Public S3 buckets are still the #1 cause of cloud data exposure. It's 2026. Why haven't we solved this?
15% of cloud breaches per the DBIR are still misconfigs. public S3 buckets, open DB snapshots, overprivileged service accounts. Same three things weve been talking about since 2019.
CSPM tools exist. Block public access settings exist. The fix is literally a checkbox in most cases. So why are orgs still getting breached this way?
Ive started to think its not a tool problem. Its an ownership problem. Nobody wakes up in the morning thinking "I own the S3 bucket security posture." Its everyone’s problem which means its nobody’s.
So, who owns cloud storage security at your org? For those who solved this, what did it? Org structure change, policy automation, something else? Thanks all!!