AI智能总结
Cloud security has reached a critical turningpoint. As organizations increasingly rely on thecloud to accelerate innovation and growth,several converging trends are reshaping thechallenges security teams face—and thestrategies they need to stay ahead.”“ GIL GERONCEO and Co-Founder of Orca Security Table of Contents Foreword01About the Orca Research Pod02Executive Summary03Key Findings04General Cloud Usage05AI Security06Attack Paths08Data Exposure10 Vulnerabilities13Neglected Assets17Identity & Access20Application Security26Kubernetes31Key Recommendations34About Orca Security36 Foreword As organizations store more sensitive data in the cloud, the prevalence ofdata exposure is rising: 38% of organizations with sensitive data in theirdatabases also have those databases exposed to the public. These are among the many challenges covered in this report, which highlightthe Defender’s Paradox in cloud security: attackers need to be right onlyonce, defenders every time. In fact, 13% of organizations have a single cloudasset that supports more than 1,000 attack paths—underscoring theimportance of comprehensive detection and effective prioritization. Multi-cloud adoption is now the norm, with 55% of organizations using two ormore providers. While this offers greater flexibility and resiliency, it alsomakes it harder to maintain consistent visibility and coverage acrossenvironments. At the same time, AI adoption is increasing—84% oforganizations now use AI in the cloud. But this innovation comes with newrisks: 62% of organizations have at least one vulnerable AI package, andsome of the most prevalent AI-related CVEs enable remote code execution. This report is designed to help teams close their security gaps. Combiningreal-world insights compiled by the Orca Research Pod, it offers practicalguidance on where to focus, what to prioritize, and how to effectively securemulti-cloud environments in the age of AI. We hope this report serves as avaluable resource for your teams. Traditional risks haven’t gone away either—they’ve intensified. Nearly a thirdof cloud assets are in a neglected state, signaling ongoing challenges withmonitoring and prioritization. Gil Geron CEO and Co-Founder of Orca Security About the Orca Research Pod The Orca Research Pod is a group of cloud security researchers that discover and analyze cloud risks and vulnerabilitiesto strengthen the Orca Cloud Security Platform and promote cloud security best practices. RESEARCH METHODOLOGY This report was compiled by analyzing data captured from billions of cloud assets on AWS, Azure, Google Cloud, OracleCloud, and Alibaba Cloud and hundreds of thousands of code repositories scanned by the Orca Cloud Security Platform. REPORT DATA SET ●Data referenced in this report was collected in 2025●AWS, Azure, GCP, Oracle Cloud, and Alibaba Cloud environments ●Cloud workload and configuration data●Billions of real-world production cloud assets 25+ VULNERABILITIES DISCOVERED ON AWS, AZURE, AND GOOGLE CLOUD The Orca Research Pod has discovered more than 25 major vulnerabilities on public cloud platforms. Our expert securityteam discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca Platform and promote best practices. 2022 2024 2023 2025 +Azure Digital Twins SSRF+Azure Functions App SSRF+Azure API Management SSRF+Azure Machine Learning SSRF+Azure Storage Account Keys Exploitation+Azure Super FabriXss+2 Azure PostMessage IFrame Vulnerabilities+Bad.Build Supply Chain Risk in GCP+8 Cross-Site Scripting vulnerabilities on Azure HDInsight+Unauthenticated Access Risk to GCP Dataproc+Sys:All GKE Loophole+3 new Azure HDInsight vulnerabilities+System:authenticated default GoogleKubernetes Engine (GKE) group+LeakyCLI in AWS and Google Cloud +AWSBreakingFormation+AWS Superglue+Databricks+Azure AutoWarp+Azure SynLapse+Azure FabriXxs+Azure CosMiss +Privilege EscalationVulnerability in AzureMachine Learning+Kubernetes CRD AbstractionRisks in kro (Kube ResourceOrchestrator) Executive Summary Leveraging unique insights into current and emerging cloud risks captured from the Orca Cloud SecurityPlatform, this report reveals the most commonly found, yet dangerous, cloud security risks. Summarizing theresults from our research, these are our main findings: More cloud innovation brings greater cloud risk. As cloud adoption and cloud-native technologies expand, so does the volume and severity of cloud risks. Nearly a third ofcloud assets are neglected today, and each asset contains on average 115 vulnerabilities. Both are two data pointsamong many others illustrating this troubling trend. +Attack surfaces are expanding—and risks are increasingly interconnected. 76% of organizations have at least one public-facing asset that enables lateral movement, turning a single risk into anopportunity for broader compromise. Security teams not only need to defend a growing attack surface, but increasinglyinterconnected risks. To illustrate, 36% of