CISA Warns: Weak Identity Protections Are an Open Door to Cloud Breaches

May 23, 2025
-minute read
Product and Solutions Marketing Manager, Public Sector

Cloud and hybrid environments have expanded the attack surface, and cybercriminals are taking full advantage. The Cybersecurity and Infrastructure Security Agency (CISA) warns identity is the top target, making Zero Trust and identity-first security non-negotiable.

 

In fact, CISA has repeatedly warned that identity-related attacks are among the top vectors for cloud breaches. In its guidance on defending against cloud compromise, CISA stresses the need for:

  • Strong, phishing-resistant authentication

  • Centralized identity and access management (IAM)

  • Continuous monitoring of user behavior and access patterns

In short, Identity must be treated as the new perimeter.

 

Why? Because humans are still the weakest link in the identity chain. Phishing, password reuse, and credential theft continue to fuel most breaches, even with sophisticated infrastructure in place.

 

That’s why smart organizations put identity at the core, stopping attackers at the front door or catching them faster if they do get through.

Identity Is the New Perimeter

Perimeter-based security doesn’t work in a world of hybrid work, BYOD, and cloud services. Identity is the only consistent control across modern environments.

 

Taking an identity-first approach that aligns with Zero Trust principles and CISA's guidance ensures every access request is evaluated dynamically based on context and risk.

Real-World Breaches, Identity-Based Solutions

Here’s examples of how modern IAM solutions could have helped mitigate recent cloud incidents:

 

One of the nation’s largest government agencies faces an email breach

Attackers exploited a compromised signing key to gain unauthorized access to sensitive government communications.

 

The Answer:

  • Validate tokens securely using centralized, standards-based authentication.

  • Detect anomalies in real time using behavioral and contextual risk signals.

  • Enforce access policies based on user identity, device posture, and session risk.

A global technology leader experiences major data exposure

Stolen employee credentials allowed attackers to infiltrate internal systems and exfiltrate confidential IP.

 

The Answer:

A top financial institution suffers massive data breach

A misconfigured firewall in a public cloud environment exposed over 100 million customer records.

 

The Answer:

Built for Complex Environments

Most organizations today operate in hybrid or multi-cloud environments, which demand identity solutions that are both flexible and secure. These solutions must support cloud-native deployment, integrate seamlessly with legacy infrastructure, and meet strict compliance standards such as FedRAMP. They should also function in disconnected, degraded, intermittent, and limited (DDIL) or air-gapped environments where network isolation is required. For example, one U.S. federal agency successfully unified identity across both legacy and SaaS applications while maintaining Zero Trust principles and regulatory compliance.

Share this Article:
Related Resources

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.