Organizations Not Fully Embracing Automation to Secure Cloud Deployments
May 08, 2024

A surprising amount of organizations aren't embracing automation when it comes to securing cloud deployments, according to the State of DevSecOps 2024 report from Datadog.

At least 38% of organizations leveraging AWS had deployed workloads or completed sensitive actions manually through the AWS console in a production environment within a 14-day period, meaning they are relying on manual click operations instead of automation.

Adoption of infrastructure as code (IaC) also varied across cloud providers. IaC is considered a critical practice when securing cloud production environments, as it helps ensure that human operations have limited permissions on production environments, all changes are peer reviewed and issues are identified earlier in the process. The report found that in AWS, over 71% of organizations use IaC through at least one popular IaC technology. This number is lower in Google Cloud, at 55%.

"These findings from the State of DevSecOps show that there is still room for improvement when it comes to embracing automation for the sake of improving security," said Andrew Krug, Head of Security Advocacy at Datadog. "Modern DevOps practices go hand-in-hand with strong security measures — and in fact, security helps drive operational excellence across the organization. While security starts with visibility, securing applications is only realistic when practitioners are given enough context and prioritization to understand which security signals matter and which are irrelevant."

Other key findings from the report include:

■ While attacks from automated security scanners represent the largest number of exploitation attempts, the vast majority of these attacks are harmless and only generate noise for defenders. Out of the tens of millions of malicious requests that were identified coming from such scanners, only 0.0065% successfully triggered a vulnerability.

■ A substantial number of organizations continue to rely on long-lived credentials — one of the most common causes of data breaches — in their CI/CD pipelines, even in cases where short-lived ones would be both more practical and more secure. 63% used a form of long-lived credential at least once to authenticate GitHub Actions pipelines.

■ Java applications are the most impacted by third-party vulnerabilities; 90% of Java services are susceptible to one or more critical or high-severity vulnerabilities introduced by a third-party library, versus an average of 47% for other programming languages.

Methodology: For the report, Datadog analyzed tens of thousands of applications and container images, along with thousands of cloud environments to assess the security posture of applications today and evaluate the adoption of best practices that are at the core of DevSecOps.

Share this

Industry News

June 26, 2025

Backslash introduced a new, free resource for vibe coders, developers and security teams - the Backslash MCP Server Security Hub.

June 26, 2025

Google's Gemma 3n is the latest member of Google's family of open models. Google is announcing that Gemma 3n is now fully available for developers with the full feature set including supporting image, audio, video and text.

June 26, 2025

Google announced that Imagen 4, its latest text-to-image model, is now available in paid preview in Google AI Studio and the Gemini API.

June 26, 2025

Payara announced the launch of Payara Qube, a fully automated, zero-maintenance platform designed to revolutionize enterprise Java deployment.

June 25, 2025

Google released its new AI-first Colab to all users, following a successful early access period that had a very positive response from the developer community.

June 25, 2025

Salesforce announced new MuleSoft AI capabilities that enable organizations to build a foundation for secure, scalable AI agent orchestration.

June 25, 2025

Harness announced the General Availability (GA) of Harness AI Test Automation – an AI-native, end-to-end test automation solution, that's fully integrated across the entire CI/CD pipeline, built to meet the speed, scale, and resilience demanded by modern DevOps.

With AI Test Automation, Harness is transforming the software delivery landscape by eliminating the bottlenecks of manual and brittle testing and empowering teams to deliver quality software faster than ever before.

June 25, 2025

Wunderkind announced the release of Build with Wunderkind — an API-first integration suite designed to meet brands and developers where they are.

June 25, 2025

Jitterbit announced the global expansion of its partner program and new Jitterbit University partner curricula.

June 24, 2025

Tricentis unveiled two innovations that aim to redefine the future of software testing for the enterprise.

June 24, 2025

Snyk announced the acquisition of Invariant Labs, an AI security research firm and early pioneer in developing safeguards against emerging AI threats.

June 24, 2025

ActiveState expanded support of secure open source to include free and customized low-to-no vulnerability containers that facilitate modern software development.

June 24, 2025

Pythagora launched an all-in-one AI development platform that enables users to build and deploy full-stack applications from a single prompt.

June 24, 2025

Cloudflare announced that Containers is in public beta.

June 23, 2025

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the launch of the Agent2Agent (A2A) project, an open protocol created by Google for secure agent-to-agent communication and collaboration.