Weak credentials are the #1 security risk in cloud computing

If your cloud security is built on weak passwords, you’re playing defense with your hands tied. Poor credential management is the single biggest reason attackers break into cloud environments. In the second half of 2024, nearly half of all cloud intrusions stemmed from weak or missing authentication, according to Google Cloud’s latest security report. That’s an absurdly high number, and it’s avoidable.

Think of credentials as the keys to your most valuable data. If you leave them lying around—or worse, don’t require a key at all—someone will walk right in. Once inside, attackers don’t stop at the front door. They move laterally, searching for higher access privileges and more valuable systems to exploit. This is the reality facing enterprises today, and it puts security teams in a losing position against cybercriminals and nation-state actors.

The solution is to enforce strong authentication. Use multi-factor authentication (MFA), enforce password complexity, and eliminate default or easily guessed credentials. Organizations that fail to do this are actively inviting attackers inside.

The growing threat of misconfigured cloud services and insecure APIs

Credentials aren’t the only problem. Even if your passwords are airtight, a simple misconfiguration in your cloud setup can leave the door wide open. And let’s be clear—this happens a lot. Misconfigured cloud services were the second most common way attackers gained access in 2024, responsible for over a third of all security breaches.

Then there’s the issue of insecure APIs. APIs (Application Programming Interfaces) are like digital highways connecting different services and applications. When left unprotected, attackers can exploit them to access data, manipulate systems, and escalate their control. Nearly 20% of breaches in the latter half of 2024 stemmed from compromised APIs and user interfaces. That’s a massive attack surface most organizations aren’t properly securing.

The fix? Cloud configurations must be continuously audited and monitored. Security teams need to follow the principle of least privilege—making sure only the necessary permissions are granted to each user and system. As for APIs, security should be built in from day one. Implement strong authentication, encrypt data, and use monitoring tools to detect abnormal activity before it becomes a crisis.

The cost of skipping Multifactor Authentication (MFA)

Every executive should ask: how many major breaches could be prevented with one simple fix? The answer: most of them. Major organizations are still getting compromised because they don’t enforce it. In April 2024, attackers targeted over 160 Snowflake customer environments, breaching companies like AT&T, Advance Auto Parts, and Pure Storage. The common denominator? No MFA.

Here’s how it works: without MFA, an attacker only needs a username and password—stolen, guessed, or leaked. Once inside, they can move laterally, steal data, and escalate privileges. With MFA, they need an additional authentication factor—like a mobile device confirmation or a security key—which dramatically reduces the chances of an attack succeeding.

Companies that fail to enforce MFA are essentially leaving their doors unlocked and hoping no one walks in. That’s wishful thinking. If your organization hasn’t made MFA mandatory across all critical systems, it’s time to fix that—before an attacker forces you to.

Overprivileged service accounts

Attackers are smart, and they’re getting smarter. Instead of only targeting user accounts, they’re now going after something far more dangerous: service accounts with excessive permissions. These accounts aren’t tied to individuals—they’re used by applications, databases, and automated systems. When they have too much access, they become a hacker’s golden ticket.

In 2024, more than 60% of all observed attacker movements involved lateral movement—hopping from one system to another after initial access. Overprivileged service accounts are a key part of this strategy. Once compromised, these accounts allow attackers to move through an organization’s infrastructure undetected, gaining access to sensitive data, critical applications, and cloud workloads.

The fix? Enforce strict access controls. Follow the principle of least privilege: service accounts should only have the permissions they absolutely need—nothing more. Regularly audit these accounts, remove unnecessary privileges, and use behavioral monitoring to detect unusual activity. Treat service accounts with the same level of security scrutiny as human users—because in the wrong hands, they’re just as dangerous.

The domino effect of a single stolen credential

If there’s one takeaway from all of this, it’s that security failures aren’t isolated events—they’re chain reactions. A single stolen credential can set off a domino effect, leading to system-wide compromise, data theft, and long-term damage to business operations.

Here’s what happens: an attacker steals a credential—maybe from a phishing attack, a data breach, or weak password reuse. With that one credential, they gain access to a cloud service. From there, they move laterally, compromise infrastructure, bypass security controls, and escalate privileges. They manipulate MFA settings, plant backdoors, and establish persistence, allowing them to return anytime they want.

Strong security needs more than one layer of defense. It requires making sure there’s no single weak link that can bring the whole system down. That means enforcing MFA, securing APIs, monitoring for misconfigurations, and locking down over-privileged accounts. Security is only as strong as its weakest point—so make sure yours isn’t easy to find.

Key executive takeaways

  • Weak credentials are the top cause of cloud breaches, accounting for nearly 50% of intrusions. Leaders should enforce strong authentication measures, including robust password policies and multi-factor authentication, to mitigate this risk.

  • Misconfigurations and insecure APIs represent significant vulnerabilities, contributing to over one-third of attacks. Decision-makers should prioritize regular audits and automated monitoring to secure cloud configurations and API endpoints.

  • The absence of multifactor authentication has led to major breaches in high-profile organizations. Implementing MFA across all critical systems is essential to protect against unauthorized access and lateral movement.

  • Overprivileged service accounts enable attackers to move laterally and escalate access once inside the network. Executives should adopt the principle of least privilege and perform regular reviews to limit access rights to only what is necessary.

Tim Boesen

February 11, 2025

5 Min