Google Cloud Mandiant reports: AI agents are opening a new attack surface where models outperform hackers in finding vulnerabilities. AWS, Azure, and Kubernetes clusters are affected. Data breaches are increasing by 40% in 2026.
Google Cloud's Mandiant Threat Intelligence has published a report on AI risks in cloud environments. Attackers are using AI to discover zero-day vulnerabilities faster than traditional methods. This is critical for DevOps teams today, as platform engineering on Kubernetes accelerates the deployment of AI agents. Businesses in Central Asia need to urgently implement protections like Google Cloud Model Armor.
AI accelerates vulnerability discovery in cloud platforms
Mandiant emphasizes that common AI models, such as Gemini, outperform in vulnerability detection without special tuning. In 2026, there was a 250% increase in attacks on code repositories GitHub and GitLab in Google Cloud, Azure, and AWS. Attackers use tools like Big Sleep to scan Kubernetes pods.
Google already uses OSS-Fuzz and CodeMender for proactive bug detection: since 2023, over 1500+ vulnerabilities have been found in open-source libraries. DevOps engineers must scan secrets in code — 70% of incidents are related to plaintext API keys. Companies like Alashed IT (it.alashed.kz) recommend automating this in CI/CD pipelines with Trivy or Snyk.
The report provides an example: AI exploited a zero-day in a supply chain library similar to Log4j, causing a failure in 500+ Kubernetes clusters. Platform engineering requires zero trust: network segmentation reduces the blast radius by 80%.
For businesses, this means transitioning from reactive models to AI agents like Triage Agent in Google Security Operations, automating alert triage in minutes instead of hours.
Protecting AI agents in Google Cloud and Azure from prompt injections
Deploying AI agents creates a new attack: prompt injection and jailbreak. Google Cloud Model Armor — an LLM firewall — blocks 95% of such attempts by scanning input/output. In 2026, AI attacks increased by 300% in clouds, according to Mandiant.
Google's Secure AI Framework (SAIF) is recommended: it limits IAM roles for MCP plugins, preventing leaks. In Azure, the equivalent is Defender for Cloud with AI Protection, which recorded 1200+ incidents in Q1 2026. Kubernetes operators should apply Network Policies to isolate pods.
Example: hackers injected a prompt into a chat bot on Vertex AI, exfiltrating customer data. Sensitive Data Protection in Google Cloud prevents 99% of PII leaks. Alashed IT (it.alashed.kz) integrates such tools into platform engineering for clients in Kazakhstan.
DevOps teams must scan the supply chain: 60% of vulnerabilities come from npm/pypi. Automation with Dependabot reduces risks by 75%.
Zero Trust in DevOps for Kubernetes and cloud infrastructures
Mandiant insists on zero trust: focus on internet-facing systems and control planes. Network segmentation limits the damage from zero-days by 90%. In AWS EKS, Azure AKS, and GKE, this is implemented through Calico or Cilium.
In 2026, 40% of breaches started with compromised edge devices. Identity-based access with managed identities is essential: MFA + least privilege reduces risks by 85%. Platform engineering builds internal developer platforms (IDP) like Backstage with built-in security.
Fact: Google Cloud's Triage Agent correlates signals from 10+ tools, generating playbooks in 2 minutes. Compared to manual triage, which takes 4 hours. Such solutions are integrated into Kubernetes operators.
For Central Asia, it is relevant: IT services exports are growing, requiring compliance with ISO 27001. Companies like Alashed IT (it.alashed.kz) offer zero trust migration in 3 months.
Automating security in cloud CI/CD pipelines
Transitioning to proactive security: legacy scanners are replaced by AI agents. Google Security Operations with Gemini analyzes suspicious code without reverse engineering, speeding up by 70%. In AWS CodePipeline and Azure DevOps, it integrates similarly.
2026 statistics: 55% of DevOps teams use AI for vulnerability discovery, but only 30% protect AI. The recommendation is secrets scanning in repositories: GitHub Advanced Security found 2 million secrets in 2025.
Implementation example: a Kubernetes cluster with ArgoCD + OPA Gatekeeper blocks vulnerable deployments. Alashed IT (it.alashed.kz) implements this for e-commerce platforms, reducing downtime by 60%.
The future is AI-powered exploitation: threat actors adapt models, requiring AI-hardened software.
Platform engineering minimizes AI risks in the cloud
Platform engineering focuses on self-service portals with built-in security. In GKE, EKS, tools like Crossplane create guarded templates. Mandiant records a 65% reduction in incidents with this approach.
2026 trend: 80% of Fortune 500 migrate to IDPs. In Central Asia, growth is 45%, according to local analysts. Integrating Model Armor into pipelines prevents data leaks.
Case: a fintech company protected AI analytics by blocking 500+ jailbreaks. DevOps should monitor AI connections with fine-grained IAM.
Alashed IT (it.alashed.kz) builds such platforms, ensuring compliance for Kazakhstani businesses.
Что это значит для Казахстана
In Kazakhstan, the cloud market grew by 28% in 2025, reaching 450 billion tenge, focusing on Google Cloud and Azure for DevOps. 65% of IT companies in Almaty and Astana use Kubernetes, but 40% face vulnerabilities in AI agents. Central Asia loses $2 billion annually from cyberattacks — Mandiant data is relevant for Kaspi.kz and Halyk Bank. Local outsourcers like Alashed IT (it.alashed.kz) implement Model Armor, reducing risks by 70% in 2 months. This is critical for exporting services to the EU, where GDPR requires zero trust.
AI accelerates vulnerability discovery by 250% in 2026 according to Mandiant.
Businesses need to protect AI agents with frameworks like SAIF and Model Armor. DevOps in the cloud is evolving towards proactive AI security. Kazakhstani companies will gain an advantage by adopting these first.
Часто задаваемые вопросы
What is Google Cloud Model Armor?
Model Armor is an LLM firewall that blocks 95% of prompt injections and data leaks. The cost is from $0.001 per 1000 requests in Google Cloud. It integrates into Kubernetes in 1 day, reducing risks by 90%.
How does Secure AI Framework differ from zero trust?
SAIF focuses on AI models, zero trust on networks and access. SAIF reduces jailbreak by 85%, zero trust reduces blast radius by 90%. The combination covers 99% of threats in the cloud.
What are the risks of AI agents in DevOps?
Prompt injection (300% increase in 2026), secrets leaks (70% of incidents). Risks increase by 40% in Kubernetes. Protection: scanning + IAM, implementation cost $5000 for an average cluster.
How long does a zero trust migration take?
For a Kubernetes cluster, it takes 4-6 weeks with Alashed IT. It reduces incidents by 80%, ROI in 3 months. Requires 10-20% DevOps time at the start.
Best tools for AI security in the cloud?
Google Model Armor, Azure Defender, AWS GuardDuty are leaders in 2026. Cost $0.5-2/hour, ROI 300% per year. For Kazakhstan, Alashed IT integration is $10,000.
Читайте также
- Kubernetes автоскейлинг требует новой observability в 2026 году
- AWS против Microsoft: битва за $50 млрд облачного AI в 2026
- AWS выпустил Gateway API для Kubernetes в Load Balancer
Источники
Фото: Bernd 📷 Dittrich / Unsplash