/smstreet/media/media_files/2025/09/22/tenable-2025-09-22-16-51-08.jpg)
Tenable®, the exposure management company, today released its Cloud and AI Security Risk Report 2026. The research reveals organisations face a zero‑margin AI exposure gap as they inherit cyber risks faster than they can address them. Engineering velocity, driven by AI adoption, third-party code and cloud scale, has outpaced the human-led ability to assess, prioritise and remediate risks before threat actors exploit them.
The AI Exposure Gap is a largely invisible form of exposure that emerges across applications, infrastructure, identities, agents and data, and that most security teams are not equipped to manage. Tenable’s analysis of cloud environments identifies severe risks across four key security areas: AI security posture, supply chain attack vectors, least privilege implementation and cloud workload exposure, all of which demand immediate attention. The report includes actionable guidance for security and business leaders to reduce risk across cloud and AI environments.
Key findings from the Cloud and AI Security Risk Report 2026 include:
70% have integrated at least one AI or Model Context Protocol (MCP) third-party package, embedding AI deep into applications and infrastructure, often without central security oversight.
86% host third-party code packages with critical-severity vulnerabilities, making the software supply chain a primary and persistent source of cloud exposure. Furthermore, nearly 1 in 8 (13%) have deployed packages with a known history of compromise, such as the s1ngularity or Shai-Hulud worms.
18% of organisations have granted AI services administrative permissions that are rarely audited, creating a "pre-packaged" catalog of privileges for attackers to claim.
Non‑human identities such as AI agents and service accounts now represent higher risk (52%) than human users (37%), forming “toxic combinations” of permissions and access that fragmented tools fail to connect.
65% possess "ghost" secrets, unused or unrotated cloud credentials, with 17% of these tied specifically to critical administrative privileges.
49% of identities with critical-severity excessive permissions are dormant.
“AI systems embedded in infrastructure pose a critical risk that CISOs and defenders must address, in addition to anticipating emerging threats from both AI and cloud technologies. Lack of visibility and governance means teams are at the mercy of new exposures, including over-privileged identities in the cloud,” said Liat Hayun, Senior Vice President of Product Management and Research at Tenable. “By focusing on the unified exposure path, organisations can stop managing ‘security debt’ and start managing actual business risk.”
To manage emerging risks, organisations must secure the AI integration process through comprehensive visibility and identity-centric controls. This includes enforcing least privilege for AI roles, neutralising "ghost" identity risk and eliminating static secret exposure. Third-party code and external accounts are now extensions of organisations' infrastructure; steps to reduce extended supply chain exposure include unifying visibility across code packages, virtual machines, identity access and cloud environments.
The 2026 Cloud & AI Security Risk Report presents findings from the Tenable Research team, analysing anonymised telemetry from diverse public cloud and enterprise environments collected from April to October 2025 (AI findings extended through December 2025).
Exposure Management is the practice of identifying, evaluating, and prioritising the risks posed by all entry points an attacker could exploit. This includes not just software vulnerabilities (CVEs), but also misconfigurations, excessive user privileges (identity risk), cloud security gaps, and the "shadow" assets created by AI and third-party supply chains.
/smstreet/media/agency_attachments/3LWGA69AjH55EG7xRGSA.png)
Follow Us