The enterprise rush to adopt Artificial Intelligence is creating a massive and unmanageable expansion of the cloud attack surface, according to the Palo Alto Networks 'State of Cloud Security Report 2025'. The report surveyed over 2,800 global security executives and found a critical disconnect between the speed of AI-driven development and the ability of security teams to manage the associated risks. A concerning 99% of organizations reported attacks against their AI applications and services in the past year, confirming that AI-related threats are now mainstream. The report highlights that generative AI is accelerating the creation of insecure code, while attackers are increasingly targeting foundational cloud components like APIs and identity. The findings underscore an urgent need for organizations to consolidate security tooling and adopt a unified platform approach to secure their cloud and AI ecosystems at machine speed.
This article summarizes a security research report, not a specific regulation. However, the findings have significant implications for compliance with various data protection and cybersecurity standards. The report highlights systemic risks that could lead to non-compliance with regulations like GDPR, CCPA, and industry-specific rules (e.g., HIPAA, PCI-DSS) if not addressed.
Key findings from the report include:
The report's findings apply globally to nearly all organizations utilizing cloud services and adopting AI technologies. The survey spanned 10 countries and included a wide range of industries, indicating that these challenges are universal. Any organization that is developing or deploying applications in the cloud, using generative AI for code development, or exposing APIs for AI services is directly affected by the risks identified in this report. This includes sectors from technology and finance to healthcare and manufacturing.
While not a mandate, the report strongly implies a set of best practices required to maintain a secure and compliant posture in the age of AI:
The business and operational impacts of failing to address the issues raised in the report are significant:
To address the challenges outlined in the Palo Alto Networks report, organizations should adopt a strategic, platform-based approach:
Implement secure configurations for cloud services and CI/CD pipelines to reduce the attack surface.
Enforce least privilege and closely monitor privileged accounts in cloud environments to mitigate risks from lenient IAM practices.
Train developers on secure coding practices, especially when using generative AI tools, to reduce the introduction of vulnerabilities.
To combat the risks highlighted in the report, organizations must implement rigorous Application Configuration Hardening, particularly for AI and cloud-native applications. This involves establishing and enforcing secure baselines for all cloud services and applications. Specifically, security teams should create golden images and Infrastructure as Code (IaC) templates that have security controls built-in, such as disabled public access for storage buckets, encrypted data volumes, and restrictive network security groups. For AI systems, this means hardening the configuration of machine learning platforms (e.g., SageMaker, Azure ML) by restricting network access, enforcing strict IAM roles for training and inference, and disabling unnecessary features. Use Cloud Security Posture Management (CSPM) tools to continuously scan for deviations from these secure baselines and automatically remediate misconfigurations. This directly addresses the problem of insecure code and configurations being deployed at scale.
Given that 53% of organizations cite lenient IAM as a top challenge, enforcing strict User Account Permissions is paramount. Adopt a Zero Trust mindset and apply the principle of least privilege to all human and machine identities in the cloud. For AI applications, this is critical: the service accounts and roles used by AI agents to access APIs and data stores must have the absolute minimum permissions required to function. Regularly review and audit IAM policies using Cloud Infrastructure Entitlement Management (CIEM) tools to identify and remove excessive permissions. Implement just-in-time (JIT) access for administrative tasks to reduce the window of opportunity for attackers with stolen credentials. This countermeasure directly mitigates the leading vector for cloud breaches and lateral movement.
To counter the 41% surge in API attacks, organizations must deploy advanced Network Traffic Analysis. This goes beyond traditional firewalls and involves deep packet inspection and behavioral analysis of API traffic. Deploy API security gateways or use CNAPP features that can baseline normal API behavior and detect anomalies indicative of an attack, such as data exfiltration, injection attacks (SQLi, NoSQLi), or broken authentication attempts. For AI systems, monitor the API calls between the AI agent and various cloud services. An alert should be triggered if an AI agent suddenly starts accessing new APIs, exfiltrating large volumes of data, or making an unusual number of requests. This provides runtime protection that complements static code analysis and helps detect active attacks on the foundational infrastructure of modern cloud applications.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats