Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesLogical SecurityAccess Management

The 5 pillars of cloud security for data storage

By Faye Ellis
cloud-and-tablet.jpg

Image via Pixabay

May 31, 2023

Like any data storage system, the cloud comes with a fair amount of security risks. Rather than debating the ways that the cloud is or isn’t inherently secure, leaders should question whether they are using the cloud securely. While cloud security adopts a shared responsibility model between organizations and the cloud providers, at the end of the day, the biggest risk to a cloud environment is the misconfiguration and misuse of solutions, not whether or not cloud providers are doing their jobs.

As organizations adopt single and multicloud environments at increasing rates, it’s imperative that critical applications and sensitive data are safeguarded. While every cloud solution is different, there are baseline best practices to ensure a cloud environment is protected against breaches and bad actors alike. Basic security practices, such as implementing multi-factor authentication, keeping operating systems and security patches up to date and restricting public access to only what’s needed, can help mitigate common risks. From there, technologists can begin building their tailored approach around the five pillars of cloud security.

1. Identity and access management 

People are enterprises’ largest security risks. In our current economic climate, employees are leaving and changing jobs at unprecedented rates. If technologists aren’t diligent about removing user accounts from their systems and effectively managing access permissions, organizations are left vulnerable to attack. Enter: Identity and access management (IAM). The principle of least privilege gives developers access to only the services they need to deploy their applications, and role-based access controls mapped to job functions help define access to cloud resources. Additionally, logging allows IT leaders to monitor access to ensure these policies are enforced. 

2. Infrastructure protection 

Zero-Trust is often touted as the most effective security framework, but in reality, we can never fully remove risk for applications because they must be accessible to customers, partners and third parties. Instead, focus on variable trust, which dictates who is allowed to access what within your systems. Though it might sound overwhelming to manage, all major cloud providers offer tools that fulfill this purpose, allowing users to offload some security responsibilities to managed services.

3. Data protection 

For optimized data protection, it is crucial for organizations to leverage two forms of encryption: data in transit and data at rest. Data in transit refers to information moving through a network, while data at rest refers to data that is kept in persistent storage.

To protect data in transit, it’s essential to utilize industry-standard security protocols such as Transport Layer Security (TLS) and IPsec. These protocols are supported by major cloud providers and ensure that data is protected as it moves within the cloud or between on-premise data centers and cloud resources. Encryption in transit helps prevent man-in-the-middle attacks that can lead to data theft, credential theft, or data corruption.

Encryption at rest is just as important, as it secures data held within databases, data lakes, or buckets in cloud providers. All major cloud providers support AES 256-bit encryption, which makes it impossible for an attacker to access or read data without the encryption key.

4. Detection controls 

Detection controls are essential for identifying weaknesses in organizational or application security and enabling prompt action. The bad news: data breaches are primarily caused by misconfigurations. The good news: all major cloud providers offer native tools that can actively scan for vulnerabilities, misconfigurations, suspicious activities and compromised instances. Some of these tools can also provide alerts if an instance is engaging with a known malicious network, contacting a command and control server, or exhibiting unusual behavior. This functionality ensures that organizations are promptly alerted to any suspicious activity and can take steps to mitigate risks before they cause harm.

5. Incident response 

IT leaders should aim to automate the incident response process as much as possible. For example, most cloud providers provide the ability to create serverless functions that can be used to remediate common scenarios, automating the most basic of incident response tasks to free up time for security teams and allow them to focus their energy on more complex incidents that require human interference. 

Cloud security is a team effort 

Building a customized cloud environment around these five security pillars will help protect organizations against breaches and cyberthreats, but it’s imperative to consistently test and reevaluate technology solutions to mitigate cloud data security challenges. Cloud security is truly a team effort, and it’s essential to build a team with diverse experiences and background—particularly in areas like incident response.  A diverse team of skilled technologists will more astutely detect blind spots, ultimately improving overall cloud security posture.

KEYWORDS: cloud security data breaches data loss prevention data management data protection encryption incident response

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Faye Ellis is the Principal Training Architect at Pluralsight.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Enhances Security for Cloud Data Storage and Data Centers

    See More
  • surveillance camera in city

    44% of organizations utilize hybrid-cloud for data storage

    See More
  • cloud-and-tablet.jpg

    The 5 most important aspects of a comprehensive cloud security program

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing