Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Podcasts
    • Photo Galleries
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Mastering the Fundamentals of Cloud Security

By Brad Bussie
cloud-enews
August 2, 2018

The headlong rush into the cloud continues to accelerate, promising increased efficiency, flexibility and security for IT operations. But chief security officers are not off the hook when it comes to fortifying the privacy and security of their organizations’ sensitive data. In fact, quite the opposite is true.

Over the past five years, cloud and security have largely been siloed, but more recently they’ve begun to converge as cloud and hybrid cloud infrastructures have grown in popularity. In addition, new DevOps strategies have created extra layers of complexity in the effort to speed up software releases and improve application quality.

When undertaking a cloud migration, it’s critical to remember that the security protocols that work in the enterprise will not necessarily work in the cloud. A cloud partnership with Amazon Web Services (AWS) or Microsoft Azure can provide high levels of security, so it’s a common belief that by adopting these mega-cloud platforms, IT departments will be more secure than by standing up their own on-premise infrastructure.

While that point is usually true, it is also the case that any strong security posture requires oversight of all people, processes and technologies. Too often, the “people” and “process” categories become areas that companies tend to downplay during a cloud migration. As a result, the most common vulnerabilities often affect the company side, not the cloud backend, when people and processes emerge as the weakest links in the overall security framework.

This is the dirty little secret about cloud migrations – namely, that too many CSOs and IT managers overlook the security fundamentals in the cloud.

Safeguarding the Fundamentals of Cloud Security

In working with clients on cloud projects across different vertical industries, we see similar patterns that recur over and over, whether it be in manufacturing, retail, healthcare, electronics or financial services.

When IT teams stand up a cloud platform on AWS or Azure, they sometimes assume that those cloud partners will ensure the full security of their networks. In addition, security pros are often eager to deploy the latest machine learning tools or artificial intelligence systems to tease out behavioral analytics for their customers. But in too many cases, such moves into AI and ML are jumping ahead of the security basics.

It’s crucial to realize how many people and processes within an organization remain vulnerable due to social engineering attacks and other nefarious hacking techniques. Passwords can get cracked. Personal phones can get compromised. Steps for authentication and mitigation might not be properly applied, or phishing attacks might penetrate security barriers due to human errors, not in any way due to the failures of AWS or Azure.

Just think back to a simpler time when it was taboo to leave a written password lying around on your desktop. That exposure was bad enough when limited to the people whom you trusted within your own building. But now imagine moving to the cloud where you might open yourself up to undiscovered botnets residing on new IoT devices. Or you could encounter hackers who embed malware into backdoor payloads that open when you click on an executable file, or when your employees download a new application from the Apple App Store. These types of scenarios are quite common, which means they should terrify security professionals and keep them up at night.

Therein lies the real danger of the cloud, which is somewhat like buying a new car but forgetting to lock the doors. Or it’s like stepping outside to take a smoke break and propping open the door to the company loading dock. What is to stop someone from just walking in and taking advantage of such easy access?

For this reason, more attention must be paid to the compliance frameworks that govern the behaviors of people and processes. At the very least, most compliance teams and risk officers could certainly use more funding and bigger teams to track all the relevant regulatory and risk environments which permeate their cloud stacks.

One final point stems from a recent challenge we faced with a client at a major healthcare organization. Their team worked for years to overcome process and compliance deficiencies stemming from a complex mix of managed service providers, cloud providers and in-house systems. What they discovered was this security challenge has no finish line. It is an ongoing journey that will never end.

The lesson here is that strong service level agreements (SLAs) cannot ensure ironclad protections against infiltrators. Even when working with trusted cloud partners and reputable MSPs, it is incumbent upon security leaders to perform their due diligence and audit all the work being done under the SLA.

Once a breach happens and you still consider it to be somebody else’s problem, your customers will not care about who is responsible for their lost credit card info or personal data – they will rightfully blame your company for the hack. Remember that you are not paying managed service providers to give you peace of mind. It is your duty to not only look out for the bad guys, but also to watch the watchers themselves and make sure that everyone does their part to effectively protect your organization’s data in the cloud.

KEYWORDS: cloud computing cloud security cyber risk management third-party security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brad Bussie is principal security strategist for IT solutions company Trace3.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security management

    Mastering the first step in security management: Get your facts right

    See More
  • zero trust-freepik1170x658v59703.png

    The fundamentals of implementing a zero trust security policy

    See More
  • executive

    Defense is Your Best Offense: Understanding the Fundamentals of Risk-Based Security

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing