75%
Of cloud security incidents in 2025 involved misuse of valid credentials or misconfigured IAM, not vulnerability exploitation, per CrowdStrike Global Threat Report
588%
Increase in cloud environment intrusions year-over-year per CrowdStrike, driven by attacker shift toward cloud-native attack techniques
10 min
Average time for a cloud attacker to move from initial access to data exfiltration in 2026 incident response cases, requiring automated detection response
CSPM
Detects misconfigurations before attacks; CDR detects active attacks in progress. Both are needed; neither replaces the other

Cloud environments are attacked differently than on-premises environments. Attackers who gain access to a cloud account do not install malware on a server and wait. They call APIs. They create new IAM roles. They enumerate S3 buckets and RDS snapshots. They spin up compute in regions the victim organization does not monitor. They exfiltrate data through native cloud services that look identical to legitimate administrative activity.

Traditional SIEM platforms were designed around on-premises log sources: Windows event logs, firewall syslogs, and endpoint telemetry. Even with cloud log ingestion (CloudTrail, Azure Activity Logs, GCP Audit Logs), traditional SIEMs lack the cloud-native context required to distinguish malicious API calls from legitimate administration. A CreateUser API call in AWS looks identical whether it is an attacker creating a persistence backdoor or an administrator provisioning a new service account.

Cloud Detection and Response (CDR) is the emerging security category built specifically for this gap. CDR platforms ingest cloud control plane telemetry, apply cloud-aware behavioral analytics, and detect the specific attack patterns that characterize cloud-native intrusions: IAM abuse, lateral movement between cloud services, data exfiltration via cloud-native channels, and persistence through cloud-native mechanisms.

What CDR Detects That SIEM and CSPM Miss

CDR, SIEM, and CSPM (Cloud Security Posture Management) address different phases of the cloud security lifecycle, with genuine gaps between them.

CSPM detects misconfigurations before they are exploited: S3 buckets with public access, security groups with overly permissive ingress rules, IAM policies with wildcard permissions. CSPM operates on the static configuration state of cloud resources. It does not detect active attacker behavior because it does not monitor runtime events.

Traditional SIEM ingests cloud audit logs but applies generic correlation rules that lack cloud-native context. A rule that fires on 'failed authentication' has no way to distinguish a legitimate user who mistyped their MFA code from an attacker attempting credential stuffing against the cloud console. A rule that fires on 'new IAM user created' cannot determine whether the timing, region, and permissions of the new user represent normal administrative activity or an attacker establishing persistence.

CDR adds three capabilities that close this gap. Cloud-native behavioral baselining learns the normal patterns of API calls in your specific cloud environment: which identities call which APIs, from which IP addresses, at which times, for which resource types. Deviations from these baselines surface as anomalies regardless of whether they match a known-bad signature. Cloud attack technique detection provides coverage for the specific tactics used in cloud intrusions: T1580 (cloud infrastructure discovery), T1578 (modify cloud compute infrastructure), T1537 (transfer data to cloud account), and dozens more ATT&CK cloud techniques with detection logic that understands cloud API semantics. Cross-service lateral movement detection correlates activity across multiple cloud services to identify attack chains that span IAM, compute, storage, and managed services in sequences that individually look benign but together indicate an attack in progress.

IAM key exfiltration and abuse

Detection of access key creation followed by immediate use from a different geographic region or IP range, indicating key theft or insider misuse.

Privilege escalation via IAM manipulation

Identifying API call sequences that effectively grant higher privileges to an attacker-controlled identity, even when no single API call appears suspicious in isolation.

Compute hijacking for cryptomining

Detection of unusual instance type launches in unexpected regions, a signature pattern of cryptomining attackers who exploit compromised cloud credentials.

Data exfiltration via cloud-native channels

S3 bucket replication to attacker-controlled accounts, RDS snapshot sharing with external account IDs, and CloudFront distribution modifications that redirect traffic.

Persistence through cloud-native mechanisms

Lambda function modification, CloudFormation template injection, and SSM parameter store poisoning used to maintain access after initial credentials are rotated.

CDR Architecture and Data Sources

CDR platforms ingest cloud-native telemetry from multiple layers: control plane audit logs, data plane activity logs, and runtime security signals from cloud workloads.

Control plane audit logs are the primary CDR data source. AWS CloudTrail records all API calls to AWS services, including who called which API, from which IP address, with which parameters, and what the result was. Azure Activity Logs provide equivalent coverage for the Azure control plane. GCP Cloud Audit Logs cover administrative, data access, system event, and policy-denied operations. These logs contain the signal for IAM abuse, resource manipulation, and persistence operations.

Data plane logs add visibility into what happens after cloud resources are accessed. AWS S3 Server Access Logs and CloudTrail data events capture individual object reads and writes. VPC Flow Logs capture network traffic metadata between cloud resources. CloudFront access logs capture CDN request patterns. Database query logs capture data access patterns at the application layer. Data plane logging is frequently incomplete in cloud environments because it is not enabled by default and generates high volumes and costs.

Runtime security for cloud workloads (EC2 instances, containers, Lambda functions) is the third data layer. eBPF-based runtime agents (Falco, AWS GuardDuty Runtime Monitoring, Wiz Runtime) capture system call activity from cloud workloads, detecting process executions, file operations, and network connections at the OS level. This layer covers the attack surface that control plane logs cannot see: what happens inside a compromised cloud instance after the attacker has gained code execution.

Effective CDR requires coverage across all three layers. Control plane-only CDR misses attacks that operate entirely within cloud workloads after initial access. Runtime-only CDR misses cloud control plane abuse that never touches a workload. Full-layer coverage is the architectural goal.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Leading CDR Platforms in 2026

The CDR market is young and consolidating rapidly through acquisition. Several distinct platform categories have emerged.

Native cloud provider security services provide foundational CDR capabilities at low cost. AWS GuardDuty is the most mature native CDR service, analyzing CloudTrail, VPC Flow Logs, and DNS query logs to detect threat patterns specific to AWS environments. GuardDuty Malware Protection and Runtime Monitoring extend coverage to EC2 and container workloads. Microsoft Defender for Cloud provides equivalent coverage for Azure and multi-cloud environments. GCP Security Command Center covers Google Cloud. Native services have the advantage of deep integration with provider APIs and no data egress costs, but limited cross-cloud correlation for organizations with multi-cloud deployments.

Cloud-native CDR platforms including Lacework, Orca Security, and Wiz provide cloud-agnostic CDR with multi-cloud visibility. Lacework's Polygraph Data Platform applies unsupervised machine learning to cloud telemetry to detect anomalous behavior without signature-based rules. Orca Security uses agentless workload scanning combined with CloudTrail analysis. Wiz's Security Graph correlates configuration data with runtime telemetry to identify attack paths that static CSPM and runtime-only CDR each miss independently.

Extended detection and response (XDR) platforms including CrowdStrike Falcon Cloud Security and SentinelOne Singularity Cloud extend their endpoint security platforms into cloud-native detection. The advantage is unified investigation across endpoint, identity, and cloud telemetry in a single console. The consideration is that cloud depth may be shallower than purpose-built CDR platforms for organizations with complex multi-cloud environments.

For most enterprises, the architecture is native cloud provider CDR services as the baseline (AWS GuardDuty, Microsoft Defender for Cloud) with a commercial CDR or CNAPP platform for multi-cloud correlation, advanced analytics, and unified security operations.

Integrating CDR Into the SOC Workflow

CDR as a standalone tool produces cloud-specific alerts. CDR integrated into the SOC workflow produces investigated incidents with full context across cloud, endpoint, and identity telemetry.

The integration path has two components. SIEM integration routes CDR alerts into the central SIEM alongside alerts from EDR, network security, and identity tools. CDR platforms provide SIEM connectors for Splunk, Microsoft Sentinel, Google Chronicle, and major SIEM platforms. Routing CDR alerts through the SIEM enables cross-source correlation: a CDR alert about suspicious IAM activity correlated with an ITDR alert about the same user account and an EDR alert about the endpoint they were logged into produces a much higher-confidence incident than any individual alert alone.

SOAR integration automates the response actions that CDR incidents require. Cloud-specific response playbooks should cover: IAM key rotation and deactivation for compromised credentials; isolation of compromised compute instances through security group modification; S3 bucket policy lockdown for suspected data exfiltration; snapshot deletion for attacker-created persistence snapshots; and cross-account access revocation for assumed role compromises. These response actions require cloud API access that SOAR platforms need to be pre-authorized to take.

Cloud detection coverage mapping against ATT&CK for Cloud and ATT&CK for Containers identifies detection gaps. The ATT&CK cloud matrix covers Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, and Exfiltration for AWS, Azure, GCP, and container environments. Mapping your CDR detections against this matrix identifies which cloud attack techniques you can detect and which require new detection logic or data source additions.

CDR vs. CNAPP: Understanding the Relationship

Cloud-Native Application Protection Platform (CNAPP) is the Gartner-defined category that converges CSPM, cloud workload protection (CWPP), and CDR into a unified platform. Understanding where CDR fits within CNAPP clarifies vendor claims and platform selection.

CSPM within CNAPP handles configuration assessment: finding misconfigurations before they are exploited. CWPP handles workload protection: vulnerability scanning for container images, OS packages, and application dependencies; runtime security for containerized and serverless workloads. CDR handles active threat detection: behavioral analytics for cloud control plane and workload runtime activity.

Leading CNAPP platforms including Wiz, Orca Security, Prisma Cloud (Palo Alto Networks), Lacework, and Aqua Security converge these capabilities with varying depth across each pillar. Wiz's strength is in CSPM depth and security graph correlation. Lacework's strength is in CDR behavioral analytics. Aqua's strength is in container and Kubernetes runtime security. No single platform leads across all pillars.

For organizations evaluating CDR in 2026, the practical question is whether to buy CDR as a CNAPP component or as a standalone capability. Organizations already running a CNAPP platform should evaluate whether their current platform's CDR capabilities meet their detection requirements before adding a separate CDR tool. Organizations without a CNAPP platform can use CDR as an entry point into the category and expand to CSPM and CWPP coverage over time.

The bottom line

Cloud environments are the primary expansion front for enterprise attack surface in 2026, and they are attacked through cloud-native techniques that traditional SIEMs cannot interpret. CDR fills the detection gap between static CSPM posture management and runtime attack coverage that SIEM rules alone cannot provide. Start with native cloud provider CDR services (AWS GuardDuty, Microsoft Defender for Cloud) as the immediate baseline. Add a commercial CDR or CNAPP platform for multi-cloud correlation and advanced behavioral analytics. Integrate CDR alerts through your SIEM for unified investigation and define cloud-specific SOAR response playbooks before you need them.

Frequently asked questions

What is the difference between CDR, CSPM, and CWPP?

CSPM (Cloud Security Posture Management) detects misconfigurations in cloud resource configurations before they are exploited. CWPP (Cloud Workload Protection Platform) scans cloud workloads for vulnerabilities and provides runtime security for containers and VMs. CDR (Cloud Detection and Response) detects active attacker behavior in cloud environments through behavioral analytics of control plane logs and runtime telemetry. All three address different phases of cloud security: CSPM prevents, CWPP hardens, CDR detects and responds.

Does AWS GuardDuty replace a commercial CDR platform?

GuardDuty is an excellent baseline CDR capability for AWS-only environments at low cost. Its limitations are: single-cloud scope (no cross-cloud correlation for Azure or GCP activity); detection based primarily on AWS-managed threat intelligence rather than your environment's behavioral baseline; and limited integration flexibility compared to commercial platforms. For organizations with multi-cloud environments, complex custom workloads, or requirements for advanced behavioral baselining, a commercial CDR or CNAPP platform adds meaningful detection depth beyond GuardDuty.

What cloud logs do we need to enable for effective CDR?

For AWS: CloudTrail management events (enabled by default in most organizations), CloudTrail data events for S3 and Lambda (frequently disabled due to cost), VPC Flow Logs for all VPCs containing sensitive workloads, and GuardDuty for managed threat detection. For Azure: Azure Activity Logs, Microsoft Entra ID sign-in and audit logs, and Microsoft Defender for Cloud. For GCP: Cloud Audit Logs with Admin Activity, Data Access, and System Event log types enabled. Prioritize enabling data plane logs for resources containing sensitive data even if the cost is significant; data exfiltration via S3 is invisible without S3 data events.

How do attackers move laterally in cloud environments?

Cloud lateral movement differs fundamentally from on-premises lateral movement. Instead of using SMB, WMI, or RDP to reach adjacent systems, cloud attackers assume IAM roles, pivot between services using service account credentials, access data through cloud-native APIs, and move between accounts using cross-account role assumptions. A compromised Lambda function can assume an EC2 instance role, which can assume a cross-account role in a different AWS account, traversing organizational boundaries without any network-level lateral movement.

What is the most common cloud attack technique in 2026?

IAM credential abuse is the most common cloud initial access technique, involved in 75% of cloud security incidents per CrowdStrike's 2026 Global Threat Report. Attackers obtain valid cloud credentials through phishing, infostealer malware, exposed credentials in code repositories, or misconfigured cloud services that expose credentials. Once they have valid credentials, they call cloud APIs directly, making the activity look identical to legitimate administration without cloud-aware behavioral detection.

How fast do cloud attackers move and what does that mean for detection?

Cloud attackers move significantly faster than on-premises attackers because cloud APIs allow automated enumeration and resource creation at machine speed. Incident response cases in 2026 show attackers moving from initial access to data exfiltration in as little as 10 minutes. This timeline requires automated detection and automated initial response. A CDR platform that requires an analyst to manually review and approve a response action before an IAM key is deactivated will frequently miss the response window. Define automated response playbooks for the highest-severity cloud attack patterns.

Sources & references

  1. Gartner: Cloud Detection and Response Emerging Technology
  2. Google Cloud: Cybersecurity Forecast 2026
  3. CrowdStrike: 2026 Global Threat Report - Cloud Attacks
  4. Wiz: Cloud Threat Landscape Report 2025
  5. Lacework: Cloud Threat Report 2025

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.