{"id":58398,"date":"2025-03-31T11:16:56","date_gmt":"2025-03-31T11:16:56","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/"},"modified":"2025-03-31T11:16:56","modified_gmt":"2025-03-31T11:16:56","slug":"cloud-security-explained-whats-left-exposed","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/","title":{"rendered":"Cloud security explained: What\u2019s left exposed?"},"content":{"rendered":"<p><span class=\"label\">Advertorial<\/span> AWS customers might assume that security is taken care of for them &#8211; however, this is a dangerous misconception.<\/p>\n<p>While AWS secures its infrastructure, security within an organization&#8217;s cloud environment is the customer&#8217;s responsibility. Think of AWS security like a secure building: AWS provides the sturdy walls and roof, but the organization is in charge of the locks, the alarm system, and ensuring that no valuable data is left exposed.<\/p>\n<p>In this blog, we highlight what AWS doesn&#8217;t secure with real-world examples, and share key actions organizations can take to protect their AWS environments.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>AWS operates on a Shared Responsibility Model, where both AWS and its customers have distinct security responsibilities.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>AWS secures the underlying infrastructure that powers its cloud services &#8211; including hardware, software, networking, and data centers &#8211; essentially providing the &#8220;walls and roof.&#8221; On the other hand, customers are responsible for securing their data, applications, and configurations within the AWS environment &#8211; the &#8220;locks on the doors&#8221; and the &#8220;alarm system.&#8221;<\/p>\n<p>In short, AWS handles security of the cloud, while its customers are responsible for security in the cloud. Understanding this distinction is crucial to maintaining a secure environment.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p> <strong>Customer responsibilities and actions<\/strong>\n<\/p>\n<p>Let&#8217;s look at some real-world vulnerabilities that fall under the customer&#8217;s responsibility and what actions can be taken to mitigate them. The following examples focus on two key areas of the AWS Shared Responsibility Model:<\/p>\n<p>&#8211; Platform, Applications, and Identity and Access Management.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8211; Operating System, Network, and Firewall Configuration.<\/p>\n<p>&#8211; Platform, Applications, Identity and Access Management.<\/p>\n<p>&#8211; SSRF and the AWS Metadata Service.<\/p>\n<p>Organizations using AWS are responsible for securing vulnerabilities in their applications deployed in the cloud, including application-layer issues like Server-Side Request Forgery (SSRF).<\/p>\n<p>SSRF vulnerabilities allow attackers to manipulate a server into making unintended requests, which can lead to unauthorized data access or further exploitation.<\/p>\n<p>This can be particularly dangerous in cloud environments because the metadata service assumes that any request it receives is legitimate. If an attacker exploits an SSRF vulnerability, they could trick the server into exposing sensitive data, such as IAM credentials, which could provide an initial foothold into the cloud environment.<\/p>\n<p>To defend against this, organizations should take a twofold approach:<\/p>\n<p>&#8211; Secure applications by identifying and fixing SSRF vulnerabilities using a <a href=\"https:\/\/www.intruder.io\/web-application-vulnerability-scanner?utm_source=theregister&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|aws_blog_article\" rel=\"nofollow\">web application vulnerability scanner<\/a>.<\/p>\n<p>&#8211; Enable AWS <a href=\"https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/configuring-instance-metadata-service.html\" rel=\"nofollow\">IMDSv2<\/a>, the improved metadata service that mitigates SSRF attacks, adding a defense-in-depth layer, even if an application is vulnerable.<\/p>\n<p> <strong>Access control weaknesses, misconfigurations and data exposures<\/strong>\n<\/p>\n<p>Identity and Access Management (IAM) in AWS allows organizations to control who can access specific resources. While access can be restricted to authorized users within the organization, AWS also allows access to external accounts or even the public.<\/p>\n<p>Managing access is the organization&#8217;s responsibility &#8211; only the customer knows which data should be public (e.g., website media files) and which should remain private (e.g., server backups with customer data).<\/p>\n<p>S3 buckets have historically been a target for misconfiguration, as it&#8217;s easy to accidentally make them public. While AWS has made it more difficult to do so &#8211; providing warnings throughout the interface &#8211; it&#8217;s still possible to expose bucket-stored data with a simple misstep. Ensuring proper configuration is key to preventing data exposure.<\/p>\n<p>Organizations are responsible for the data stored in AWS and securing the applications that access it. For example, if an application connects to an AWS Relational Database Service (RDS), the organization is responsible for ensuring that the application does not expose sensitive data to attackers.<\/p>\n<p>While AWS does help secure RDS data stores, such as providing automatic patch updates, it can&#8217;t control how the data is used. For example, in a multi-tenant SaaS application using RDS, the organization is responsible for securing the application and ensuring attackers cannot access data belonging to other users. Authentication and authorization fall under the customer&#8217;s responsibility, and a simple Insecure Direct Object Reference (IDOR) vulnerability can allow an attacker to access sensitive data from all users.<\/p>\n<p> <strong>OS, network, and firewall configuration and patch management<\/strong>\n<\/p>\n<p>It almost goes without saying that AWS does not patch servers for organizations. When teams deploy EC2 instances, the operating system (OS) and software running on the server will develop vulnerabilities over time. While AWS handles patching the firmware and updating the hardware on which the EC2 instances run, the OS and software layers are the organization&#8217;s responsibility.<\/p>\n<p>For example, if an organization deploys an Ubuntu 24.04 LTS EC2 instance running Redis, it is responsible for patching vulnerabilities in both the OS (Ubuntu) and the software (Redis). AWS, on the other hand, is only responsible for issues affecting the underlying hardware, such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Spectre_(security_vulnerability)\" rel=\"nofollow\">Spectre<\/a>.<\/p>\n<p>AWS provides services like Lambda, which reduce the need for some patch management, but even these services require occasional attention to ensure they use a supported runtime with the latest patches.<\/p>\n<p>AWS gives organizations control over their <a href=\"https:\/\/www.intruder.io\/blog\/what-is-attack-surface-management?utm_source=theregister&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|aws_blog_article\" rel=\"nofollow\">attack surface<\/a>, but it is their responsibility to manage what they choose to expose. Teams can make services publicly accessible or protect them within private cloud networks &#8211; though the decision, and associated risks, lie with them.<\/p>\n<p>For instance, if an organization deploys a GitLab server inside their AWS account, they are responsible for securing it. This means using a VPN, placing it behind a firewall, or placing it inside a VPC while ensuring secure access for their team. If a zero-day vulnerability is discovered in GitLab tomorrow and the server is publicly exposed, the customer would quickly regret leaving it on the internet \u2013 and AWS wouldn&#8217;t be to blame.<\/p>\n<p> <strong>AWS Security: The key takeaway<\/strong>\n<\/p>\n<p>These examples cover just a small fraction of potential security risks in AWS but demonstrate an important point: cloud security isn&#8217;t &#8220;done for you.&#8221; While AWS provides a solid foundation, the responsibility of securing an organization&#8217;s environment is significant.<\/p>\n<p>From cloud misconfigurations to access control weaknesses and exposed services, failing to address these gaps can leave organizations vulnerable.<\/p>\n<p>Intruder offers agentless <a href=\"https:\/\/www.intruder.io\/cloud-vulnerability-scanning-for-aws-google-cloud-and-azure?utm_source=theregister&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|aws_blog_article\" rel=\"nofollow\">cloud security scanning<\/a>, performing daily checks on AWS environments to ensure they align with best practices. Combined with vulnerability scanning and <a href=\"https:\/\/www.intruder.io\/attack-surface-management?utm_source=theregister&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|aws_blog_article\" rel=\"nofollow\">attack surface management<\/a>, Intruder gives teams full visibility into their AWS security &#8211; detecting misconfigurations, critical vulnerabilities, and exposed services, all from a single, powerful platform. With clear severity ratings and actionable remediation advice, organizations can prioritize and address their most critical issues fast.<\/p>\n<p><a href=\"https:\/\/www.intruder.io\/cloud-vulnerability-scanning-for-aws-google-cloud-and-azure?utm_source=theregister&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|aws_blog_article\" rel=\"nofollow\">Learn more<\/a> about Intruder&#8217;s cloud security scanning and <a href=\"https:\/\/portal.intruder.io\/free_trial?utm_source=theregister&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|aws_blog_article\" rel=\"nofollow\">start your 14 day free trial.<\/a><\/p>\n<p> <em>Contributed by Intruder.<\/em>\n<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2025\/03\/31\/cloud_security_explained_whats_left\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Think AWS has security covered? Think again. Discover real-world examples of what it doesn\u2019t secure and how to protect your environment Advertorial\u00a0 AWS customers might assume that security is taken care of for them &#8211; however, this is a dangerous misconception.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-58398","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud security explained: What\u2019s left exposed? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud security explained: What\u2019s left exposed? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-31T11:16:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cloud security explained: What\u2019s left exposed?\",\"datePublished\":\"2025-03-31T11:16:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/\"},\"wordCount\":1087,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/\",\"name\":\"Cloud security explained: What\u2019s left exposed? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2025-03-31T11:16:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-security-explained-whats-left-exposed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud security explained: What\u2019s left exposed?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud security explained: What\u2019s left exposed? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/","og_locale":"en_US","og_type":"article","og_title":"Cloud security explained: What\u2019s left exposed? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-03-31T11:16:56+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cloud security explained: What\u2019s left exposed?","datePublished":"2025-03-31T11:16:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/"},"wordCount":1087,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/","url":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/","name":"Cloud security explained: What\u2019s left exposed? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2025-03-31T11:16:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z-qLZ0jgJhf3aqjmsz1D7QAAAM4&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cloud-security-explained-whats-left-exposed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud security explained: What\u2019s left exposed?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58398"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58398\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}