AI Adoption Fuels 'Massive' Cloud Attack Surface Expansion, Palo Alto Networks Report Warns

Palo Alto Networks Report: 99% of Organizations See Attacks on AI Systems Amid Surge in Cloud Risk

INFORMATIONAL
December 17, 2025
5m read
Cloud SecurityThreat IntelligencePolicy and Compliance

Related Entities

Organizations

Products & Tech

Artificial Intelligence (AI)

Full Report

Executive Summary

The enterprise rush to adopt Artificial Intelligence is creating a massive and unmanageable expansion of the cloud attack surface, according to the Palo Alto Networks 'State of Cloud Security Report 2025'. The report surveyed over 2,800 global security executives and found a critical disconnect between the speed of AI-driven development and the ability of security teams to manage the associated risks. A concerning 99% of organizations reported attacks against their AI applications and services in the past year, confirming that AI-related threats are now mainstream. The report highlights that generative AI is accelerating the creation of insecure code, while attackers are increasingly targeting foundational cloud components like APIs and identity. The findings underscore an urgent need for organizations to consolidate security tooling and adopt a unified platform approach to secure their cloud and AI ecosystems at machine speed.


Regulatory Details

This article summarizes a security research report, not a specific regulation. However, the findings have significant implications for compliance with various data protection and cybersecurity standards. The report highlights systemic risks that could lead to non-compliance with regulations like GDPR, CCPA, and industry-specific rules (e.g., HIPAA, PCI-DSS) if not addressed.

Key findings from the report include:

  • Universal AI Adoption & Risk: 99% of organizations now use generative AI-assisted coding, but this is creating a flood of vulnerabilities. While 52% of development teams ship code weekly, only 18% of security teams can remediate flaws at the same pace.
  • Widespread AI Attacks: 99% of organizations experienced at least one attack on their AI systems in the past year, demonstrating a clear and present danger.
  • Shifting Attacker Focus: Threat actors are targeting the foundational layers of the cloud. API attacks saw a 41% year-over-year increase, the sharpest rise of any threat vector. This is directly linked to AI's heavy reliance on APIs.
  • Identity as a Weak Link: 53% of respondents cited lenient Identity and Access Management (IAM) practices as a top security challenge, making it a prime target for credential theft and lateral movement.
  • Tool Sprawl & Inefficiency: The average organization uses 17 different cloud security tools from five vendors, leading to fragmented visibility, security gaps, and slower incident response. Consequently, 97% of organizations are looking to consolidate their security tools.

Affected Organizations

The report's findings apply globally to nearly all organizations utilizing cloud services and adopting AI technologies. The survey spanned 10 countries and included a wide range of industries, indicating that these challenges are universal. Any organization that is developing or deploying applications in the cloud, using generative AI for code development, or exposing APIs for AI services is directly affected by the risks identified in this report. This includes sectors from technology and finance to healthcare and manufacturing.


Compliance Requirements

While not a mandate, the report strongly implies a set of best practices required to maintain a secure and compliant posture in the age of AI:

  1. Secure AI/ML Lifecycles: Organizations must integrate security into the entire AI development lifecycle (DevSecOps), from data ingestion and model training to deployment and monitoring.
  2. Code Security at Scale: Implement automated security scanning tools within CI/CD pipelines to detect and remediate insecure code generated by AI assistants before it reaches production. This addresses the gap between development speed and security remediation pace.
  3. API Security Governance: Establish strong governance for API security, including inventory, testing, and runtime protection. Given the 41% surge in API attacks, this is a critical control.
  4. IAM and Least Privilege: Enforce strict, context-aware IAM policies based on the principle of least privilege. This is essential to mitigate the risk of credential theft and lateral movement, cited as a top challenge by 53% of respondents.
  5. Platform Consolidation: Move away from a fragmented, multi-vendor toolset towards a unified cloud-native application protection platform (CNAPP) that provides end-to-end visibility and correlates data from across the cloud estate.

Impact Assessment

The business and operational impacts of failing to address the issues raised in the report are significant:

  • Increased Breach Likelihood: The growing gap between vulnerability creation and remediation directly increases the likelihood of a successful cyberattack and subsequent data breach.
  • Slower Incident Response: Tool sprawl and fragmented data mean security teams take longer to detect, investigate, and respond to incidents, increasing the potential damage.
  • Compliance Failures: The lack of visibility and control over AI-generated code and sprawling cloud assets can lead to non-compliance with data protection regulations, resulting in heavy fines.
  • Erosion of Trust: A successful attack on an organization's AI systems could erode customer trust, particularly if it involves the manipulation of AI models or the theft of sensitive training data.

Compliance Guidance

To address the challenges outlined in the Palo Alto Networks report, organizations should adopt a strategic, platform-based approach:

  1. Prioritize CNAPP Adoption: Make the consolidation of cloud security tools onto a single Cloud-Native Application Protection Platform (CNAPP) a strategic priority. This will unify visibility across Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), and API security.
  2. Embed Security in CI/CD: Integrate Infrastructure as Code (IaC) scanning and code analysis tools directly into developer workflows and CI/CD pipelines. Provide developers with immediate feedback on security issues in their AI-generated code.
  3. Implement Zero Trust for Cloud: Apply Zero Trust principles to cloud environments, focusing on strong identity verification, micro-segmentation, and enforcing least-privilege access for all human and machine identities, especially those related to AI services and APIs.
  4. Develop an AI Security Program: Establish a formal program for AI security that includes threat modeling for AI/ML systems, data provenance checks, and continuous monitoring of AI models for signs of tampering or abuse.

Timeline of Events

1
December 16, 2025
Palo Alto Networks releases its 2025 'State of Cloud Security Report'.
2
December 17, 2025
This article was published

MITRE ATT&CK Mitigations

Implement secure configurations for cloud services and CI/CD pipelines to reduce the attack surface.

Mapped D3FEND Techniques:

Enforce least privilege and closely monitor privileged accounts in cloud environments to mitigate risks from lenient IAM practices.

Mapped D3FEND Techniques:

Train developers on secure coding practices, especially when using generative AI tools, to reduce the introduction of vulnerabilities.

Audit

M1047enterprise

Implement comprehensive logging and auditing across the cloud environment to enable detection and response.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat the risks highlighted in the report, organizations must implement rigorous Application Configuration Hardening, particularly for AI and cloud-native applications. This involves establishing and enforcing secure baselines for all cloud services and applications. Specifically, security teams should create golden images and Infrastructure as Code (IaC) templates that have security controls built-in, such as disabled public access for storage buckets, encrypted data volumes, and restrictive network security groups. For AI systems, this means hardening the configuration of machine learning platforms (e.g., SageMaker, Azure ML) by restricting network access, enforcing strict IAM roles for training and inference, and disabling unnecessary features. Use Cloud Security Posture Management (CSPM) tools to continuously scan for deviations from these secure baselines and automatically remediate misconfigurations. This directly addresses the problem of insecure code and configurations being deployed at scale.

Given that 53% of organizations cite lenient IAM as a top challenge, enforcing strict User Account Permissions is paramount. Adopt a Zero Trust mindset and apply the principle of least privilege to all human and machine identities in the cloud. For AI applications, this is critical: the service accounts and roles used by AI agents to access APIs and data stores must have the absolute minimum permissions required to function. Regularly review and audit IAM policies using Cloud Infrastructure Entitlement Management (CIEM) tools to identify and remove excessive permissions. Implement just-in-time (JIT) access for administrative tasks to reduce the window of opportunity for attackers with stolen credentials. This countermeasure directly mitigates the leading vector for cloud breaches and lateral movement.

To counter the 41% surge in API attacks, organizations must deploy advanced Network Traffic Analysis. This goes beyond traditional firewalls and involves deep packet inspection and behavioral analysis of API traffic. Deploy API security gateways or use CNAPP features that can baseline normal API behavior and detect anomalies indicative of an attack, such as data exfiltration, injection attacks (SQLi, NoSQLi), or broken authentication attempts. For AI systems, monitor the API calls between the AI agent and various cloud services. An alert should be triggered if an AI agent suddenly starts accessing new APIs, exfiltrating large volumes of data, or making an unusual number of requests. This provides runtime protection that complements static code analysis and helps detect active attacks on the foundational infrastructure of modern cloud applications.

Sources & References

Palo Alto Networks Report Reveals AI Is Driving a Massive Cloud Attack Surface Expansion
Palo Alto Networks (paloaltonetworks.com) December 16, 2025
Palo Alto Networks warns that AI is driving a surge in cloud security risks
SiliconANGLE (siliconangle.com) December 16, 2025
Where Cloud Security Stands Today and Where AI Breaks It
Palo Alto Networks (paloaltonetworks.com) December 16, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Cloud SecurityAI SecurityPalo Alto NetworksAPI SecurityIAMDevSecOpsCNAPPThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading