欢迎来到报告吧! | 帮助中心 分享价值,成长自我!

报告吧

换一换
首页 报告吧 > 资源分类 > PDF文档下载
 

2019年云计算普及和风险报告.pdf

  • 资源ID:91514       资源大小:1.04MB        全文页数:20页
  • 资源格式: PDF        下载积分:15金币 【人民币15元】
快捷下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录  
下载资源需要15金币 【人民币15元】
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,下载共享资源
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

2019年云计算普及和风险报告.pdf

REPORT Cloud Adoption and Risk Report 2019REPORT 2 Cloud Adoption and Risk Report Through analysis of billions of anonymized cloud events across a broad set of enterprise organizations*, we can determine the current state of how the cloud is truly being used, and where our risk lies. Consider that nearly a quarter of data in the cloud is sensitive, and that sharing of sensitive data in the cloud has increased 53% year-over-year. If we dont appropriately control access and protect our data from threats, we put our enterprises at risk. IaaS/PaaS providers like AWS are increasing the productivity of our developers and making our organizations extraordinarily agile. However organizations on average have at least 14 misconfigured IaaS instances running at any given time, resulting in an average of 2,269 misconfiguration incidents per month. Prominently, 5.5% of all AWS S3 buckets in use are misconfigured to be publicly readable. We can see the risk of immediate and grand-scale loss of data starting to grow with these trends. We need to get the basics right, or face losing the opportunity for business acceleration before the gas pedal can hit the floor. The majority of threats to data in the cloud result from compromised accounts and insider threats. 80% of organizations are going to experience at least 1 compromised account threat in the cloud this month. 92% currently have stolen cloud credentials for sale on the Dark Web. Cloud Adoption and Risk Report Executive Summary Cloud services bring a momentous opportunity to accelerate business through their ability to quickly scale, allow us to be agile with our resources, and provide new opportunities for collaboration. As we all take advantage of the cloud, theres one thing we cant forget our data. When using software-as-a-service (SaaS) we are responsible for the security of our data, and need to ensure it is accessed appropriately. When using infrastructure-as- a-service (IaaS) or platform-as-a-service (PaaS), we are additionally responsible for the security of our workloads, and need to ensure the underlying application and infrastructure components are not misconfigured. Connect With Us 2019 *Many of the data points we cite in this report are determined by enterprise policy. For example, classifications of “sensitive data” are set by the organizations in our study, not McAfee. Our visibility is limited to the results of that policy, not the actual data.3 Cloud Adoption and Risk Report REPORT Fortunately, the cloud is still bringing more opportunities than threats. Cloud use is extremely broad, with most organizations using approximately 1,935 cloud services, up 15% year-over-year. Unfortunately, most think they only use 30. Key Findings 21% of all files in the cloud contain sensitive data, up 17% over the past two years. The amount of files with sensitive data shared in the cloud has increased 53% YoY. Sharing sensitive data with an open, publicly accessible link has increased by 23% over the past two years. 94% of IaaS/PaaS use is in AWS, but 78% of organizations using IaaS/PaaS use both AWS and Azure. Enterprise organizations have an average of 14 misconfigured IaaS/PaaS instances running at one time, resulting in an average of 2,269 individual misconfiguration incidents per month. 5.5% of AWS S3 buckets have world read permissions, making them open to the public. The average organization generates over 3.2 billion events per month in the cloud, of which 3,217 are anomalous, and 31.3 are actual threat events. Threat events in the cloud, i.e. compromised account, privileged user, or insider threat have increased 27.7% YoY. 80% of all organizations experience at least 1 compromised account threat per month. 92% of all organizations have stolen cloud credentials for sale on the Dark Web. Threats in Office 365 have grown by 63% in the last two years. The average organization uses 1,935 unique cloud services, an increase of 15% from last year. Most organizations think they use about 30. REPORT 4 Cloud Adoption and Risk Report Table of Contents 5 Breaking Down Sources of Cloud Data Risk 7 When Sharing Isnt CaringCloud Collaboration as a Blessing and a Curse 8 You Can Bet Your IaaS is Misconfigured So Dont Forget the Basics 10 Internal and External Threats 11 Compromised accounts 11 Insider threats 11 Privileged user threats 12 Cloud threat funnel 12 Cloud Usage Trends 13 Average number of services 14 Native security controls vary by provider 15 The top cloud services 15 Top 10 enterprise cloud services 16 Top 10 collaboration and file sharing services 16 Top 10 consumer cloud services 17 Top 10 social media services 17 Perception vs RealityTotal Cloud Services 18 Perception vs Reality“Over Trusting” Cloud Services to Keep Data Secure

注意事项

本文(2019年云计算普及和风险报告.pdf)为本站会员(也么哥)主动上传,报告吧仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知报告吧(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642号


收起
展开