Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:45 PM
Dark Reading
Dark Reading
Products and Releases

CloudKnox Uncovers Permissions Gap Across Enterprise Hybrid & Multi-Cloud Environments

Industry's first State of Cloud Entitlements Report reveals significant security risk with more than 90% of organizations using less than 5% of permissions granted.

SUNNYVALE, Calif. – (April 13, 2021) – CloudKnox Security, the only cloud permissions management platform provider for hybrid and multi-cloud environments, today released the results of the cloud security industry’s first State of Cloud Entitlements Report. The findings from CloudKnox, leader of the Cloud Infrastructure Entitlement Management (CIEM) space, highlight significant risks for organizations using the major cloud providers, Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP) and VMware vSphere for their multi- or hybrid cloud environments. 

The extensive CloudKnox Threat Labs research, which includes the participation of more than 150 global organizations, makes clear there is an industry-wide Cloud Permissions Gap crisis, leaving countless organizations at risk due to improper Identity and Access Management (IAM). The report findings underscore the fact that attackers can leverage over-privileged identities to traverse laterally, elevate permissions and cause extensive data exfiltration.

“The focus on digital transformation over the last few years—and accelerated throughout 2020—has led to a significant delta between permissions granted and permissions used in the cloud. This Cloud Permissions Gap is a massive contributing factor to the rise of both accidental and malicious threats for organizations of all sizes,” said Raj Mallempati, COO of CloudKnox. “Permissions misuse or abuse can allow both human and machine identities to create and destroy portions of the cloud infrastructure; and without right-sizing these permissions, enforcing least privilege and Zero Trust access, these identities have the potential to become CISOs’ worst nightmares.”

Among the State of Cloud Entitlements report findings, the data underscores this cause for concern. CloudKnox observed more than 40% of AWS roles were reported as inactive or over permissioned, putting these organizations at risk of a costly breach should a bad actor breach one of these roles. More than 70% of Azure subscriptions have identities with over-permissive Contributor roles, giving hackers the opportunity to control IAM should they gain access as a Contributor. Further, more than 75% of enterprises using GCP have identities’ permission creep ranging from viewer to owner. CloudKnox Security also found 90% of enterprises using vSphere have misconfigurations that can lead to critical level one failures. 

Key Cloud Provider Risks from CloudKnox’s State of Cloud Entitlements Report include:

Amazon Web Services

  • More than 95% of identities are using less than 2% of permissions granted.
  • Two-thirds of most enterprises have Elastic Compute Cloud (EC2) instances with access to all Simple Storage Service (S3) buckets.
  • More than 50% of enterprises have identities with privilege escalations ability to elevate to super admin roles. 


  • More than 90% of identities are using less than 2% of permissions granted. 
  • More than 85% of enterprises have over-permissive identities left orphaned after projects are terminated. 
  • 65% of all enterprises have anonymous public read access enabled for blob containers in production environments.

Google Cloud Platform

  • More than 90% of identities are using less than 5% of permissions granted. 
  • More than 80% of projects have service accounts (including Google managed) with over-permissive Owner/Editor roles either directly attached or inherited from a folder or organization. 
  • More than 85% of enterprises have user managed keys for service accounts that are not rotated. 
  • More than 50% of enterprises have project-wide Secure Shell (SSH) keys enabled for virtual machine (VM) instances. 

VMware vSphere

  • More than 95% of identities are using less than 5% of permissions granted.
  • More than 60% of groups and identities accessing the vSphere infrastructure are inactive and have high-risk permissions. 
  • Highly over-provisioned “Destroy,” “Remove” and “Reset” functions for compute, storage and network across poorly defined roles. 

The full report details all of the key risk assessment findings, the implications of each risk, recommendations for remediation and recommendations for operationalizing permissions management, along with full methodology. 

To learn more about the CloudKnox approach that enables enterprises to enforce a least privilege posture across their hybrid and multi-cloud environments, please visit www.cloudknox.io. CloudKnox offers a free Cloud Infrastructure Risk Assessment to help enterprises understand their cloud identity and resource risk profile. For more information, please visit: https://cloudknox.io/risk-assessment/.

About CloudKnox

CloudKnox Security is the only cloud security platform built from the ground-up to support the monitoring and management of identities, actions and resources across hybrid and multi-cloud environments using an Activity-based Authorization model. Through an extensible single platform, CloudKnox transforms how organizations implement the principle of least privilege and empowers security teams to proactively address accidental and malicious credential misuse by continuously detecting and mitigating identity risks. CloudKnox is based in Sunnyvale, CA.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.