4 Reasons Cloud Security Risk Management is Adopting an Incident Response Mentality

The high volume of alerts, combined with tedious and manual remediation processes, has resulted in a growing risk backlog and a rise in cyber incidents. As a result, many organizations are adopting an incident response mentality in their cloud security risk management programs, treating risk remediation with the same urgency seen in IR plans to reduce risk acceptance and minimize exposure.

In this blog, we’ll dive into the key factors behind this shift and why more organizations are adopting an IR mindset for cloud security risk remediation.

 

1. Most incidents are related to risks already known to the organization

A large majority of incidents (in fact, over 62%), are directly related to risks the organization was already fully aware of, but couldn’t remediate in time – or at all. Vulnerabilities, cloud misconfigurations, and other security risks are still among the top initial access vectors for cyberattacks and/or allow adversaries to execute critical stages of attack once in an environment – such as lateral movement, persistence, etc. Slow and manual remediation processes leave attackers with an extended window of opportunity, meaning many of these incidents could have been avoided with more efficient remediation. Further, the fact that 56% of risks can’t be remediated, leaves a bucket of issues accepted by the organization, increasing the potential for security incidents when appropriate mitigating controls are not implemented.

 

2. Time to exploit vulnerabilities is now just days

The time it takes for attackers to exploit vulnerabilities has drastically decreased, highlighting the urgent need for faster remediation. According to Mandiant, the average time-to-exploit (TTE) has dropped from 32 days the previous year to just 5 days today. As attackers leverage advanced tools, including Artificial Intelligence (AI), to identify and exploit open risks at a faster pace, security teams must do the same. AI is being used by attackers to scan environments quickly, identify vulnerabilities, and exploit them before organizations can react. Taking into consideration that the average TTE is now just days, organizations typically take 10X longer to remediate vulnerabilities than it takes for attackers to exploit them.

 

3. Regulations and compliance 

Compliance is another major driver behind the push for more efficient cloud security risk management. Organizations are under increasing pressure to meet stringent regulatory requirements and remediate vulnerabilities in a timely manner. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) recommends that critical vulnerabilities be remediated within 15 days, and high-risk vulnerabilities within 30 days. On average it takes many organizations 6 weeks (best case) and over 8 weeks (worst case) to remediate an application vulnerability in production. Given the speed at which attackers are exploiting vulnerabilities, regulations are likely to shorten these recommended timelines even further, pushing organizations to adopt new strategies that improve the overall efficiency of their risk management programs.

 

4. Remediation costs remain high

Inefficient remediation is costing organizations millions of dollars in operational spending annually. To put this into perspective, most organizations have more than four people involved in opening and closing a single security ticket. Extensive coordination across different internal teams – such as DevOps, engineering, and executive leadership – is often required to ensure vulnerabilities are prioritized and fixed or mitigated. The time, resources, and effort required to validate the risk, gather the necessary context, find the best path to resolution, prioritize the fix, and implement a solution, all drives up the cost of remediation.

In addition to direct costs, there are also opportunity costs to consider. Teams often have to put aside other important initiatives, such as revenue-generating projects (e.g. product development or scalability) to focus on risk remediation, leading to missed opportunities.

 

What are security teams doing about it?

  • Prioritization Based on Effort & Impact: With an overwhelming backlog of vulnerabilities, many organizations are adopting effort-based prioritization. This strategy allows security teams to address the largest number of risks with the least amount of changes, providing the greatest impact on reducing the backlog. This is usually achieved by effectively correlating risks based on common root cause / fix.
  • Mitigation Using Existing Controls: Because there are many cases where remediation is too time consuming, requires too much effort, or is just not possible, security teams are increasingly leaning on cloud-native services and existing security controls to reduce or eliminate risk. This approach not only minimizes the number of risks requiring urgent attention, but it also empowers security teams to take immediate action, even while waiting for other teams / owners, who may be handling competing priorities, to implement the necessary fix.
  • Automation and Agentic AI: Security teams are turning to automation to streamline the end-to-end remediation process – especially to drastically reduce the time it takes to triage findings, conduct root cause analysis, and prioritize alerts. AI (LLMs and AI agents) are being applied to perform complex tasks at a scale that wouldn’t be possible for even the most advanced security teams. For example, AI has the power “to run infinite options and provide the best resolution paths” eliminating the need to do manual code review, and many other time consuming tasks required to find and implement appropriate solutions.

ZEST was founded to bridge the gap between identifying security risks and efficiently remediating them. To learn how security teams are leveraging ZEST to minimize exposure, meet compliance, and reduce operational costs, reach out to our team.

Share the Post:

Related Resources

Building a Cloud Security Program That Actually Works

In this webinar, we discuss essential best practices and milestones…

Code to Cloud and Back: Closing the Remediation Loop

What is Code to Cloud? Everyone is in the cloud,…

The Future of Cloud Security and the Role of AI

With the visibility challenge largely addressed, what’s next? How will…

4 Reasons Cloud Security Risk Management is Adopting an Incident Response Mentality

The high volume of alerts, combined with tedious and manual…

Beyond CVSS: Why EPSS and KEV Are Game-Changers for Prioritizing Vulnerabilities

Publicly disclosed computer vulnerabilities are organized into a globally recognized…

Cloud Risk Exposure Impact Report 2025

Industry-first report examining the relationship between remediation delays and…

How to Build an Efficient Risk Resolution Plan

From Visibility to Action  While security teams have the visibility…

ZEST Security’s Cloud Security Predictions for 2025

2025 is here and it’s time to talk predictions. Here…

The Role of AI, Consolidation, and More on Cloud Security

Today, CNAPP is a billion-dollar industry, providing security teams with…

6 Core Capabilities for Cloud Risk Resolution

This guide outlines the core capabilities to build an efficient…

A Conversation with Vladi Sandler: A World Beyond CNAPP

Discussing the journey that led to the widespread adoption of…

ZEST Expands its IaC Tool Support

The rapid adoption of DevOps tools has transformed how organizations…

Top 6 Cloud-Native Security Controls You Must Know About

Attackers are moving faster than ever, becoming increasingly good at…

ZEST Now Supports AWS, Azure and GCP

As of today, the ZEST platform now supports all three…

From Weeks to Hours: How ZEST is Redefining Cloud Security

ZEST is changing the way security and DevOps teams remediate…

Security Controls for Mitigating CUPS Vulnerabilities

A recent vulnerability in the Common Unix Printing System (CUPS)…

5 Key Takeaways: A Conversation with Matthew Hurewitz

We recently had a conversation with Matthew Hurewitz, Director of…

A Conversation with Matthew Hurewitz: The Cost of Remediation

Quantifying the true cost of cloud risk remediation and its…

The Top 21 Most Promising Israeli Start Ups 2024

ZEST is honored to be named one of Israel’s most…

Essential tools with critical security challenges

ZEST Security discusses how to leverage Terraform modules and providers…

Why Resolution Paths Should Replace Risk Remediation

Every holiday and during occasional long summer weekends, my teams…

The hidden risks of Terraform providers

Terraform by HashiCorp is a leading tool for DevOps engineers…

Risk Mitigation Beyond Remediation

Cloud security remains a paramount concern for enterprises. Traditional security…

ZEST Security Aims to Resolve Cloud Risks

Cybersecurity startup ZEST Security emerged from stealth with an AI-powered…

ZEST Security Exits Stealth to Resolve, not Just Flag, Enterprise Cloud Risks Using GenAI

ZEST Security exited stealth today with its AI-powered cloud risk…

ZEST Security raises $5 million Seed round for cloud risk resolution platform

The Israeli startup’s platform provides paths that offer both mitigation…

This startup doesn’t just find your weaknesses, it also fixes them

ZEST Security saw mountains of weaknesses found by other products,…

AI-powered cloud risk resolution startup ZEST Security launches with $5M in funding

Artificial intelligence-powered cloud risk resolution platform startup ZEST Security Inc….

ZEST Security, Interview With CEO Snir Ben Shimol

ZEST Security a NYC-based provider of an AI-powered cloud risk…

ZEST Security Aims to Resolve, Not Just Mitigate Cloud Risks

ZEST Security emerged from stealth with $5 million funding and…

Resolving your cloud risks with ZEST!