{"id":147542,"date":"2025-03-27T08:38:39","date_gmt":"2025-03-27T15:38:39","guid":{"rendered":"https:\/\/unit42.paloaltonetworks.com\/?p=147542"},"modified":"2025-07-22T08:39:45","modified_gmt":"2025-07-22T15:39:45","slug":"2025-cloud-security-alert-trends","status":"publish","type":"post","link":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/","title":{"rendered":"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f"},"content":{"rendered":"<h2><a id=\"post-147542-_heading=h.5tjsm2ugs5re\"><\/a>\u6458\u8981<\/h2>\n<p>\u91dd\u5c0d\u96f2\u7aef\u8a17\u7ba1\u57fa\u790e\u67b6\u69cb\u7684\u653b\u64ca\u6d3b\u52d5\u8d8a\u4f86\u8d8a\u591a\uff0c\u800c\u8b49\u64da\u5c31\u5728\u5b89\u5168\u8b66\u793a\u8da8\u52e2\u7684\u5206\u6790\u4e2d\u3002\u6700\u8fd1\u7684\u7814\u7a76\u986f\u793a\uff0c\u7d44\u7e54\u5728 2024 \u5e74\u5e95\u6536\u5230\u7684\u6bcf\u65e5\u96f2\u7aef\u8b66\u793a\u6578\u91cf\u662f\u5e74\u521d\u7684\u4e94\u500d\u5de6\u53f3\u3002\u9019\u8868\u793a\u653b\u64ca\u8005\u5df2\u5927\u5e45\u52a0\u5f37\u5c0d\u96f2\u7aef\u57fa\u790e\u67b6\u69cb\u7684\u653b\u64ca\u3002<\/p>\n<p>\u9019\u4e9b\u8b66\u793a\u4e26\u975e\u53ea\u662f\u566a\u97f3\u3002\u5982\u8868 1 \u6240\u8ff0\uff0c\u6211\u5011\u770b\u5230\u9ad8\u56b4\u91cd\u5ea6\u8b66\u793a\u7684\u589e\u52a0\u5e45\u5ea6\u6700\u5927\uff0c\u9019\u4ee3\u8868\u8457\u653b\u64ca\u6307\u6a19\u6210\u529f\u7784\u6e96\u95dc\u9375\u7684\u96f2\u7aef\u8cc7\u6e90\u3002<\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><b>\u96f2\u7aef\u8cc7\u6e90<\/b><\/td>\n<td style=\"text-align: center;\"><b>\u70ba\u4ec0\u9ebc\u9019\u5f88\u91cd\u8981<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\u8eab\u5206\u8207\u5b58\u53d6\u7ba1\u7406 (IAM, Identify and Access Management)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">L\u6d29\u6f0f\u7684\u6191\u8b49\u53ef\u80fd\u6703\u6253\u958b\u7d44\u7e54\u96f2\u7aef\u57fa\u790e\u67b6\u69cb\u7684\u5927\u9580\u3002<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\u5132\u5b58<\/span><\/td>\n<td><span style=\"font-weight: 400;\">\u53ef\u80fd\u5305\u542b\u654f\u611f\u7684\u7d44\u7e54\u6216\u5ba2\u6236\u8cc7\u6599\u3002<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\u865b\u64ec\u4e3b\u6a5f<\/span><\/td>\n<td><span style=\"font-weight: 400;\">\u901a\u5e38\u8207\u5176\u4ed6\u5167\u90e8\u670d\u52d9\u76f8\u9023\uff0c\u63d0\u4f9b\u653b\u64ca\u8005\u6a6b\u5411\u79fb\u52d5\u7684\u6a5f\u6703\u3002<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\u5bb9\u5668 (Container)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">\u5bb9\u5668\u4e3b\u6a5f\u6feb\u7528\u53ef\u8b93\u653b\u64ca\u8005\u57f7\u884c\u60e1\u610f\u5bb9\u5668\u3002<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\u7121\u4f3a\u670d\u5668\u67b6\u69cb \uff08Serverless\uff09<\/span><\/td>\n<td><span style=\"font-weight: 400;\">\u7121\u4f3a\u670d\u5668\u529f\u80fd\u5c08\u70ba\u55ae\u4e00\u81ea\u52d5\u5316\u76ee\u7684\u800c\u8a2d\u8a08\u3002\u9060\u7aef\u547d\u4ee4\u5217\u57f7\u884c\u4e0d\u61c9\u767c\u751f\u3002<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u8868 1.\u67d0\u4e9b\u96f2\u7aef\u8cc7\u6e90\u7684\u95dc\u9375\u6027\u3002<\/p>\n<p>\u7279\u5225\u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c\u653b\u64ca\u8005\u7d93\u5e38\u4ee5\u7121\u4f3a\u670d\u5668\u904b\u7b97\u67b6\u69cb\u7684 IAM \u6b0a\u6756\u505a\u70ba\u653b\u64ca\u76ee\u6a19\uff0c\u5c0e\u81f4\u9060\u7aef\u547d\u4ee4\u5217\u7684\u6feb\u7528\u3002\u9019\u4e9b\u90fd\u5f88\u91cd\u8981\uff0c\u56e0\u70ba\u5176\u53ef\u7528\u65bc\u5b58\u53d6\u7d44\u7e54\u7684\u5927\u578b\u96f2\u7aef\u74b0\u5883\u3002\u4f5c\u70ba\u96f2\u7aef\u8b66\u793a\u589e\u52a0\u7684\u4e00\u90e8\u5206\uff0c\u5229\u7528\u8eab\u4efd\u5b58\u53d6\u8207\u7ba1\u7406\u6b0a\u6756 (IAM tokens) \u4ee4\u724c\u4ee5\u53ca\u96f2\u7aef\u7121\u4f3a\u670d\u5668\u529f\u80fd(serverless functions)\u6240\u4f7f\u7528\u7684\u6191\u8b49\u7684\u9060\u7aef\u547d\u4ee4\u5217\u5b58\u53d6\u4e8b\u4ef6\u6578\u91cf\u589e\u52a0\u4e09\u500d\u3002<\/p>\n<p>\u6211\u5011\u9084\u767c\u73fe\u4e86\u8b66\u5831\u7684\u5176\u4ed6\u4e0a\u5347\u8da8\u52e2\uff1a<\/p>\n<ul>\n<li>\u57fa\u65bc IAM \u7684\u300c\u4e0d\u53ef\u80fd\u7684\u65c5\u884c\u4e8b\u4ef6\uff08impossible travel event\uff09\u300d\u8b66\u793a\u589e\u52a0 116%\uff08\u5373\u5728\u77ed\u6642\u9593\u5167\uff0c\u7a81\u7136\u5f9e\u9059\u9060\u5730\u7406\u5340\u57df\u7684\u767b\u5165\u4e8b\u4ef6\uff09<\/li>\n<li>\u4f86\u81ea\u5916\u90e8\u5340\u57df\u7684 IAM \u61c9\u7528\u7a0b\u5f0f\u4ecb\u9762 (API) \u8a08\u7b97\u8cc7\u6e90\uff08\u96f2\u7aef\u865b\u64ec\u6a5f\u5668\uff09\u8acb\u6c42\u589e\u52a0 60%<\/li>\n<li>2024 \u5e74 11 \u6708\u671f\u9593\uff0c\u96f2\u7aef\u5feb\u7167\uff08cloud snapshot\uff09\u8f38\u51fa\u6578\u91cf\u7684\u5cf0\u503c\u589e\u52a0 45%<\/li>\n<li>\u591a\u500b\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u7684\u53ef\u7591\u4e0b\u8f09\u6578\u91cf\u589e\u52a0 305%<\/li>\n<\/ul>\n<p>\u8eab\u4efd\u662f\u96f2\u7aef\u57fa\u790e\u67b6\u69cb\u7684\u9632\u79a6\u908a\u754c\u3002\u653b\u64ca\u8005\u7684\u76ee\u6a19\u662f IAM \u6b0a\u6756\u548c\u6191\u8b49\uff0c\u56e0\u70ba\u5176\u638c\u63e1\u8457\u96f2\u7aef\u738b\u570b\u7684\u9470\u5319\uff0c\u8b93\u653b\u64ca\u8005\u53ef\u4ee5\u6a6b\u5411\u79fb\u52d5\u3001\u5347\u7d1a\u6b0a\u9650\u4e26\u57f7\u884c\u5176\u4ed6\u60e1\u610f\u64cd\u4f5c\u3002\u9ad8\u5ea6\u6a5f\u5bc6 IAM \u670d\u52d9\u5e33\u6236\u7684\u5b58\u53d6\u5617\u8a66\u548c\u4f7f\u7528\u91cf\u589e\u52a0\uff0c\u4ee3\u8868\u8457\u5168\u7403\u7684\u653b\u64ca\u8005\u90fd\u5c07\u4ed6\u5011\u7684\u64da\u9ede\u8a2d\u7f6e\u5728\u96f2\u7aef\u8cc7\u6e90\u4e0a\u3002<\/p>\n<p>\u653b\u64ca\u8005\u7684\u76ee\u6a19\u662f\u96f2\u7aef\u5132\u5b58\u670d\u52d9\uff0c\u56e0\u70ba\u9019\u4e9b\u670d\u52d9\u901a\u5e38\u5305\u542b\u654f\u611f\u8cc7\u6599\u3002\u6211\u5011\u767c\u73fe\u53ef\u7591\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u4e0b\u8f09\u548c\u5f71\u50cf\u5feb\u7167\u532f\u51fa\u7684\u6b21\u6578\u660e\u986f\u589e\u52a0\u3002\u7576\u55ae\u4e00\u57fa\u65bc IAM \u7684\u8eab\u5206\u5728\u77ed\u6642\u9593\u5167\u4e0b\u8f09\u5927\u91cf\u5132\u5b58\u7269\u4ef6\u6642\uff0c\u4fbf\u6703\u89f8\u767c\u53ef\u7591\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u4e0b\u8f09\u8b66\u793a\u3002\u9019\u53ef\u80fd\u4ee3\u8868\u60e1\u610f\u6d3b\u52d5\uff0c\u4f8b\u5982\u52d2\u7d22\u8edf\u9ad4\u6216\u6572\u8a50\u6d3b\u52d5\u3002\u6620\u50cf\u5feb\u7167\u662f\u653b\u64ca\u8005\u7684\u76ee\u6a19\uff0c\u56e0\u70ba\u5feb\u7167\u53ef\u80fd\u5305\u542b\u96f2\u7aef\u57fa\u790e\u67b6\u69cb\u548c IAM \u8a8d\u8b49\u7684\u654f\u611f\u8cc7\u6599\uff0c\u53ef\u8b93\u653b\u64ca\u8005\u63d0\u5347\u6b0a\u9650\uff0c\u4e26\u5728\u53d7\u5bb3\u8005\u96f2\u7aef\u74b0\u5883\u4e2d\u6a6b\u5411\u79fb\u52d5\u3002<\/p>\n<p>\u9019\u4e9b\u7bc4\u4f8b\u8aaa\u660e\u4fdd\u8b77\u96f2\u7aef\u74b0\u5883\u7684\u8feb\u5207\u9700\u6c42\uff0c\u4e0d\u50c5\u8981\u4f7f\u7528\u57fa\u790e\u96f2\u7aef\u5b89\u5168\u52e2\u614b\u7ba1\u7406 (CSPM) \u5de5\u5177\uff0c\u9084\u8981\u8207\u5075\u6e2c\u548c\u9810\u9632\u60e1\u610f\u57f7\u884c\u6642\u4f5c\u696d\u7684\u5de5\u5177\u5408\u4f5c\u3002<\/p>\n<p>\u900f\u904e\u90e8\u7f72 Cortex Cloud \u7684\u57f7\u884c\u6642\u9593\u96f2\u7aef\u5b89\u5168\u5de5\u5177\u2014\u4e5f\u7a31\u70ba\u96f2\u7aef\u5075\u6e2c\u548c\u56de\u61c9 (<a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-cloud-detection-and-response-cdr\" target=\"_blank\" rel=\"noopener\">CDR<\/a>)\uff0c\u5b89\u5168\u5718\u968a\u53ef\u4ee5\u8b58\u5225\u548c\u9632\u6b62\u96f2\u7aef\u74b0\u5883\u4e2d\u7684\u60e1\u610f\u4e8b\u4ef6\u3002<\/p>\n<p>\u5982\u679c\u60a8\u8a8d\u70ba\u81ea\u5df1\u53ef\u80fd\u5df2\u53d7\u5230\u653b\u64ca\u6216\u6709\u7dca\u6025\u60c5\u6cc1\uff0c\u8acb\u806f\u7d61 <a href=\"https:\/\/start.paloaltonetworks.com\/contact-unit42.html\" target=\"_blank\" rel=\"noopener\">\u7b2c 42 \u55ae\u5143\u4e8b\u4ef6\u56de\u61c9\u5c0f\u7d44<\/a>.\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.rsqmsnew3ys6\"><\/a>\u898f\u6a21\u5316\u7684\u96f2\u7aef\u653b\u64ca<\/h2>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/large-scale-cloud-extortion-operation\/\" target=\"_blank\" rel=\"noopener\">\u5728\u6700\u8fd1\u7684 Unit 42 \u8cbc\u6587\u4e2d<\/a>\uff0c\u6211\u5011\u516c\u4f48\u76f4\u63a5\u91dd\u5c0d\u66b4\u9732\u7684\u74b0\u5883\u8b8a\u6578\u6a94\u6848\u7684\u52d2\u7d22\u8edf\u9ad4\u548c\u6572\u8a50\u6d3b\u52d5\u7684\u8a73\u7d30\u8cc7\u8a0a\u3002\u8a72\u653b\u64ca\u6d3b\u52d5\u7684\u5a01\u8105\u4e3b\u52d5\u8005\u5f9e 110,000 \u500b\u76ee\u6a19\u7db2\u57df\u4e2d\u6210\u529f\u53d6\u5f97\u8d85\u904e 90,000 \u500b\u6191\u8b49\u3002\u66f4\u4ee4\u4eba\u64d4\u5fc3\u7684\u662f\uff0c\u4ed6\u5011\u9084\u64f7\u53d6\u8fd1 1,200 \u500b\u96f2\u7aef IAM \u8a8d\u8b49\u3002\u9019\u4e9b\u6191\u8b49\u53ef\u8b93\u5a01\u8105\u8005\u6210\u529f\u5c0d\u591a\u500b\u7d44\u7e54\u57f7\u884c\u52d2\u7d22\u653b\u64ca\u3002<\/p>\n<p>\u9019\u9805\u4f5c\u696d\u7a81\u986f\u8a0e\u8ad6\u4fdd\u8b77\u7d44\u7e54\u7684\u5b89\u5168\u6a5f\u5236\u7684\u6a5f\u6703\u3002\u5177\u9ad4\u4f86\u8aaa\uff0c\u9019\u53ef\u8b93\u6211\u5011\u6c7a\u5b9a\u5982\u4f55\u7121\u7e2b\u63a1\u7528\u52e2\u614b\u7ba1\u7406\uff08posture management\uff09\u548c\u57f7\u884c\u6642\u76e3\u63a7\uff08runtime monitoring\uff09\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\u3002\u9019\u53ef\u8b93\u7d44\u7e54\u5efa\u7acb\u8db3\u5920\u5f37\u5927\u7684\u96f2\u7aef\u5b89\u5168\u9632\u79a6\u5468\u908a\uff0c\u4e26\u6709\u80fd\u529b\u9762\u5c0d\u9019\u4e9b\u65b0\u4e00\u6ce2\u7684\u653b\u64ca\u8005\u3002<\/p>\n<p>\u5728\u672c\u7bc7\u6587\u7ae0\u7684\u8abf\u67e5\u904e\u7a0b\u4e2d\uff0c\u6211\u5011\u767c\u73fe\u7d44\u7e54\u5728 2024 \u5e74\u6240\u906d\u9047\u7684\u96f2\u7aef\u8b66\u793a\u5e73\u5747\u7e3d\u6578\u589e\u52a0 388%\u3002\u9019\u4e9b\u8b66\u793a\u4f86\u6e90\u65bc\u52e2\u614b\u7ba1\u7406\u548c\u57f7\u884c\u6642\u76e3\u63a7\u5075\u6e2c\u4f5c\u696d\u3002<\/p>\n<p>\u96d6\u7136\u300c\u8cc7\u8a0a\u985e\u300d\u56b4\u91cd\u6027\u7684\u8b66\u5831\u4f54\u8b66\u793a\u7684\u5927\u591a\u6578\uff0c\u4f46\u6700\u76f4\u5f97\u6ce8\u610f\u7684\u8b8a\u5316\u662f\u9ad8\u5ea6\u56b4\u91cd\u6027\u8b66\u5831\u7684\u6578\u91cf\u3002\u6b64\u985e\u8b66\u5831\u5728 2024 \u5e74\u9593\u589e\u52a0 235%\u3002\u4e2d\u5ea6\u548c\u4f4e\u5ea6\u8b66\u793a\u4e5f\u5206\u5225\u589e\u52a0 21% \u548c 10%\u3002<\/p>\n<h3><a id=\"post-147542-_heading=h.w17z9ir0whf\"><\/a>\u9019\u4e9b\u8da8\u52e2\u8b66\u793a\u4ee3\u8868\u4ec0\u9ebc<\/h3>\n<p>\u6211\u5011\u89c0\u5bdf\u5230\u7684\u8b66\u793a\u6578\u91cf\u7684\u8b8a\u5316\u8207\u6211\u5011\u7684\u300a<a href=\"https:\/\/www.paloaltonetworks.com\/state-of-cloud-native-security\" target=\"_blank\" rel=\"noopener\">2024 \u5e74\u96f2\u7aef\u539f\u751f\u5b89\u5168\u72c0\u6cc1\u5831\u544a<\/a>\u300b\u4e00\u81f4\uff0c\u8a72\u5831\u544a\u767c\u73fe 71% \u7684\u7d44\u7e54\u5c07\u6f0f\u6d1e\u66b4\u9732\u7684\u589e\u52a0\u6b78\u56e0\u65bc\u5feb\u901f\u90e8\u7f72\u3002\u6b64\u5916\uff0c\u9019\u4e9b\u7d44\u7e54\u4e2d\u6709 45% \u8868\u793a\u5148\u9032\u6301\u7e8c\u6027\u5a01\u8105 (APT) \u653b\u64ca\u5728\u53bb\u5e74\u6709\u6240\u4e0a\u5347\u3002<\/p>\n<p>\u5fae\u8edf\u6700\u8fd1\u5c0d Storm-2077 \u7684\u7814\u7a76\u5c31\u662f\u4e00\u500b\u5f88\u597d\u7684\u4f8b\u5b50\uff0c<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/22\/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon\/\" target=\"_blank\" rel=\"noopener\">Storm-2077<\/a> \u662f\u4e00\u500b\u7e3d\u90e8\u4f4d\u65bc\u4e2d\u570b\u7684\u96f2\u7aef\u653b\u64ca\u7d44\u7e54 (CTAG)\uff0c\u5176\u63a1\u7528\u8907\u96dc\u7684\u96f2\u7aef IAM \u6191\u8b49\u6536\u96c6\u6280\u8853\u4f86\u53d6\u5f97\u4e26\u7dad\u6301\u53d7\u5bb3\u96f2\u7aef\u74b0\u5883\u7684\u5b58\u53d6\u6b0a\u9650\u3002\u4f46\u5f88\u5feb\u5c31\u767c\u73fe\uff0c\u96f2\u7aef\u52e2\u614b\u7ba1\u7406\u548c\u57f7\u884c\u6642\u5b89\u5168\u76e3\u63a7\u5fc5\u9808\u4f5c\u70ba\u55ae\u4e00\u904b\u4f5c\u55ae\u4f4d\uff0c\u624d\u80fd\u5728\u96f2\u7aef\u74b0\u5883\u4e2d\u91dd\u5c0d\u4e0b\u4e00\u968e\u6bb5\u7684\u5a01\u8105\u57f7\u884c\u8db3\u5920\u7684\u9632\u8b77\u3002\u4e0b\u9762\u7684\u80cc\u666f\u8cc7\u6599\u63d0\u4f9b\u6709\u95dc\u614b\u52e2\u7ba1\u7406\u548c\u57f7\u884c\u6642\u76e3\u63a7\u5075\u6e2c\u7684\u66f4\u591a\u8cc7\u8a0a\u3002<\/p>\n<p>\u96f2\u7aef\u9632\u885b\u8005\u7684\u4e00\u9805\u91cd\u8981\u4efb\u52d9\u662f\u8a2d\u8a08\u548c\u90e8\u7f72\u53ef\u63d0\u5347\u5075\u6e2c\u80fd\u529b\u7684\u96f2\u7aef\u5b89\u5168\u5e73\u53f0\u3002\u9019\u4e0d\u50c5\u53ef\u8b93\u7ba1\u7406\u54e1\u5075\u6e2c\u932f\u8aa4\u914d\u7f6e\u548c\u5f31\u9ede\uff0c\u9084\u53ef\u6536\u96c6\u548c\u5206\u6790\u96f2\u7aef\u74b0\u5883\u5167\u7684\u57f7\u884c\u6642\u4e8b\u4ef6\u3002\u9019\u6a23\u7684\u5e73\u53f0\u53ef\u70ba\u7db2\u8def\u9632\u79a6\u4eba\u54e1\u63d0\u4f9b\u66f4\u4f73\u7684\u53ef\u8996\u6027\uff0c\u4e26\u5728\u8655\u7406\u8b66\u793a\u6642\u63d0\u4f9b\u66f4\u5feb\u7684\u56de\u61c9\u6642\u9593\u3002<\/p>\n<p>\u5118\u7ba1\u8b58\u5225\u548c\u5075\u6e2c\u60e1\u610f\u6216\u53ef\u7591\u96f2\u7aef\u4e8b\u4ef6\u7684\u80fd\u529b\u5df2\u5728\u6574\u500b\u7522\u696d\u4e2d\u63d0\u5347\uff0c\u4f46\u5a01\u8105\u4efd\u5b50\u653b\u64ca\u6027\u96f2\u7aef\u4f5c\u696d\u7684\u8907\u96dc\u6027\u4e5f\u96a8\u4e4b\u589e\u52a0\u3002\u8209\u4f8b\u4f86\u8aaa\uff0c\u5728 2024 \u5e74 1 \u6708\uff0c\u4e00\u822c\u7684\u96f2\u7aef\u74b0\u5883\u53ea\u770b\u898b\u5169\u500b\u7121\u4f3a\u670d\u5668\u529f\u80fd IAM \u6b0a\u6756\u9060\u7aef\u547d\u4ee4\u5217\u4f7f\u7528\u7684\u8b66\u793a\u3002\u9019\u4e00\u9ede\u5728\u5168\u5e74\u90fd\u4fdd\u6301\u4e00\u81f4\u3002\u7136\u800c\uff0c\u5230\u4e86 2024 \u5e74 12 \u6708\uff0c\u4e00\u822c\u7684\u96f2\u7aef\u74b0\u5883\u6703\u770b\u5230\u8d85\u904e 200 \u500b\u76f8\u540c\u7684\u8b66\u793a - \u9019\u662f\u4e00\u500b\u4ee4\u4eba\u64d4\u5fc3\u7684\u6d3b\u52d5\u589e\u52a0\u8a0a\u865f\u3002 \u6b63\u5982\u300a<a href=\"https:\/\/unit42.paloaltonetworks.com\/large-scale-cloud-extortion-operation\/\" target=\"_blank\" rel=\"noopener\">\u6d29\u6f0f\u7684\u74b0\u5883\u8b8a\u6578<\/a>\u300b\u6587\u7ae0\u4e2d\u6240\u5206\u4eab\u7684\uff0c\u9019\u500b\u57f7\u884c\u968e\u6bb5\u64cd\u4f5c\u6b63\u662f\u5728\u90a3\u6b21\u60e1\u610f\u52d2\u7d22\u4e8b\u4ef6\u4e2d\u767c\u751f\u7684\u3002<\/p>\n<p>\u652f\u6301\u9019\u7a2e\u8da8\u52e2\u7684\u9032\u4e00\u6b65\u8b49\u64da\u5305\u62ec\u4ee5\u4e0b\u5e7e\u9ede\uff1a<\/p>\n<ul>\n<li>\u8207\u96f2\u7aef\u8eab\u5206\u76f8\u95dc\u7684\u4e0d\u53ef\u80fd\u65c5\u904a\u8b66\u793a\u589e\u52a0 116\uff05<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-workload\" target=\"_blank\" rel=\"noopener\">\u8a08\u7b97\u5de5\u4f5c\u8ca0\u8f09<\/a> \u5f9e\u8a72\u5be6\u4f8b\u7684\u96f2\u7aef\u5340\u57df\u4ee5\u5916\u767c\u751f\u7684 API \u547c\u53eb\u6578\u91cf\u589e\u52a0 60%\u3002<\/li>\n<li>\u96f2\u7aef\u5feb\u7167\u532f\u51fa\u6578\u91cf\u589e\u52a0 45\uff05<\/li>\n<li>\u591a\u500b\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u7684\u53ef\u7591\u4e0b\u8f09\u6578\u91cf\u589e\u52a0 305\uff05<\/li>\n<\/ul>\n<p>\u9019\u5169\u9805\u8b66\u793a\u7d50\u679c\u90fd\u5f37\u70c8\u986f\u793a CTAG \u7684\u9996\u8981\u76ee\u6a19\u662f\u7784\u6e96\u3001\u6536\u96c6\u548c\u4f7f\u7528\u96f2\u7aef IAM \u6b0a\u6756\u6216\u6191\u8b49\u3002\u9019\u4e5f\u8868\u793a\u653b\u64ca\u8005\u6703\u4f7f\u7528\u9019\u4e9b\u6b0a\u6756\u6216\u6191\u8b49\u9032\u884c\u6f5b\u5728\u7684\u60e1\u610f\u64cd\u4f5c\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.m4fahtw9z0hq\"><\/a>\u80cc\u666f\u8cc7\u6599<\/h2>\n<p>\u96f2\u7aef\u5b89\u5168\u614b\u52e2\u7ba1\u7406 (<a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-cloud-security-posture-management\" target=\"_blank\" rel=\"noopener\">CSPM<\/a>) \u5de5\u5177\u69cb\u6210\u96f2\u7aef\u5b89\u5168\u6027\u7684\u57fa\u790e\u3002\u4ed6\u5011\u7684\u4f5c\u696d\u4e2d\u5fc3\u5728\u65bc\u8b77\u6b04\u63a7\u5236\u76e3\u63a7\uff0c\u4ee5\u78ba\u4fdd\u96f2\u7aef\u74b0\u5883\u80fd\u7dad\u6301\u5b89\u5168\u7684\u7d44\u614b\uff0c\u4e26\u907f\u514d\u6f0f\u6d1e\u548c\u932f\u8aa4\u7d44\u614b\u3002<\/p>\n<p>\u52e2\u614b\u7ba1\u7406\u76e3\u63a7\u50b3\u7d71\u4e0a\u662f\u4ee5\u7279\u5b9a\u6642\u9593\u7684\u96f2\u7aef\u74b0\u5883\u8cc7\u6e90\u8207\u7d44\u614b\u5b89\u5168\u6383\u63cf\u70ba\u57fa\u790e\u3002\u7576\u65b0\u7684\u6216\u4fee\u6539\u904e\u7684\u96f2\u7aef\u8cc7\u6e90\u51fa\u73fe\u6f5b\u5728\u5b89\u5168\u98a8\u96aa\u6642\uff0c\u5c31\u6703\u89f8\u767c\u8b66\u5831\u3002<\/p>\n<p>\u4f8b\u5982\uff0c\u5982\u679c IAM \u653f\u7b56\u904e\u5ea6\u653e\u4efb\uff0c\u5141\u8a31\u5b58\u53d6\u5176\u4ed6\u96f2\u7aef\u8cc7\u6e90\uff0c\u5c31\u6703\u89f8\u767c\u8b66\u5831\u3002\u5982\u679c\u96f2\u8a08\u7b97\u5be6\u9ad4\u6216\u7121\u4f3a\u670d\u5668\u529f\u80fd\u5305\u542b\u6f0f\u6d1e\u6216\u932f\u8aa4\u914d\u7f6e\uff0c\u4e5f\u6703\u89f8\u767c\u3002<\/p>\n<p>\u59ff\u52e2\u7ba1\u7406\u6383\u63cf\u4f5c\u696d\u61c9\u8a72\u662f\u4f8b\u884c\u6027\u7684\uff0c\u901a\u5e38\u6bcf\u5c0f\u6642\u6216\u6bcf\u5929\u57f7\u884c\u4e00\u6b21\u3002\u6709\u4e9b CSPM \u5b89\u5168\u5de5\u5177\u4e5f\u5141\u8a31\u76e3\u63a7\u96f2\u7aef\u5e73\u53f0\u7a3d\u6838\u8a18\u9304\uff0c\u9019\u6709\u52a9\u65bc\u5075\u6e2c\u96f2\u7aef\u670d\u52d9\u5e73\u53f0 (CSP) \u4e2d\u767c\u751f\u7684\u53ef\u7591\u6d3b\u52d5\u3002\u7d44\u7e54\u5fc5\u9808\u8a2d\u5b9a\u5176 CSPM \u5e73\u53f0\uff0c\u4ee5\u6536\u96c6\u4f86\u81ea\u7b2c\u4e09\u65b9\u96f2\u7aef\u8edf\u9ad4\u5373\u670d\u52d9 (SaaS) \u61c9\u7528\u7a0b\u5f0f\u7684\u7a3d\u6838\u8a18\u9304\uff0c\u4ee5\u78ba\u4fdd\u53ef\u8996\u6027\u3002<\/p>\n<p>CDR \u5de5\u5177\u900f\u904e\u6536\u96c6\u3001\u8b58\u5225\u751a\u81f3\u963b\u6b62\u7279\u5b9a\u4e8b\u4ef6\u4e2d\u767c\u751f\u7684\u4f5c\u696d\uff0c\u63d0\u4f9b\u57f7\u884c\u6642\u76e3\u63a7\u5075\u6e2c\u3002\u900f\u904e\u6536\u96c6\u4f86\u81ea\u96f2\u7aef\u904b\u7b97\u5be6\u9ad4\u3001CSP \u8a18\u9304\u8cc7\u6e90\u53ca\u7b2c\u4e09\u65b9\u96f2\u7aef SaaS \u61c9\u7528\u7a0b\u5f0f\u7684\u8a18\u9304\uff0cCDR \u5b89\u5168\u5de5\u5177\u53ef\u8fa8\u8b58\u3001\u8b66\u793a\u53ca\u9810\u9632\u60e1\u610f\u7684\u96f2\u7aef\u4e8b\u4ef6\u3002<\/p>\n<p>\u9019\u4e9b\u4f5c\u696d\u7684\u7bc4\u4f8b\u5305\u62ec\u91dd\u5c0d\u96f2\u5e73\u53f0\u6216\u96f2\u61c9\u7528\u7a0b\u5f0f\u57f7\u884c API \u8acb\u6c42\uff0c\u4f8b\u5982<\/p>\n<ul>\n<li>\u5efa\u7acb\u65b0\u7684\u96f2\u7aef\u4f7f\u7528\u8005\u6216\u670d\u52d9\u5e33\u865f<\/li>\n<li>\u70ba\u65b0\u7684\u6216\u5df2\u5efa\u7acb\u7684 IAM \u4f7f\u7528\u8005\u6216\u89d2\u8272\u9644\u52a0 IAM \u653f\u7b56<\/li>\n<li>\u5f9e Tor \u51fa\u53e3\u7bc0\u9ede\u6216 VPN \u4e3b\u6a5f\u5efa\u7acb\u7db2\u8def\u9023\u7dda<\/li>\n<\/ul>\n<p>\u76f8\u8f03\u65bc\u52e2\u614b\u7ba1\u7406\u5de5\u5177\uff0c\u904b\u884c\u6642\u76e3\u63a7\u5de5\u5177\u6703\u6301\u7e8c\u76e3\u63a7\u96f2\u7aef\u74b0\u5883\uff0c\u4e26\u4e14\u901a\u5e38\u9700\u8981\u5c08\u7528\u4ee3\u7406\u7a0b\u5f0f\u4f86\u7dad\u6301\u96f2\u7aef\u8cc7\u6e90\u7684\u53ef\u898b\u6027\u3002\u5b89\u88dd\u4ee3\u7406\u7a0b\u5f0f\u5f8c\uff0c\u96f2\u7aef\u57f7\u884c\u6642\u9593\u76e3\u63a7\u5b89\u5168\u5de5\u5177\u53ef\u5728\u60e1\u610f\u96f2\u7aef\u4f5c\u696d\u767c\u751f\u6642\u57f7\u884c\u5075\u6e2c\u52d5\u4f5c (\u751a\u81f3\u9810\u9632)\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.jdxv9b6mcv2\"><\/a>\u9ad8\u56b4\u91cd\u6027\u8b66\u5831\u8da8\u52e2<\/h2>\n<p>\u6211\u5011\u89c0\u5bdf\u5230 2024 \u5e74\u7684\u8b66\u793a\u6578\u91cf\u660e\u986f\u589e\u52a0\uff0c\u8207\u96f2\u7aef\u74b0\u5883\u7684\u653b\u64ca\u589e\u52a0\u76f8\u95dc\u3002<\/p>\n<p>\u5728\u6574\u500b 2024 \u5e74\uff0c\u9ad8\u5ea6\u56b4\u91cd\u7684\u96f2\u7aef\u8b66\u793a\u589e\u52a0 235%\u3002\u6700\u5927\u7684\u55ae\u6708\u5cf0\u503c (281%) \u767c\u751f\u5728 5 \u6708\uff0c\u6211\u5011\u6ce8\u610f\u5230\u9019\u4e9b\u8b66\u793a\u5728 8 \u6708\u300110 \u6708\u548c 12 \u6708\u6709\u6700\u5927\u5e45\u5ea6\u7684\u589e\u52a0 (204%\u3001247% \u548c 122%)\uff0c\u5982\u5716 1 \u6240\u793a\u3002<\/p>\n<figure id=\"attachment_147543\" aria-describedby=\"caption-attachment-147543\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img  class=\"wp-image-147543 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-7.png\" alt=\"Chart\" width=\"1000\" height=\"504\" srcset=\"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-7.png 2048w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-7-786x396.png 786w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-7-1389x700.png 1389w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-7-768x387.png 768w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-7-1536x774.png 1536w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-147543\" class=\"wp-caption-text\">\u5716 1.2024 \u5e74\u9ad8\u5ea6\u56b4\u91cd\u8b66\u544a\u8da8\u52e2\u3002<\/figcaption><\/figure>\n<h3><a id=\"post-147542-_heading=h.r9wqlklitibd\"><\/a>\u5341\u5927\u9ad8\u5ea6\u8b66\u793a<\/h3>\n<p>\u4ed4\u7d30\u89c0\u5bdf\u524d 10 \u500b\u6700\u5e38\u767c\u751f\u7684\u6bcf\u65e5\u9ad8\u56b4\u91cd\u6027\u8b66\u793a\uff0c\u53ef\u4ee5\u767c\u73fe\u6709\u8a31\u591a\u8b66\u793a\u50c5\u8207\u4ee5\u57f7\u884c\u6642\u9593\u70ba\u91cd\u9ede\u7684\u4e8b\u4ef6\u6709\u95dc\u3002\u9019\u4e9b\u8b66\u5831\u7531\u55ae\u4e00\u4e8b\u4ef6\u6216\u4e00\u9023\u4e32\u76f8\u95dc\u4e8b\u4ef6\u89f8\u767c\u3002\u9019\u9700\u8981\u8fd1\u4e4e\u5373\u6642\u7684\u5206\u6790\uff0c\u6216\u8005\u5728\u67d0\u4e9b\u60c5\u6cc1\u4e0b\uff0c\u9700\u8981\u5373\u6642\u5206\u6790\u4f86\u9032\u884c\u6aa2\u6e2c\u3002<\/p>\n<p>\u4e0b\u9762\u7684\u8868 2 \u986f\u793a\uff0c\u7121\u4f3a\u670d\u5668 IAM \u6b0a\u6756\uff08Serverless IAM tokens\uff09\u7684\u9060\u7aef\u547d\u4ee4\u5217\u4f7f\u7528\u662f\u9700\u8981\u5373\u6642\u65e5\u8a8c\u5206\u6790\u624d\u80fd\u5075\u6e2c\u4e26\u53ef\u80fd\u9810\u9632\u7684\u4e8b\u4ef6\u3002\u76f8\u53cd\u5730\uff0c\u6700\u5e38\u767c\u751f\u7684\u9ad8\u56b4\u91cd\u6027\u8b66\u793a\u300c\u96f2\u7aef\u5132\u5b58\u522a\u9664\u4fdd\u8b77\u5df2\u505c\u7528\u300d\uff0c\u5247\u53ef\u900f\u904e CSPM \u5de5\u5177\u5075\u6e2c\u4e26\u52a0\u4ee5\u7de9\u89e3\u3002<\/p>\n<p>&nbsp;<\/p>\n<table style=\"width: 91.0231%;\">\n<tbody>\n<tr>\n<td style=\"width: 59.0764%;\"><strong>\u8b66\u5831\u540d\u7a31<\/strong><\/td>\n<td style=\"width: 23.4076%;\"><strong>\u904b\u884c\u6642\u9593\u6216\u59ff\u52e2\u63a7\u5236<\/strong><\/td>\n<td style=\"width: 79.1401%;\"><strong>\u6bcf\u65e5\u5e73\u5747\u8a08\u6578<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u7121\u4f3a\u670d\u5668\u4ee3\u78bc\u7684\u9060\u7aef\u547d\u4ee4\u5217\u7528\u6cd5<\/td>\n<td style=\"width: 23.4076%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">24.68<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u4e00\u500b\u8eab\u5206\u57f7\u884c\u4e86\u591a\u500b\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u7684\u53ef\u7591\u4e0b\u8f09<\/td>\n<td style=\"width: 23.4076%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">21.09<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u96f2\u7aef\u5132\u5b58\u522a\u9664\u4fdd\u8b77\u5df2\u505c\u7528<\/td>\n<td style=\"width: 23.4076%;\">\u614b\u52e2\u548c\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">20.19<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u5927\u91cf\u5340\u57df\u7684\u904b\u7b97\u8cc7\u6e90\u5206\u914d\u7570\u5e38<\/td>\n<td style=\"width: 23.4076%;\">\u614b\u52e2\u548c\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">11.11<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u5f9e\u975e\u96f2\u7aef IP \u5728\u7fa4\u96c6\u5916\u4f7f\u7528 Kubernetes \u7bc0\u9ede\u670d\u52d9\u5e33\u865f<\/td>\n<td style=\"width: 23.4076%;\">\u614b\u52e2<\/td>\n<td style=\"width: 79.1401%;\">11<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u7570\u5e38 \u5728\u591a\u500b\u5340\u57df\u5206\u914d\u53ef\u7591\u7684\u904b\u7b97\u8cc7\u6e90<\/td>\n<td style=\"width: 23.4076%;\">\u614b\u52e2\u548c\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">10<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u532f\u51fa\u591a\u500b\u96f2\u7aef\u5feb\u7167<\/td>\n<td style=\"width: 23.4076%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">9.33<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u7121\u4f3a\u670d\u5668\u89d2\u8272\u7684\u9060\u7aef\u547d\u4ee4\u5217\u7528\u6cd5<\/td>\n<td style=\"width: 23.4076%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">7.79<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u591a\u500b\u96f2\u7aef\u904b\u7b97\u8cc7\u6e90\u7684\u4e0d\u5c0b\u5e38\u5206\u914d<\/td>\n<td style=\"width: 23.4076%;\">\u614b\u52e2\u548c\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">7.73<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 59.0764%;\">\u7570\u5e38 \u591a\u500b\u5340\u57df\u7684\u904b\u7b97\u8cc7\u6e90\u5206\u914d\u7570\u5e38<\/td>\n<td style=\"width: 23.4076%;\">\u614b\u52e2\u548c\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 79.1401%;\">6.42<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u8868 2.\u9ad8\u56b4\u91cd\u6027\u8b66\u793a\u4ee5\u5e73\u5747\u767c\u751f\u7387\u70ba\u6e96\u3002<\/p>\n<p>\u70ba\u4e86\u78ba\u4fdd\u5df2\u505c\u7528\u522a\u9664\u4fdd\u8b77\u7684\u5132\u5b58\u5bb9\u5668\u5167\u7684\u96f2\u5132\u5b58\u7269\u4ef6\u53d7\u5230\u4fdd\u8b77\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u90e8\u7f72 CDR \u5de5\u5177\u3002\u9019\u4e9b\u5de5\u5177\u53ef\u4ee5\u5075\u6e2c\u4e26\u9632\u6b62\u4efb\u4f55\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u56e0\u300c\u4fdd\u8b77\u5931\u6548\u300d\u4e8b\u4ef6\u800c\u88ab\u522a\u9664\u3002<\/p>\n<p>\u5176\u4ed6\u503c\u5f97\u6ce8\u610f\u7684\u9ad8\u56b4\u91cd\u6027\u8b66\u793a\u5305\u62ec\u591a\u500b\u96f2\u7aef\u5feb\u7167\u532f\u51fa\u548c\u670d\u52d9\u5e33\u865f IAM \u7684\u53ef\u7591\u4f7f\u7528\u3002\u9019\u5169\u9805\u90fd\u662f\u96f2\u7aef\u74b0\u5883\u4e2d\u60e1\u610f\u6d3b\u52d5\u7684\u95dc\u9375\u6307\u6a19\u3002<\/p>\n<p>\u53ef\u80fd\u89f8\u767c\u9019\u4e9b\u8b66\u793a\u7684\u60e1\u610f\u4f5c\u696d\u7bc4\u4f8b\u5305\u62ec\u4ee5\u96f2\u7aef\u70ba\u91cd\u9ede\u7684\u6572\u8a50\u6216\u52d2\u7d22\u8edf\u9ad4\u4e8b\u4ef6\u3002\u53ea\u6709\u5148\u505c\u7528\u96f2\u7aef\u5132\u5b58\u4fdd\u8b77\uff0c\u4f8b\u5982\u522a\u9664\u4fdd\u8b77\u548c\u81ea\u52d5\u5099\u4efd\uff0c\u624d\u80fd\u5229\u7528\u9019\u4e9b\u985e\u578b\u7684\u4e8b\u4ef6\u3002\u4e00\u65e6\u79fb\u9664\u9019\u4e9b\u4fdd\u8b77\u63aa\u65bd\uff0c\u60e1\u610f\u884c\u70ba\u8005\u5c31\u53ef\u4ee5\u522a\u9664\u6216\u5916\u6ef2\u96f2\u7aef\u5132\u5b58\u5bb9\u5668\u7269\u4ef6\uff0c\u589e\u52a0\u52d2\u7d22\u4f5c\u696d\u6210\u529f\u7684\u53ef\u80fd\u6027\u3002<\/p>\n<p>\u5176\u4e2d\u4e00\u4e9b\u9ad8\u56b4\u91cd\u6027\u8b66\u793a\u4e5f\u53ef\u80fd\u56e0\u66b4\u9732\u6216\u8106\u5f31\u7684\u7121\u4f3a\u670d\u5668\u6216\u904b\u7b97\u5be6\u4f8b\u8cc7\u6e90\u53d7\u5230\u653b\u64ca\u800c\u89f8\u767c\u3002\u5177\u9ad4\u800c\u8a00\uff0c\u5c31\u7121\u4f3a\u670d\u5668 IAM \u6b0a\u6756\u7684\u9060\u7aef\u547d\u4ee4\u5217\u4f7f\u7528\u800c\u8a00\uff0c\u7121\u4f3a\u670d\u5668\u529f\u80fd\u7684\u8a2d\u8a08\u662f\u70ba\u4e86\u81ea\u4e3b\u7368\u7acb\u904b\u4f5c\u3002<\/p>\n<p>\u9060\u7aef\u6216\u672a\u7d93\u6388\u6b0a\u4f7f\u7528\u7121\u4f3a\u670d\u5668\u529f\u80fd\u7684 IAM \u8a18\u61b6\u9ad4\uff0c\u8868\u793a\u96f2\u7aef\u74b0\u5883\u5167\u7684\u5165\u4fb5\u548c\u6f5b\u5728\u6a6b\u5411\u79fb\u52d5\u3002\u76f8\u540c\u985e\u578b\u7684\u4e8b\u4ef6\u53ef\u80fd\u8868\u793a\u670d\u52d9\u5e33\u6236 IAM \u6b0a\u6756\u88ab\u60e1\u610f\u4f7f\u7528\u3002\u9451\u65bc\u670d\u52d9\u5e33\u6236 IAM \u6b0a\u6756\u901a\u5e38\u53ea\u6709\u55ae\u4e00\u7528\u9014\uff0c\u56e0\u6b64\u8a72\u4ee4\u724c\u7684\u4efb\u4f55\u7570\u5e38\u4f7f\u7528\u90fd\u61c9\u88ab\u8996\u70ba\u53ef\u7591\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.ea60uljd7bvt\"><\/a>\u4e2d\u5ea6\u56b4\u91cd\u8b66\u544a\u8da8\u52e2<\/h2>\n<p>\u8207\u5e74\u7d42\u9ad8\u56b4\u91cd\u5ea6\u8b66\u5831\u5c16\u5cf0\u4e0d\u540c\uff0c\u6211\u5011\u5728 2024 \u5e74\u4e2d\u770b\u5230\u4e2d\u7b49\u56b4\u91cd\u5ea6\u8b66\u793a\u6301\u7e8c\u5c16\u5cf0\u3002\u5982\u5716 2 \u6240\u793a\uff0c\u6b64\u4e00\u9ad8\u5cf0\u5305\u62ec\u6700\u521d\u7684 186% \u53ca\u96a8\u5f8c\u7684 24%\uff0c\u4e4b\u5f8c\u4e00\u76f4\u5230 12 \u6708\u90fd\u5448\u73fe\u4e0b\u964d\u8da8\u52e2\u3002<\/p>\n<figure id=\"attachment_147554\" aria-describedby=\"caption-attachment-147554\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img  class=\"wp-image-147554 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-8.png\" alt=\"\" width=\"1000\" height=\"509\" srcset=\"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-8.png 2048w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-8-786x400.png 786w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-8-1374x700.png 1374w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-8-768x391.png 768w, https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/07\/chart-8-1536x782.png 1536w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-147554\" class=\"wp-caption-text\">\u5716 2.2024 \u5e74\u4e2d\u5ea6\u56b4\u91cd\u8b66\u544a\u8da8\u52e2\u3002<\/figcaption><\/figure>\n<h3><a id=\"post-147542-_heading=h.ls2akbyvyyxa\"><\/a>\u5341\u5927\u5a92\u9ad4\u8b66\u793a<\/h3>\n<p>\u4e0b\u8868 3 \u6240\u793a\u7684\u524d 10 \u5927\u4e2d\u7b49\u56b4\u91cd\u6027\u8b66\u793a\u8207\u4e0a\u8868 2 \u6240\u5217\u7684\u524d 10 \u5927\u9ad8\u56b4\u91cd\u6027\u8b66\u5831\u4e0d\u540c\u3002\u95dc\u9375\u5dee\u7570\u5728\u65bc\uff0c\u9664\u4e86\u524d 10 \u5927\u4e2d\u7b49\u56b4\u91cd\u6027\u8b66\u793a\u4e2d\u7684\u4e00\u500b\u4e4b\u5916\uff0c\u5176\u4ed6\u6240\u6709\u8b66\u793a\u7684\u4e8b\u4ef6\u90fd\u53ea\u80fd\u900f\u904e\u57f7\u884c\u67d0\u7a2e\u5f62\u5f0f\u7684\u57f7\u884c\u6642\u4fdd\u8b77\u5206\u6790\u624d\u80fd\u5075\u6e2c\u5230\u3002<\/p>\n<p>\u4e0d\u5c0b\u5e38\u7684\u5927\u91cf\u8cc7\u6599\u50b3\u8f38\u300d\u4e8b\u4ef6\u53ef\u4f7f\u7528\u96f2\u7aef\u8cc7\u6e90\u7684\u50b3\u7d71 CSPM \u5075\u6e2c\u529f\u80fd\u89f8\u767c\u3002\u4e0d\u904e\uff0c\u5c31\u50cf\u4e0a\u9762\u8a0e\u8ad6\u7684\u9ad8\u56b4\u91cd\u6027\u300c\u96f2\u7aef\u5132\u5b58\u522a\u9664\u4fdd\u8b77\u5df2\u505c\u7528\u300d\u4e8b\u4ef6\u4e00\u6a23\uff0cCDR \u5de5\u5177\u80fd\u5728\u6b64\u4e0d\u5c0b\u5e38\u7684\u78c1\u789f\u5340\u50b3\u8f38\u4e8b\u4ef6\u767c\u751f\u6642\uff0c\u66f4\u597d\u5730\u5075\u6e2c\u5230\u5b83\u3002\u5b83\u4e5f\u53ef\u4ee5\u8b58\u5225\u6a94\u6848\u985e\u578b\u53ca\u5176\u96f2\u7aef\u5132\u5b58\u6a94\u6848\u6216\u76ee\u9304\u4f4d\u7f6e\u3002\u9019\u4e9b\u7d30\u7bc0\u63d0\u4f9b\u5b89\u5168\u5718\u968a\u57f7\u884c\u5de5\u4f5c\u6700\u9700\u8981\u7684\u8cc7\u6e90\uff1a\u6642\u9593\u8207\u77e5\u8b58\u3002<\/p>\n<table style=\"width: 96.3986%;\">\n<tbody>\n<tr>\n<td style=\"width: 61.1195%;\"><strong>\u8b66\u5831\u540d\u7a31<\/strong><\/td>\n<td style=\"width: 22.3903%;\"><strong>\u904b\u884c\u6642\u9593\u6216<\/strong>\u52e2\u614b<strong>\u63a7\u5236<\/strong><\/td>\n<td style=\"width: 78.6687%;\"><strong>\u6bcf\u65e5\u5e73\u5747\u8a08\u6578<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">IAM \u8eab\u5206\u5617\u8a66\u5c0d\u88ab\u62d2\u7d55\u7684\u8cc7\u6e90\u57f7\u884c\u591a\u500b\u52d5\u4f5c<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">80<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u5728\u5be6\u9ad4\u5340\u57df\u5916\u57f7\u884c API \u547c\u53eb\u7684\u8a08\u7b97\u9644\u52a0\u8eab\u5206<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">36.32<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u5617\u8a66\u5f9e\u975e\u6b63\u5e38\u79df\u6236\u5b58\u53d6\u96f2\u7aef\u61c9\u7528\u7a0b\u5f0f<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c<\/td>\n<td style=\"width: 78.6687%;\">21.69<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u4e00\u500b\u8eab\u5206\u5f9e\u591a\u500b\u5132\u5b58\u6876\u57f7\u884c\u53ef\u7591\u7684\u591a\u500b\u96f2\u7aef\u5132\u5b58\u7269\u4ef6\u4e0b\u8f09<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">18.66<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u96f2\u7aef\u904b\u7b97\u8eab\u5206\u7684\u4e0d\u53ef\u80fd\u65c5\u884c<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">18.65<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u4e0d\u5c0b\u5e38\u7684\u5132\u5b58\u9ad8\u5bb9\u91cf\u8cc7\u6599\u50b3\u8f38<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u4f86\u81ea\u975e\u96f2\u7aef IP \u7684 Kubernetes \u670d\u52d9\u5e33\u865f\u5728\u7fa4\u96c6\u5916\u7684\u6d3b\u52d5<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">12.15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u4e00\u500b\u96f2\u7aef\u61c9\u7528\u7a0b\u5f0f\u57f7\u884c\u4e86\u591a\u500b\u88ab\u62d2\u7d55\u7684\u52d5\u4f5c<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">12.02<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u532f\u51fa\u591a\u500b\u96f2\u7aef\u5feb\u7167<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">10<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 61.1195%;\">\u53ef\u7591\u8eab\u5206\u5f9e\u5099\u4efd\u5132\u5b58\u6876\u4e0b\u8f09\u591a\u500b\u7269\u4ef6<\/td>\n<td style=\"width: 22.3903%;\">\u57f7\u884c\u6642\u9593<\/td>\n<td style=\"width: 78.6687%;\">9.68<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u8868 3.\u6309\u5e73\u5747\u767c\u751f\u7387\u9032\u884c\u4e2d\u7b49\u56b4\u91cd\u6027\u8b66\u793a\u3002<\/p>\n<p>\u8868 3 \u4e2d\u5217\u51fa\u7684\u5e7e\u9805\u8b66\u793a\u53ef\u80fd\u986f\u793a\u60e1\u610f\u884c\u70ba\u8005\u6b63\u4ee5\u96f2\u7aef\u8cc7\u6e90\u70ba\u76ee\u6a19\uff0c\u4f8b\u5982\u7fa4\u96c6\u5916\u7684 Kubernetes \u670d\u52d9\u5e33\u6236\u6216\u4f86\u81ea\u975e\u96f2\u7aef IP \u4f4d\u5740\u7684 Kubernetes \u670d\u52d9\u5e33\u6236\u3002\u7279\u5225\u662f\u9019\u5169\u500b\u8b66\u793a\uff0c\u53ef\u80fd\u8868\u793a Kubernetes \u7fa4\u96c6\u9a57\u8b49\u4ee3\u7528\u5e63\u5df2\u906d\u7834\u89e3\uff0c\u56e0\u70ba\u670d\u52d9\u5e33\u865f IAM \u6b0a\u6756\u662f\u70ba\u55ae\u4e00\u76ee\u7684\u800c\u8a2d\u8a08\u7684\u3002\u4efb\u4f55\u5728\u7fa4\u96c6\u5916\u90e8\u6216\u5df2\u77e5\u96f2\u7aef\u74b0\u5883\u5916\u90e8\u4f7f\u7528\u9019\u4e9b\u6191\u8b49\u7684\u4f5c\u696d\uff0c\u90fd\u61c9\u8996\u70ba\u53ef\u7591\u6d3b\u52d5\uff0c\u4e26\u61c9\u52a0\u4ee5\u6e1b\u7de9\u3002<\/p>\n<p>\u53e6\u4e00\u500b\u5fc5\u9808\u5f37\u8abf\u7684\u8b66\u793a\u662f\u532f\u51fa\u591a\u500b\u96f2\u7aef\u5feb\u7167\u3002\u96d6\u7136\u9019\u985e\u4e8b\u4ef6\u53ef\u80fd\u6709\u5408\u6cd5\u7684\u7528\u4f8b - \u4f8b\u5982\u90e8\u7f72\u5feb\u7167\u6216\u5916\u90e8\u5099\u4efd - \u4f46\u5a01\u8105\u4efd\u5b50\u4e5f\u6703\u8f38\u51fa\u5feb\u7167\u3002\u96f2\u7aef\u5feb\u7167\u53ef\u80fd\u5305\u542b\u654f\u611f\u8cc7\u8a0a\uff0c\u56e0\u6b64\u6210\u70ba\u60e1\u610f\u4f5c\u696d\u7684\u5e38\u898b\u76ee\u6a19\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.4lp14nzag2c3\"><\/a>\u7d44\u7e54\u53ef\u4ee5\u505a\u4ec0\u9ebc<\/h2>\n<p>\u7d44\u7e54\u53ef\u4ee5\u5be6\u65bd\u5e7e\u500b\u6b65\u9a5f\uff0c\u4ee5\u66f4\u597d\u5730\u4fdd\u8b77\u81ea\u5df1\u514d\u53d7\u60e1\u610f\u96f2\u7aef\u4f5c\u696d\u7684\u5a01\u8105\uff1a<\/p>\n<ul>\n<li>\u5be6\u65bd\u6709\u6548\u7684 CDR \u57f7\u884c\u6642\u9593\u76e3\u63a7\n<ul>\n<li>\u70ba\u60a8\u6240\u6709\u7684\u96f2\u7aef\u74b0\u5883\u90e8\u7f72 CDR \u96f2\u7aef\u5b89\u5168\u6027<\/li>\n<li>\u78ba\u4fdd\u6240\u6709\u95dc\u9375\u4efb\u52d9\u96f2\u7aef\u9ede\u90fd\u6709\u555f\u7528\u904b\u884c\u6642\u9593\u7684\u4ee3\u7406\u7a0b\u5f0f\uff0c\u4ee5\u5075\u6e2c\u904b\u7b97\u548c\u5bb9\u5668\u904b\u884c\u6642\u9593\u4f5c\u696d<\/li>\n<li>\u78ba\u4fdd\u60a8\u7684 CSP \u4f9b\u61c9\u5546\u63d0\u4f9b\u904b\u884c\u6642\u96f2\u7aef\u7a3d\u6838\u65e5\u8a8c\u76e3\u63a7\u529f\u80fd<\/li>\n<li>\u78ba\u4fdd\u60a8\u7684\u6574\u5408\u5f0f\u96f2\u7aef SaaS \u61c9\u7528\u7a0b\u5f0f\u80fd\u6536\u96c6\uff1a\n<ul>\n<li>\u8eab\u5206\u63d0\u4f9b\u8005 (IdP)<\/li>\n<li>CI\/CD \u6574\u5408<\/li>\n<li>\u539f\u59cb\u78bc\u5132\u5b58\u5eab<\/li>\n<li>\u6545\u969c\u56de\u5831\u5e73\u53f0 \/ \u6d3e\u55ae\u7cfb\u7d71<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u5c0d\u5141\u8a31\u904b\u884c\u904b\u7b97\u548c\u7121\u4f3a\u670d\u5668\u529f\u80fd\u7684 CSP \u5340\u57df\u9032\u884c\u9650\u5236\n<ul>\n<li>\u653b\u64ca\u8005\u901a\u5e38\u6703\u5728\u570b\u5916 CSP \u5340\u57df\u5167\u5efa\u7acb\u96f2\u7aef\u8cc7\u6e90\uff0c\u4ee5\u57f7\u884c\u57fa\u672c\u7684\u64cd\u4f5c\u6df7\u6dc6\u5f62\u5f0f<\/li>\n<\/ul>\n<\/li>\n<li>\u8b58\u5225\u4e26\u9632\u6b62 IAM \u670d\u52d9\u5e33\u6236\u57f7\u884c\u5176\u9810\u671f\u529f\u80fd\u4ee5\u5916\u7684\u4f5c\u696d\n<ul>\n<li>\u9075\u5faa IAM \u6191\u8b49\u7684\u6700\u5c0f\u6b0a\u9650\u67b6\u69cb\u8a2d\u8a08\u80fd\u5728 IAM \u6191\u8b49\u906d\u6d29\u9732\u6642\uff0c\u5927\u5927\u5354\u52a9\u5c0d\u6297\u6a6b\u5411\u79fb\u52d5\u548c\u6b0a\u9650\u5347\u7d1a\u4f5c\u696d<\/li>\n<\/ul>\n<\/li>\n<li>\u78ba\u4fdd\u6240\u6709\u96f2\u7aef\u5132\u5b58\u5bb9\u5668\u90fd\u5df2\u9032\u884c\u96f2\u7aef\u5132\u5b58\u7248\u672c\u7ba1\u7406\u8207\u52a0\u5bc6\n<ul>\n<li>\u7248\u672c\u63a7\u5236\u548c\u52a0\u5bc6\u662f\u4e09\u5927\u96f2\u7aef\u670d\u52d9\u4f9b\u61c9\u5546\u7684\u6bcf\u500b\u96f2\u7aef\u5132\u5b58\u5bb9\u5668\u7684\u514d\u8cbb\u914d\u7f6e<\/li>\n<li>\u9019\u5169\u9805\u529f\u80fd\u80fd\u5920\u5927\u5e45\u589e\u52a0\u653b\u64ca\u8005\u5617\u8a66\u7aca\u53d6\u60a8\u5bf6\u8cb4\u3001\u654f\u611f\u8cc7\u8a0a\u6642\u6240\u9047\u5230\u7684\u56f0\u96e3<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\u5982\u679c\u6709\u7591\u554f\uff0c\u8acb\u8a18\u4f4f CDR \u57f7\u884c\u6642\u76e3\u63a7\u9632\u79a6<strong>\u5fc5\u9808<\/strong>\u5b58\u5728\uff0c\u624d\u80fd\u6709\u6548\u5c0d\u6297\u96f2\u7aef\u74b0\u5883\u6240\u9762\u81e8\u7684\u5927\u591a\u6578\u5a01\u8105\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.mkwl7vwcpdlk\"><\/a>\u7e3d\u7d50<\/h2>\n<p>CDR \u57f7\u884c\u6642\u76e3\u63a7\u662f\u7dad\u8b77\u5b89\u5168\u96f2\u7aef\u3001\u6df7\u5408\u96f2\u7aef\u8207\u591a\u96f2\u7aef\u74b0\u5883\u7684\u91cd\u8981\u4e00\u74b0\u3002\u6b63\u5982\u672c\u6587\u6240\u8a0e\u8ad6\u7684\u9ad8\u3001\u4e2d\u56b4\u91cd\u6027\u8b66\u793a\u8da8\u52e2\u8cc7\u6599\u6240\u986f\u793a\uff0c\u96f2\u7aef\u74b0\u5883\u5728 2024 \u5e74\u9593\u7684\u5e73\u5747\u8b66\u793a\u6578\u91cf\u589e\u52a0 388%\u3002<\/p>\n<p>\u9019\u4e9b\u8b66\u793a\u4e2d\uff0c\u6709\u76f8\u7576\u591a\u662f\u57f7\u884c\u6642\u4f5c\u696d\u5075\u6e2c\u7684\u76f4\u63a5\u7d50\u679c\uff0c\u800c\u55ae\u9760\u52e2\u614b\u7ba1\u7406 (CSPM) \u5de5\u5177\u662f\u5075\u6e2c\u4e0d\u5230\u9019\u4e9b\u4f5c\u696d\u7684\u3002CDR \u5de5\u5177\u63d0\u4f9b\u96f2\u7aef\u57f7\u884c\u6642\u5075\u6e2c\u529f\u80fd\uff0c\u80fd\u5920\u5075\u6e2c\u767c\u751f\u5728\u96f2\u7aef\u904b\u7b97\u5be6\u9ad4\u3001\u5bb9\u5668\u4e3b\u6a5f\u6216\u7121\u4f3a\u670d\u5668\u529f\u80fd\u4e0a\u7684\u60e1\u610f\u4e8b\u4ef6\u3002<\/p>\n<p>\u9451\u65bc\u91dd\u5c0d\u96f2\u7aef\u74b0\u5883\u7684\u5a01\u8105\u8207\u65e5\u4ff1\u589e\uff0c\u5c0d\u65bc\u9019\u4e9b\u74b0\u5883\u800c\u8a00\uff0c\u552f\u4e00\u771f\u6b63\u7684\u9632\u79a6\u65b9\u6cd5\u5c31\u662f\u4f7f\u7528\u4f7f\u7528\u96f2\u7aef\u578b\u4ee3\u7406\u7a0b\u5f0f\uff0c\u91dd\u5c0d\u516c\u958b\u66b4\u9732\u7684\u95dc\u9375\u96f2\u7aef\u7aef\u9ede\u3001CSP \u7a3d\u6838\u8a18\u9304\u548c\u96f2\u7aef\u7b2c\u4e09\u65b9 SaaS \u61c9\u7528\u7a0b\u5f0f\u63d0\u5347\u9632\u79a6\u3002\u4f7f\u7528 CDR \u5206\u6790\u5de5\u5177\u53ef\u8b93\u9632\u79a6\u8005\u6536\u96c6\u3001\u5075\u6e2c\u4e26\u9632\u6b62\u57f7\u884c\u53ef\u80fd\u5f71\u97ff\u4efb\u4f55\u9019\u4e9b\u8cc7\u6e90\u7684\u60e1\u610f\u4f5c\u696d\u3002\u7d50\u5408\u96f2\u7aef\u8cc7\u6e90\u4e8b\u4ef6\u65e5\u8a8c\u7684\u57f7\u884c\u6642\u76e3\u63a7\u3001\u5206\u6790\u8207\u56de\u61c9\uff0c\u5c0d\u65bc\u78ba\u4fdd\u4e0d\u8b93\u60e1\u610f\u4f5c\u696d\u5728\u96f2\u7aef\u74b0\u5883\u4e2d\u904b\u4f5c\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n<p>\u5982\u679c\u60a8\u8a8d\u70ba\u81ea\u5df1\u53ef\u80fd\u5df2\u53d7\u5230\u653b\u64ca\u6216\u6709\u7dca\u6025\u60c5\u6cc1\uff0c\u8acb\u8207<a href=\"https:\/\/start.paloaltonetworks.com\/contact-unit42.html\" target=\"_blank\" rel=\"noopener\"> \u7b2c 42 \u55ae\u5143\u4e8b\u4ef6\u56de\u61c9\u5718\u968a<\/a>\u806f\u7d61\uff0c\u6216\u64a5\u6253\u96fb\u8a71\uff1a\u3002<\/p>\n<ul>\n<li>\u5317\u7f8e\u6d32\uff1a\u514d\u8cbb\u96fb\u8a71\uff1a+1 (866) 486-4842 (866.4.unit42)<\/li>\n<li>\u82f1\u570b\uff1a+44.20.3743.3660<\/li>\n<li>\u6b50\u6d32\u548c\u4e2d\u6771\uff1a+31.20.299.3130<\/li>\n<li>\u4e9e\u6d32\uff1a+65.6983.8730<\/li>\n<li>\u65e5\u672c\uff1a+81.50.1790.0200<\/li>\n<li>\u6fb3\u6d32\uff1a+61.2.4062.7950<\/li>\n<li>\u5370\u5ea6\uff1a00080005045107<\/li>\n<\/ul>\n<p>Palo Alto Networks \u5df2\u5c07\u9019\u4e9b\u767c\u73fe\u8207\u6211\u5011\u7684\u7db2\u8def\u5a01\u8105\u806f\u76df (CTA) \u6210\u54e1\u5206\u4eab\u3002CTA \u6703\u54e1\u5229\u7528\u9019\u4e9b\u60c5\u5831\u5feb\u901f\u90e8\u7f72\u4fdd\u8b77\u63aa\u65bd\u7d66\u5ba2\u6236\uff0c\u4e26\u6709\u7cfb\u7d71\u5730\u74e6\u89e3\u60e1\u610f\u7684\u7db2\u8def\u884c\u52d5\u8005\u3002\u9032\u4e00\u6b65\u4e86\u89e3 <a href=\"https:\/\/www.cyberthreatalliance.org\" target=\"_blank\" rel=\"noopener\">\u7db2\u8def\u5a01\u8105\u806f\u76df<\/a>.\u3002<\/p>\n<h2><a id=\"post-147542-_heading=h.m0fwaqjxvztn\"><\/a>\u53c3\u8003\u8cc7\u6599<\/h2>\n<ul>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.com\/large-scale-cloud-extortion-operation\/\" target=\"_blank\" rel=\"noopener\">\u6d29\u6f0f\u7684\u74b0\u5883\u8b8a\u6578\u5141\u8a31\u96f2\u7aef\u74b0\u5883\u4e2d\u7684\u5927\u898f\u6a21\u52d2\u7d22\u4f5c\u696d<\/a> - Unit 42, Palo Alto Networks<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/state-of-cloud-native-security\" target=\"_blank\" rel=\"noopener\">2024 \u5e74\u96f2\u7aef\u672c\u6a5f\u5b89\u5168\u72c0\u6cc1\u5831\u544a<\/a> - Palo Alto Networks<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/22\/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon\/\" target=\"_blank\" rel=\"noopener\">\u5fae\u8edf\u5728 CYBERWARCON \u5206\u4eab\u5317\u97d3\u8207\u4e2d\u570b\u5a01\u8105\u4efd\u5b50\u7684\u6700\u65b0\u60c5\u5831<\/a> - Threat Intelligence blog, Microsoft<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-cloud-security-posture-management\" target=\"_blank\" rel=\"noopener\">What Is CSPM? | \u96f2\u7aef\u5b89\u5168\u52e2\u614b\u7ba1\u7406\u8aaa\u660e<\/a> - Cyberpedia, Palo Alto Networks<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-cloud-detection-and-response-cdr\" target=\"_blank\" rel=\"noopener\">What Is CDR (Cloud Detection and Response)?<\/a> - Cyberpedia, Palo Alto Networks<\/li>\n<li><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/identity-and-access-management-iam\" target=\"_blank\" rel=\"noopener\">\u8eab\u5206\u8207\u5b58\u53d6\u7ba1\u7406 (IAM) \u7684\u5b9a\u7fa9<\/a> - Gartner \u8cc7\u8a0a\u6280\u8853\u8a5e\u5f59<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u96dc\u8a0a\u4e2d\u77ad\u89e3\u8da8\u52e2\uff1a\u8ffd\u8e64\u5b89\u5168\u8b66\u793a\u7684\u8b8a\u5316\uff0c\u8b93\u96f2\u7aef\u9632\u79a6\u4eba\u54e1\u80fd\u5920\u89e3\u6790\u653b\u64ca\u8005\u91dd\u5c0d IAM\u3001\u5132\u5b58\u7b49\u7684\u5a01\u8105\u3002<\/p>\n","protected":false},"author":317,"featured_media":138742,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[8831,8723],"tags":[9364,9365,9366,9367],"product_categories":[9042,9045,9153],"coauthors":[1394],"class_list":["post-147542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-research-zh-hant","category-cloud-cybersecurity-research-zh-hant","tag-api-attacks-zh-hant","tag-containers-zh-hant","tag-iam-zh-hant","tag-serverless-zh-hant","product_categories-cortex-zh-hant","product_categories-cortex-cloud-zh-hant","product_categories-unit-42-incident-response-zh-hant"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f<\/title>\n<meta name=\"description\" content=\"\u5728\u96dc\u8a0a\u4e2d\u77ad\u89e3\u8da8\u52e2\uff1a\u8ffd\u8e64\u5b89\u5168\u8b66\u793a\u7684\u8b8a\u5316\uff0c\u8b93\u96f2\u7aef\u9632\u79a6\u4eba\u54e1\u80fd\u5920\u89e3\u6790\u653b\u64ca\u8005\u91dd\u5c0d IAM\u3001\u5132\u5b58\u7b49\u7684\u5a01\u8105\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f\" \/>\n<meta property=\"og:description\" content=\"\u5728\u96dc\u8a0a\u4e2d\u77ad\u89e3\u8da8\u52e2\uff1a\u8ffd\u8e64\u5b89\u5168\u8b66\u793a\u7684\u8b8a\u5316\uff0c\u8b93\u96f2\u7aef\u9632\u79a6\u4eba\u54e1\u80fd\u5920\u89e3\u6790\u653b\u64ca\u8005\u91dd\u5c0d IAM\u3001\u5132\u5b58\u7b49\u7684\u5a01\u8105\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Unit 42\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T15:38:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T15:39:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/03\/04_Cloud_cybersecurity_research_Overview_1920x900.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nathaniel Quist\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f","description":"\u5728\u96dc\u8a0a\u4e2d\u77ad\u89e3\u8da8\u52e2\uff1a\u8ffd\u8e64\u5b89\u5168\u8b66\u793a\u7684\u8b8a\u5316\uff0c\u8b93\u96f2\u7aef\u9632\u79a6\u4eba\u54e1\u80fd\u5920\u89e3\u6790\u653b\u64ca\u8005\u91dd\u5c0d IAM\u3001\u5132\u5b58\u7b49\u7684\u5a01\u8105\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/","og_locale":"zh_TW","og_type":"article","og_title":"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f","og_description":"\u5728\u96dc\u8a0a\u4e2d\u77ad\u89e3\u8da8\u52e2\uff1a\u8ffd\u8e64\u5b89\u5168\u8b66\u793a\u7684\u8b8a\u5316\uff0c\u8b93\u96f2\u7aef\u9632\u79a6\u4eba\u54e1\u80fd\u5920\u89e3\u6790\u653b\u64ca\u8005\u91dd\u5c0d IAM\u3001\u5132\u5b58\u7b49\u7684\u5a01\u8105\u3002","og_url":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/","og_site_name":"Unit 42","article_published_time":"2025-03-27T15:38:39+00:00","article_modified_time":"2025-07-22T15:39:45+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/03\/04_Cloud_cybersecurity_research_Overview_1920x900.jpg","type":"image\/jpeg"}],"author":"Nathaniel Quist","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#article","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/"},"author":{"name":"Nathaniel Quist","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/6f4153adb969c91f103a21af22c5d1de"},"headline":"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f","datePublished":"2025-03-27T15:38:39+00:00","dateModified":"2025-07-22T15:39:45+00:00","mainEntityOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/"},"wordCount":166,"commentCount":0,"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/03\/04_Cloud_cybersecurity_research_Overview_1920x900.jpg","keywords":["API attacks","Containers","IAM","serverless"],"articleSection":["\u5a01\u8105\u7814\u7a76","\u96f2\u7aef\u7db2\u8def\u5b89\u5168\u7814\u7a76"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/","url":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/","name":"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#primaryimage"},"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/03\/04_Cloud_cybersecurity_research_Overview_1920x900.jpg","datePublished":"2025-03-27T15:38:39+00:00","dateModified":"2025-07-22T15:39:45+00:00","author":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/6f4153adb969c91f103a21af22c5d1de"},"description":"\u5728\u96dc\u8a0a\u4e2d\u77ad\u89e3\u8da8\u52e2\uff1a\u8ffd\u8e64\u5b89\u5168\u8b66\u793a\u7684\u8b8a\u5316\uff0c\u8b93\u96f2\u7aef\u9632\u79a6\u4eba\u54e1\u80fd\u5920\u89e3\u6790\u653b\u64ca\u8005\u91dd\u5c0d IAM\u3001\u5132\u5b58\u7b49\u7684\u5a01\u8105\u3002","breadcrumb":{"@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#primaryimage","url":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/03\/04_Cloud_cybersecurity_research_Overview_1920x900.jpg","contentUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/03\/04_Cloud_cybersecurity_research_Overview_1920x900.jpg","width":1920,"height":900,"caption":"Pictorial representation of cloud alert trends. Digital illustration of a glowing cloud composed of binary code, surrounded by dynamic red and blue light streaks, symbolizing cloud computing technology."},{"@type":"BreadcrumbList","@id":"https:\/\/unit42.paloaltonetworks.com\/zh-hant\/2025-cloud-security-alert-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/unit42.paloaltonetworks.com\/"},{"@type":"ListItem","position":2,"name":"\u96f2\u7aef\u5a01\u8105\u6301\u7e8c\u589e\u52a0\uff1a\u8da8\u52e2\u986f\u793a\u653b\u64ca\u8005\u66f4\u52a0\u8457\u91cd\u65bc IAM \u8207\u6ef2\u900f"}]},{"@type":"WebSite","@id":"https:\/\/unit42.paloaltonetworks.com\/#website","url":"https:\/\/unit42.paloaltonetworks.com\/","name":"Unit 42","description":"Palo Alto Networks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unit42.paloaltonetworks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Person","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/6f4153adb969c91f103a21af22c5d1de","name":"Nathaniel Quist","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/image\/947819d65069de51e7512d05c4607081","url":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/09\/Nathaniel-Quist_Headshot-Insights-300x300.png","contentUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/09\/Nathaniel-Quist_Headshot-Insights-300x300.png","caption":"Nathaniel Quist"},"description":"Nathaniel Quist is the Manager of the Cloud Threat Intelligence Team for Cortex Cloud, where he collaborates with the Cortex and Unit 42 researchers to track threat actors targeting cloud platforms and services. He holds a Master of Science in Information Security Engineering from The SANS Institute and has authored several publications for Palo Alto Networks' Unit 42, Prisma Cloud, and the SANS InfoSec Reading Room. Outside of cloud threats, he enjoys puzzles, blockchain, and ranching.","url":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/author\/nathaniel-quist\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/posts\/147542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/users\/317"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=147542"}],"version-history":[{"count":5,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/posts\/147542\/revisions"}],"predecessor-version":[{"id":147569,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/posts\/147542\/revisions\/147569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/media\/138742"}],"wp:attachment":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=147542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/categories?post=147542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/tags?post=147542"},{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/product_categories?post=147542"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/zh-hant\/wp-json\/wp\/v2\/coauthors?post=147542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}