Cloud Security Atlas
Datadog Cloud Security Atlas is a risk register for Threats and Vulnerabilities. This database gives you the ability to search and filter on your cloud provider platform, risk type, and sort by impact, exploitability, and recency.
Test out the search below by searching for specific cloud services like EBS or S3. From there you can chart your own course to understanding risk that relates to your environment.
Spotlight
-
summary
service
risk type
exploitability
impact
date
-
Stopping a CloudTrail trail Mar'23
SERVICE
RISK TYPE
cloudtrail
attacks
EXPLOITABILITY
IMPACT
low
medium
Mar'23 -
Executing commands through EC2 user data Mar'23
SERVICE
RISK TYPE
ec2
attacks
EXPLOITABILITY
IMPACT
low
medium
Mar'23 -
Launching EC2 instances Mar'23
SERVICE
RISK TYPE
ec2
attacks
EXPLOITABILITY
IMPACT
high
medium
Mar'23 -
Opening a security group to the Internet Mar'23
SERVICE
RISK TYPE
ec2
attacks
EXPLOITABILITY
IMPACT
medium
medium
Mar'23 -
Removing VPC flow logs Mar'23
SERVICE
RISK TYPE
ec2
attacks
EXPLOITABILITY
IMPACT
low
medium
Mar'23 -
Stealing an EBS snapshot by creating a snapshot and sharing it Mar'23
SERVICE
RISK TYPE
ec2
attacks
EXPLOITABILITY
IMPACT
low
high
Mar'23 -
Stealing EC2 instance credentials through the Instance Metadata Service Mar'23
SERVICE
RISK TYPE
ec2
attacks
EXPLOITABILITY
IMPACT
high
medium
Mar'23 -
Compromising AWS Console credentials Mar'23
SERVICE
RISK TYPE
iam
attacks
EXPLOITABILITY
IMPACT
medium
high
Mar'23 -
Creating a new IAM user Mar'23
SERVICE
RISK TYPE
iam
attacks
EXPLOITABILITY
IMPACT
high
high
Mar'23 -
Stealing an RDS database by creating a snapshot and sharing it Mar'23
SERVICE
RISK TYPE
rds
attacks
EXPLOITABILITY
IMPACT
medium
high
Mar'23 -
Publicly shared AMI Mar'23
SERVICE
RISK TYPE
ec2
vulnerabilities
EXPLOITABILITY
IMPACT
high
medium
Mar'23 -
Publicly shared EBS snapshot Feb'23
SERVICE
RISK TYPE
ec2
vulnerabilities
EXPLOITABILITY
IMPACT
high
high
Feb'23 -
EC2 instance without IMDSv2 enforced Jun'23
SERVICE
RISK TYPE
ec2
vulnerabilities
EXPLOITABILITY
IMPACT
low
high
Jun'23 -
Security group exposes risky ports to the internet May'23
SERVICE
RISK TYPE
ec2
vulnerabilities
EXPLOITABILITY
IMPACT
high
medium
May'23 -
IAM role can be assumed by anyone Mar'23
SERVICE
RISK TYPE
iam
vulnerabilities
EXPLOITABILITY
IMPACT
medium
high
Mar'23 -
IAM user with old access keys Feb'23
SERVICE
RISK TYPE
iam
vulnerabilities
EXPLOITABILITY
IMPACT
medium
high
Feb'23 -
IAM user with Console access does not have MFA Mar'23
SERVICE
RISK TYPE
iam
vulnerabilities
EXPLOITABILITY
IMPACT
medium
high
Mar'23 -
Active root user access keys Feb'23
SERVICE
RISK TYPE
iam
vulnerabilities
EXPLOITABILITY
IMPACT
medium
high
Feb'23 -
Usage of the root user Feb'23
SERVICE
RISK TYPE
iam
vulnerabilities
EXPLOITABILITY
IMPACT
medium
high
Feb'23 -
Lambda function is publicly accessible through function URL Feb'23
SERVICE
RISK TYPE
lambda
vulnerabilities
EXPLOITABILITY
IMPACT
medium
medium
Feb'23 -
Publicly accessible RDS instance Feb'23
SERVICE
RISK TYPE
rds
vulnerabilities
EXPLOITABILITY
IMPACT
medium
high
Feb'23 -
Publicly shared RDS snapshot Feb'23
SERVICE
RISK TYPE
rds
vulnerabilities
EXPLOITABILITY
IMPACT
high
high
Feb'23 -
Public S3 bucket through bucket ACL Feb'23
SERVICE
RISK TYPE
s3
vulnerabilities
EXPLOITABILITY
IMPACT
high
medium
Feb'23 -
Public S3 bucket through bucket policy Feb'23
SERVICE
RISK TYPE
s3
vulnerabilities
EXPLOITABILITY
IMPACT
high
medium
Feb'23 -
Publicly accessible SNS topic Feb'23
SERVICE
RISK TYPE
sns
vulnerabilities
EXPLOITABILITY
IMPACT
medium
medium
Feb'23 -
Publicly accessible SQS queue Mar'23
SERVICE
RISK TYPE
sqs
vulnerabilities
EXPLOITABILITY
IMPACT
medium
medium
Mar'23