Cloud Data Security Pulsemeter

Where is your sensitive (protected/regulated/proprietary) data located? (Select all that apply)

On-prem
On-prem: 53% of votes, 10 votes
IaaS (AWS, Azure, GCP, etc.)
IaaS (AWS, Azure, GCP, etc.): 53% of votes, 10 votes
SaaS (Microsoft 365, Salesforce, Workday, etc.)
SaaS (Microsoft 365, Salesforce, Workday, etc.): 37% of votes, 7 votes
Corporate-owned devices (mobile, laptops, etc.)
Corporate-owned devices (mobile, laptops, etc.): 37% of votes, 7 votes
Employee-owned devices (mobile, laptops, etc.)
Employee-owned devices (mobile, laptops, etc.): 21% of votes, 4 votes

How often do you scan cloud data repositories for sensitive data (discovery)?

Continuously
Continuously: 22% of votes, 4 votes
Daily
Daily: 17% of votes, 3 votes
Weekly
Weekly: 17% of votes, 3 votes
Less frequently (monthly/quarterly)
Less frequently (monthly/quarterly): 6% of votes, 1 votes
We don’t discover our sensitive data
We don’t discover our sensitive data: 39% of votes, 7 votes

Do you scan the following data types for sensitive information (select all that apply)?

Structured databases
Structured databases: 53% of votes, 10 votes
Files
Files: 53% of votes, 10 votes
Images
Images: 53% of votes, 10 votes
Collaborative Document services (Microsoft 365, Box.com, Dropbox, etc.)
Collaborative Document services (Microsoft 365, Box.com, Dropbox, etc.): 21% of votes, 4 votes
PaaS data stores (AWS Dynamo, Azure SQL, Snowflake, Databricks, etc.)
PaaS data stores (AWS Dynamo, Azure SQL, Snowflake, Databricks, etc.): 32% of votes, 6 votes

How do you restrict access to sensitive data? (Select all that apply)

Network access rules
Network access rules: 68% of votes, 13 votes
IAM rules
IAM rules: 74% of votes, 14 votes
CIEM tool
CIEM tool: 26% of votes, 5 votes
DSPM tool
DSPM tool: 21% of votes, 4 votes
We don't restrict access
We don't restrict access: 11% of votes, 2 votes

What risk to your data is the most concerning?

Shadow data
Shadow data: 11% of votes, 2 votes
System vulnerabilities/software supply chain
System vulnerabilities/software supply chain: 17% of votes, 3 votes
Excessive permissions
Excessive permissions: 33% of votes, 6 votes
Misconfigurations providing access
Misconfigurations providing access: 22% of votes, 4 votes
Insufficient permissions hygiene
Insufficient permissions hygiene: 17% of votes, 3 votes

Do you view cloud data security as an integral part of your overall cloud security management, meaning it should be integrated into a central cloud security platform?

Agree
Agree: 78% of votes, 14 votes
Somewhat agree
Somewhat agree: 6% of votes, 1 votes
Neutral
Neutral: 17% of votes, 3 votes
Somewhat disagree
Somewhat disagree: 0% of votes, 0 votes
Disagree
Disagree: 0% of votes, 0 votes