overprivileged identities. To close these gaps, security teams need full visibility across their environments and the ability to prioritize and automate remediation before threats escalate. The cloud demands continuous, proactive risk management, and not reactive patchwork.”

The report reflects findings by the Tenable Cloud Research team based on telemetry from workloads across diverse public cloud and enterprise environments, analyzed from October 2024 through March 2025. To download the report today, please visit: https://www.tenable.com/cyber-exposure/tenable-cloud-security-risk-report-2025

More information on Tenable Cloud Security is available at: https://www.tenable.com/cloud-security 

关于 Tenable

Tenable® 是一家风险暴露管理公司,其职责是揭示和弥合侵蚀商业价值、信誉和信任的网络安全缺口。该公司 AI 驱动的风险暴露管理平台彻底统一了整个攻击面的安全可见性、深入见解和操作,助力现代企业防范从 IT 基础设施到云环境再到关键基础设施等各个领域的攻击。 通过保护企业免受安全风险暴露的影响,Tenable 为全球 44,000 个客户减少了业务风险。详情请访问 tenable.com

###

媒体联系人:

Tenable

[email protected]

掌握最新动态!

订阅我们的电子邮件提醒,随时接收最新的新闻稿。

订阅新闻稿更新