Cloud security has reached an inflection point. Organizations have accelerated their cloud adoption and must navigate a complex threat landscape where workloads spin up and down in seconds, applications deploy continuously and identities span multiple services and providers.
This complexity creates significant challenges. The volume of logs and events has grown exponentially, making manual threat detection impossible, while changes in cloud infrastructure outpace the ability of traditional security tools. The interconnected nature of cloud services creates complex identity and access patterns that traditional security models struggle to govern. In this landscape, cloud-native application protection platforms (CNAPPs) have become the foundation for modern cloud security and cloud detection and response (CDR) has emerged as a critical capability to stop threats.
The Rise of Cross-Domain Attacks
Modern adversaries have evolved to exploit this complexity through cross-domain attacks. These attacks span multiple domains — endpoints, identity systems and cloud environments — making them challenging to detect and mitigate. Attackers use legitimate credentials obtained through dark web purchases, social engineering or phishing campaigns to slip into organizations. Once inside, they use legitimate tools and lateral movement to evade detection.
Consider this example of a cross-domain attack scenario: An adversary begins with valid RDP credentials from an access broker and uses these to compromise an endpoint. Once inside, they discover cloud credentials and move into the cloud control plane, where they escalate privileges and access additional sensitive data. This evolution has become mainstream: CrowdStrike has observed a significant rise in cross-domain attacks.
These attacks are especially concerning when they involve the cloud control plane, which has a distinct architecture and dynamic nature that make it difficult for traditional endpoint (EDR) and identity (ITDR) security solutions to maintain visibility. Without specialized cloud security coverage, organizations lack visibility into cloud attack vectors, especially in environments where resources can appear and disappear within minutes. This visibility gap, combined with the interconnected nature of modern attacks, demonstrates why organizations need comprehensive security that spans the endpoint, identity and cloud domains.