Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why security must be shifted left in a cloud-first strategy

By Dustin Milberg
cloud-enews
February 24, 2021

Companies with cloud-first strategies are growing in number as the benefits of cloud have become more apparent and appetizing in the fallout of the COVID-19 pandemic. However, simply having a cloud-first strategy doesn’t guarantee success in the cloud, cost savings and increased agility. Similarly, security remains a pervasive threat if a process for mitigation is not built into the very foundation of your cloud strategy.

There’s a misnomer in understanding what security should look like, especially when in the cloud, depending on what is being secured. Typically, organizations’ cybersecurity focus tends to fall into two categories:

  • IT workloads – technology that you have regardless of the industry you are in (email, CRM, ERP, etc.)
  • Engineering – the differentiated technology and intellectual property (IP) that you develop to enable you to excel in the market (which you want to keep safest from exposure)

The key is to move beyond securing IT workloads to the security of engineering, which is focused more on growth and innovation. As your business executes its cloud-first strategy, it’s important to recognize that cloud isn’t a destination; it’s a journey. And like any journey, you prepare ahead of time, map your route, and plan for agility.

The two things that businesses care most about protecting are IP and client data. Simply introducing traditional security measures such as Firewalls, Identity and Access Management, Multi-Factor Authentication are no longer sufficient measures in an engineering world where everything-is-code. To fully protect your platform and customer data when agility and speed-to-market are tables takes, security must be shifted as far left as possible, and integrated into the behaviors and culture of how organizations architect, develop and deliver products and services. 

Regulations like GDPR have embraced this far left (or “security by design”) approach to cybersecurity. The US Cyberspace Solarium Commission is advocating for the addition of cybersecurity reporting requirements in the Sarbanes Oxley Act (solarium.gov,  March 2020, Report, Section 4.4.4). Shifting left is a technical and behavioral norm, not an option.

The cloud consumption model has not only changed platform architecture, it has also changed the behaviors of platform contributors, which has given rise to new methodologies for security, such as Zero Trust and Secure Access Service Edge (SASE), which are components of security by design and how an organization builds the right model for their business that emphasizes the best stance for security. It’s about choosing the right infrastructure balanced with the right location (on-premises, colocation or cloud) to meet the quality, scalability and security demands.

Zero-trust security institutes an approach where all users and technology are denied access to all systems, resources, and datasets and must be explicitly granted the lowest level of access required and continually authenticated and re-validated to maintain permission. This approach better assures platform security prior to users or resources being provided access. While more secure, zero-trust requires organizations to design security as part of the platform code to each entity accessing it, which is time consuming and resource intensive.

Many organizations are turning to Secure Access Service Edge (SASE) to address zero-trust for remote access to simplify the approach. Half network and half security, the SASE framework is designed to allow enterprise security professionals to apply identity and context to specify the level of performance, reliability, security, and cost desired for every network session. SASE, in simplistic terms, can be a methodology to accomplish zero-trust policies for remote access in a cloud-native architecture.

As you build and execute according to your cloud-first strategy, cybersecurity must built into the very foundation of that plan. The cloud is not a place where workloads are hosted, rather a strategic approach to consume and deliver resources. Security cannot be an afterthought – it must be embedded into the way organizations behave, and part of the cultural of accountability. Embracing a security-minded culture means changing behaviors that model the culture you want to emerge. Organizations who have demonstrated a culture of security accountability and instituted supporting technical best practices have lower risk, improved customer satisfaction, and outpace the competition. The best practice is to strategically integrate security into the definition-of-done and insist that everyone is accountable for an organizations security posture and it is measurable in the people, process, and technology.

KEYWORDS: cloud security COVID-19 risk management security strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dustin Milberg is a seasoned enterprise technology executive and current Field CTO Cloud Services at InterVision, an IT strategic service provider and Premier Consulting Partner in the Amazon Web Services (AWS) Partner Network (APN). In this role, Dustin focuses on helping customers adopt a holistic approach to developing and delivering sustainable platforms and solutions, while enabling technology organizations to optimize the entire operation: people, process, infrastructure, operations, development, quality, and security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • code-enews

    Don't Shift Left, Start Left: Why Developers Should Be the First Line of Defense

    See More
  • Why Physical Keys Should Still Be a Part of your Security Strategy

    See More
  • infrastructure-security-freepik

    Why cybersecurity infrastructure must be prioritized in light of the IRS leak

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing