In February 2016, the CSA released a report titled, "The Treacherous Twelve: Cloud Computing Top Threats in 2016," which revealed top concerns of IT security professionals in cloud computing. Data breaches, account hijacking and malicious insiders all rated as top threats. These attacks often occur because of a lack of scalable identity access management systems, failure to use multifactor authentication, insufficient password use and a lack of ongoing automated rotation of cryptographic keys, passwords and certificates. As such, it's not surprising that insufficient identity, credential and access management ranked as the top vulnerability in today's released findings.
"The survey results are insightful into understanding insufficient identity, credential and access management, as it relates to the evolving, increasingly cloud-based enterprise," said Luciano "J.R." Santos, Executive Vice President of Research for the CSA. "We hope that organizations and cloud providers can use this information to help gain an understanding of how to protect themselves and their data beyond the perimeter, as they begin to adopt cloud environments."
Key findings include:
- Of those who indicated their company reported a data breach, 22 percent of respondents noted the breach was due to compromised credentials. In addition, 65 percent of respondents indicated that the likelihood their company would experience a future breach due to compromised credentials was medium to high.
- Surprisingly, there were no significant differences in security solutions used between respondents who reported a breach and those who either did not report or did not know of a reported breach in their organizations.
- Companies embracing big data solutions consistently adopted more perimeter and identity security solutions.
- 76 percent of internal access control policies extended to outsourced IT, vendors and other third parties.
"The survey findings reiterate that compromised credentials are a leading point of attack used in data breaches," said Bill Mann, Chief Product Officer for Centrify. "We hope that these findings will encourage organizations to leverage single sign-on, multi-factor authentication, mobile and Mac management, along with privileged access security and session monitoring, in order to minimize attack surfaces, thwart in-progress attacks and achieve continuous compliance. It's also critical that companies secure internal and external users as well as privileged accounts – and it's great to see that many organizations are already taking that step and extending access control policies to third parties."
The "Identity Solutions: Security Beyond the Perimeter" report includes responses from more than 300 professionals varying in company size and industries from the Americas, EMEA and APAC regions. The survey was sponsored by Centrify, the leader in securing enterprise identities against cyberthreats.
The full report can be found at https://cloudsecurityalliance.org/download/identity-security.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA's activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Centrify is the leader in securing enterprise identities against cyberthreats that target today's hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise's internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.
To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/new-cloud-security-alliance-survey-finds-compromised-credentials-still-to-blame-for-almost-a-quarter-of-data-breaches-300255321.html
SOURCE Cloud Security Alliance