Tenable research reveals growing AI exposure gap fuelled by supply chain risks and lack of identity controls 

    Tenable® (NASDAQ: TENB), the exposure management company, today released its Cloud and AI Security Risk Report 2026. The research reveals organisations face a zero‑margin AI exposure gap as they inherit cyber risks faster than they can address them. Engineering velocity, driven by AI adoption, third-party code and cloud scale, has outpaced the human-led ability to assess, prioritise and remediate risks before threat actors exploit them.

    The AI Exposure Gap is a largely invisible form of exposure that emerges across applications, infrastructure, identities, agents and data, and that most security teams are not equipped to manage.

    Tenable’s analysis of cloud environments identifies severe risks across four key security areas: AI security posture, supply chain attack vectors, least privilege implementation and cloud workload exposure, all of which demand immediate attention. The report includes actionable guidance for security and business leaders to reduce risk across cloud and AI environments.

    The letters AI for artificial intelligence in between a robot's hand and human hand, pointing at each other. Photo for illustrative purposes only. | Photo by Igor Omilaev / Unsplash / NHA File Photo
    Photo for illustrative purposes only. | Photo by Igor Omilaev / Unsplash / NHA File Photo

    Key findings from the Cloud and AI Security Risk Report 2026 include:

    • 70 per cent have integrated at least one AI or Model Context Protocol (MCP) third-party package, embedding AI deep into applications and infrastructure, often without central security oversight.
    • 86 per cent host third-party code packages with critical-severity vulnerabilities, making the software supply chain a primary and persistent source of cloud exposure. Furthermore, nearly one in eight (13 per cent) have deployed packages with a known history of compromise, such as the s1ngularity or Shai-Hulud worms.
    • 18 per cent of organisations have granted AI services administrative permissions that are rarely audited, creating a “pre-packaged” catalogue of privileges for attackers to claim.
    • Non‑human identities such as AI agents and service accounts now represent a higher risk (52 per cent) than human users (37 per cent), forming “toxic combinations” of permissions and access that fragmented tools fail to connect.
    • 65 per cent possess “ghost” secrets, unused or unrotated cloud credentials, with 17% of these tied specifically to critical administrative privileges.
    • 49 per cent of identities with critical-severity excessive permissions are dormant.

    “AI systems embedded in infrastructure pose a critical risk that CISOs and defenders must address, in addition to anticipating emerging threats from both AI and cloud technologies. Lack of visibility and governance means teams are at the mercy of new exposures, including over-privileged identities in the cloud,” said Liat Hayun, senior vice president of Product Management and Research at Tenable. “By focusing on the unified exposure path, organisations can stop managing ‘security debt’ and start managing actual business risk.”

    To manage emerging risks, organisations must secure the AI integration process through comprehensive visibility and identity-centric controls. This includes enforcing least privilege for AI roles, neutralising “ghost” identity risk and eliminating static secret exposure.

    Third-party code and external accounts are now extensions of organisations’ infrastructure; steps to reduce extended supply chain exposure include unifying visibility across code packages, virtual machines, identity access and cloud environments.

    The 2026 Cloud and AI Security Risk Report presents findings from the Tenable Research team, analysing anonymised telemetry from diverse public cloud and enterprise environments collected from April to October 2025 (AI findings extended through December 2025).

    Exposure Management is the practice of identifying, evaluating, and prioritising the risks posed by all entry points an attacker could exploit. This includes not just software vulnerabilities (CVEs), but also misconfigurations, excessive user privileges (identity risk), cloud security gaps, and the “shadow” assets created by AI and third-party supply chains.

    Source: Tenable (Press Release)