Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk
文章指出尽管企业投入大量资金用于网络安全,但敏感数据和凭证在公开云服务中的泄露问题依然严重。数据显示9%的公共云存储资源包含PII、IP、PCI等敏感信息,超半数使用AWS ECS和GCP Cloud Run的企业存在嵌入秘密的情况。文章强调这不仅是配置问题,更是治理缺口,并建议安全领导者采取自动化数据发现、默认限制公共访问、使用云原生密钥管理工具等措施来加强防护。 2025-6-18 12:58:0 Author: www.tenable.com(查看原文) 阅读量:10 收藏

image of Tenable Cloud Security Risk Report 2025 cover art on gray gradient background with Tenable logo and the words "Inside the Tenable Cloud Risk Report"

Sensitive data and secrets are leaking. How cloud security leaders can shut them down.

Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats persists: sensitive data and credentials exposed in publicly accessible cloud services. According to the Tenable Cloud Security Risk Report 2025, 9% of public cloud storage resources contain sensitive data — including personally identifiable information (PII), intellectual property (IP), Payment Card Industry (PCI) details, and protected health information (PHI).

Even more concerning, the report shows that over half of organizations using Amazon Web Services (AWS) Elastic Container Service (ECS) task definitions and Google Cloud Platform (GCP) Cloud Run have, knowingly or not, at least one secret embedded in these services.

These exposures are concerning, as they are the kind of exploitable oversights attackers are already scanning for — and weaponizing.

Why this matters to security leaders

Exposed secrets — like API keys and encryption tokens — can open the door to attackers, enabling lateral movement, data exfiltration or full environment takeover.

This isn’t just a misconfiguration issue. It’s a governance gap, made worse by legacy security tooling and, in some cases, the mistaken perception that native cloud services provide sufficient protection.

What you should be doing now

Security leaders must shift from detection to prevention and improve their sensitive data protection by enforcing the following:

  • Automated data discovery and classification: Know what data lives in your environment and continuously assess its sensitivity. This should be an ongoing, telemetry-driven effort — not a quarterly scan.
  • Eliminate public access by default: Enforce least privilege for both data and network access. Public storage should be the rare exception.
  • Employ enterprise-grade secrets management: Remove hardcoded secrets and implement cloud-native tools like AWS Secrets Manager and Microsoft Azure Key Vault.
  • Cloud Security Posture Management (CSPM): Use identity-intelligent CSPM to unify visibility across your cloud footprint and detect misconfigurations, secrets, and excessive permissions in real time.

Key takeaway: Exposed secrets and sensitive data aren’t obscure edge cases. They’re systemic risks hiding in plain sight — and must be eliminated before attackers exploit them.

Learn more


Diane Benjuya

Diane Benjuya

Senior Product Marketing Manager, Tenable

Diane Benjuya is a senior product marketing manager in cloud security with 20+ years in the field, more recently in the focus areas of cloud infrastructure and identity. When at leisure she enjoys a decent run and soul-lifting jam session. Diane holds a masters degree in linguistics.

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.


文章来源: https://www.tenable.com/blog/secrets-in-the-open-cloud-data-exposures-that-put-your-business-at-risk
如有侵权请联系:admin#unsafe.sh