Cloud Complexity Challenges Visibility and Security
TL;DR
The increasing complexity of IT infrastructure, particularly within cloud environments, poses significant challenges for organizations trying to secure their systems. Researchers from ESET highlight that misconfiguration and credential compromise are primary entry points for attackers, emphasizing the need for improved visibility and management.
Main Analysis
ESET’s analysis underscores that complexity in IT infrastructure is a substantial barrier to effective cybersecurity. As organizations adopt a hybrid cloud approach, often described as a “Frankencloud,” they frequently struggle to maintain security across heterogeneous environments, leading to security oversights. With many organizations limited by small security teams, there is a high risk of missed alerts when navigating multiple security tools. This complexity creates opportunities for attackers, who do not view these systems as isolated silos but as interconnected targets. A single compromised account can serve as an entry point for broader lateral movements within the network.
The report highlights that in the first half of 2025, misconfigurations and credential compromises were the top attack vectors in cloud environments, according to Google’s Cloud Threat Horizons Report. However, the latter half saw a rising trend of software-based exploits, indicating a shift in attacker tactics. The financial implications of these breaches are substantial, with data from IBM revealing that breaches involving multiple environments can average over five million USD in costs, a figure only slightly lower for breaches limited to public cloud platforms. These statistics illustrate the urgent need for organizations to address complexity to mitigate risks effectively.
Defensive Context
Organizations managing cloud environments will find these findings particularly relevant. Security teams, often constrained in resources, must acknowledge that they are likely exposed to increasing risks associated with misconfiguration and inadequate visibility across their infrastructure. The complexity of managing hybrid and multi-cloud setups complicates the ability to maintain effective defenses. Conversely, firms with simpler, more unified cloud or on-premise architectures may not feel the acute pressure described in the report, as they tend to experience fewer risks from misconfigurations.
Why This Matters
The trend indicates that organizations facing rapid growth, especially those adopting hybrid cloud models, are more vulnerable to attacks stemming from misconfigured systems and credential theft. The reality is that insufficient attention to security hygiene in complex deployments can lead to serious breaches that result in reputational damage and significant financial losses.
Defender Considerations
Focus should be placed on enhancing visibility across diverse cloud environments. The implementation of unified security policies is critical, as is the use of automation to manage and correlate telemetry data from multiple sources. This can assist in reducing the attack surface and minimizing the risk of oversights during incident responses. Organizations may need to invest in better tools or processes that can cope with the complexity of their cloud infrastructure and ensure comprehensive monitoring and visibility.
Indicators of Compromise (IOCs)
No specific IOCs have been provided in this analysis.



