Datadog 2025 Study: Companies Increasingly Rely on Data Perimeters in the Cloud

December 2, 2025

The latest edition of Datadog’s State of Cloud Security report shows that organizations are increasingly adopting advanced security strategies to better protect their cloud infrastructures. Key trends include the use of data perimeters and centrally managed multi-account environments.

Data perimeters as an advanced security measure

Although considered a complex approach, more than one-third of surveyed companies have already implemented data perimeters. These measures typically involve policies at the level of S3 buckets and VPC endpoints, allowing organizations to control access to sensitive data in a targeted manner. This separation helps minimize potential attack vectors and clearly delineates critical data.

Multi-account management becomes standard

Alongside data perimeters, managing multiple cloud accounts is gaining traction. Centralized management via platforms such as AWS Organizations allows companies to enforce security policies consistently and apply the principle of least privilege efficiently. Datadog reports that 86% of organizations use multi-account structures within an AWS Organization, with 70% of all accounts fully integrated under centralized management.

Credential theft remains the top risk

A major driver for adopting these advanced strategies is the ongoing threat posed by credential theft. Many keys, service accounts, and IAM user accounts rely on long-lived credentials that are frequently exposed in source code, container images, or build logs. According to the report, 59% of AWS IAM users, 55% of Google Cloud service accounts, and 40% of Microsoft Entra ID applications had credentials older than one year.

Emilio Escobar, CISO at Datadog, emphasizes: “Every identity—human or machine—represents a potential entry point to sensitive data. Strong access controls and continuous verification aren’t just security features—they are essential for protecting digital assets in today’s borderless cloud environment.”

Conclusion

The report highlights a clear trend: traditional security concepts alone are no longer sufficient in cloud environments. Practices such as data perimeters and centrally managed multi-account structures are increasingly becoming the standard to prevent data loss, unauthorized access, and credential theft.

The full State of Cloud Security 2025 report from Datadog provides detailed insights into current security practices, risks, and trends across cloud infrastructures.

Related Articles

Commentary: BERLIN – Known risks, familiar words, familiar failures

The power outage in Berlin since 3 January 2026 is extraordinary in its scale, but remarkably familiar in its causes and political consequences. Five damaged high-voltage cables, tens of thousands of households without electricity and heating, restrictions on mobile...

Commentary: Hesse’s clear stance against left-wing extremism

In his statement, Hesse's Interior Minister Roman Poseck paints a deliberately clear picture of left-wing extremism as a threat to security. The core of his position is clear: left-wing extremism is not understood as a marginal phenomenon or merely a side issue of...

Positive safety record at Bavaria’s Christmas markets

Successful protection concepts combining presence, prevention and cooperation At the end of the 2025 Christmas market season, the Bavarian State Ministry of the Interior reports a thoroughly positive safety record. Home Secretary Joachim Herrmann spoke of...

Share This