Confusion, false positives, visibility, and lack of a unified approach are the biggest cloud security issues. Credit: G-Stock Studio / Shutterstock Striking a balance between sufficient visibility into cloud computing environments and the potential for an overdose of false positives and duplicate alerts is the key challenge facing cloud security professionals, according to the State of Security Remediation report from the Cloud Security Alliance (CSA). The report, released today, detailed a raft of important issues facing IT professionals tasked with fixing security problems in cloud environments. Along with false positives and visibility, overly complex tooling, time-consuming manual tasks, and slower-than-needed response times were cited as problematic by large percentages of the 2,000 IT and security pros surveyed by the CSA. Just 23% of respondents said that they had “full” visibility into cloud environments, a figure that reflects the increasing complexity of containerized and serverless architectures, the study found. “This lack of visibility can lead to security gaps and complicates the management and monitoring of these environments,” the study’s authors wrote. Duplicate alerts and false positives stressing security teams Yet the sheer volume of alerts themselves are already posing a challenge to security teams, according to the study, which found that 63% of respondents characterized duplicate alerts as a moderate-to-severe issue for them, similar to the 60% saying the same about false positives. Generally, this is a problem attributable to the proliferation of different security tools, many of which have overlapping functionality and poor or no integration with one another. False alarms and duplicate alerts are only part of the problem posed by tooling sprawl, however. Well over half (61%) of respondents said they were using between three and six different detection tools for security purposes, with a strong minority saying that they were considering budget increases to pay for additional monitoring. “The introduction of additional tools without a unified process can lead to siloed remediation efforts, overlapping vulnerabilities, and a disjointed approach to threat prioritization,” wrote the authors. The study, which was sponsored by cloud security remediation vendor Dazz, argues that more unified monitoring and management solutions must be used, and that channels of communication between security and development teams must be open and active. “As cybersecurity threats evolve, organizations must adapt by seeking better visibility into their code-to-cloud environment, identifying ways to accelerate remediation, strengthening organizational collaboration, and streamlining processes to counter risks effectively,” said Hillary Baron, the study’s lead author and senior technical director for research at CSA, in a press release. Related content feature 8 cloud security gotchas most CISOs miss With the typical enterprise today leveraging a dozen cloud vendors globally, there are plenty of ways for security nightmares to sneak in. Here are a few lesser-known issues that could haunt you. By Evan Schuman 21 Aug 2024 11 mins Cloud Security feature How CISOs can tackle the pernicious problem of poisoned packages Primary code repositories are a godsend for software developers but offer easy access for threat actors to deliver malware. Experts say CISOs should scan for threats and be aware of the dangers. By Cynthia Brumfield 20 Aug 2024 8 mins DevSecOps Cloud Security Security Practices news S3 shadow buckets leave AWS accounts open to compromise Attackers can gain access to AWS accounts or sensitive data by creating in advance S3 storage buckets with predictable names that will be automatically used by various services and tools. By Lucian Constantin 08 Aug 2024 7 mins Cloud Security Vulnerabilities news Black Hat: Latest news and insights The Black Hat series of international cybersecurity conferences brings together top IT security pros, researchers, and thought leaders to discuss the latest cyber techniques, vulnerabilities, threats, and more. Here’s the latest to know. By CSO Staff 08 Aug 2024 4 mins Advanced Persistent Threats Windows Security Threat and Vulnerability Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe