The 7 most common attack paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
The cloud security community must move beyond one-off results and alerts to a context-driven understanding of true risk within the cloud environment. True risk is only possible to be determined with the deep understanding of the cloud, a bespoke understanding of the environment, and the comprehensive data pulled from existing tools. The attack path platform approach cohesively analyzes the cloud environment from an attacker’s perspective, showing SecOps and DevOps teams the true prioritized list of actions needed to mitigation all potential attack vectors, and eliminate risk.
Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a list of the 2022 Top 7 Cloud Attack Paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform. The attack paths were selected based on frequency, criticality, and impact. Our attack paths are based on Lightspin’s cloud attack path taxonomy and tie to the MITRE ATT&CK Cloud Matrix for Enterprise. Check out this GitHub report which includes the applicable MITRE ATT&CK TTPs with formatting in .xls, .json, and .svg produced via the MITRE ATT&CK Navigator (https://mitre-attack.github.io/attack-navigator/) for easy reference and utility in reproduction, table-top exercises, threat modeling, etc.