Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

3 cybersecurity tips for controlling & monitoring cloud access

By Ian Reay
cloud network
October 13, 2022

Cloud adoption has exploded as organizations seeks operational benefits, such as efficiency and cost reduction. Gartner forecasts that worldwide public cloud spending will reach nearly $500 billion this year. Once organizations have migrated to the cloud, however, their cyber journey isn’t complete.

Security is a shared responsibility between users and cloud providers. Duty of care dictates that organizations need to think about how their data is secured — this extrapolates to how cloud-hosted applications are secured, as well as underlying infrastructure like corporate networks.

Unfortunately, security incidents leading to sensitive data exposure occur often, such as insecure AWS S3 buckets or exposed APIs. Security practitioners have a lot to consider when it comes to cloud access, such as controlling which accounts should be granted access, what their authentication methods are, and monitoring their usage.

Many organizations aren’t doing this well. Too many have an immature security posture and are using spreadsheets to manage accounts and passwords. Users get their credentials provisioned manually by sending an email to someone in IT or security, which opens the organization up to tremendous risk in an area that has proven to be costly.

Three of the top four most expensive attack vectors relate to credentials, according to IBM’s Cost of a Data Breach Report 2022, including phishing ($4.91 million per breach), business email compromise ($4.89 million per breach), and stolen or compromised credentials ($4.5 million per breach), which is the most frequent vector hackers leverage.

Organizations need to up the ante with their security posture. Spreadsheets were never a secure way of managing credentials, and hardening the security posture of that sensitive data doesn’t need to be overly complex or break the bank. Here’s how to get started.

Reassess organizational culture

Humans have a knack for rationalizing, particularly when it comes to security that introduces friction to their ability to gain access to something. They don’t assess risk properly — too many people will repurpose a Netflix password for corporate use because it has a few random numbers in it, not knowing it is on a compromised password list.

This is where policy starts butting heads with philosophy. People may be the best part of an organization, but they’re also the weak link when it comes to cybersecurity. According to the World Economic Forum, 95% of cybersecurity issues can be traced back to human error. This also affects how organizations budget their resources and investments.

Business leaders need to take a balanced approach when it comes to facing these challenges and dispersing budget. It’s easy to turn a blind eye toward security and focus on investing in new capabilities that can increase revenue, but ignoring security increases cyber risk over time. By allocating budget to achieve a sufficient level of protection, business leaders can create a competitive advantage over other organizations and become more resilient.

Qualify for and acquire insurance coverage

Obtaining cyber insurance coverage can increase business resilience and harden organizational security posture. In many sectors, it’s simply too risky to do business without having coverage. But it isn’t as easy as simply filling out a form.

Insurers are starting to limit their risk and have increased premiums by 74% in 2021, according to Fitch Ratings. In order to qualify for coverage, many organizations need to prove they have adequate endpoint detection and response (EDR) and multi-factor authentication (MFA) for network access. According to Beazley, organizations that haven’t implemented MFA are more than twice as likely to suffer a ransomware attack than those that do. Privileged access management (PAM) controls are also highlighted by cyber insurance carriers as beneficial in gaining coverage. A basic password manager is table stakes for PAM controls — a step up from a spreadsheet with sensitive information in it just waiting to be hacked.

Essentially, cyber insurers have become primary drivers for the adoption of modern security tools. The auxiliary benefit of adding those controls is that organizations can qualify for insurance coverage in case the worst does happen. 

Recognize how the cloud is different

Traditional security measures are all about the bubble that is an organization’s on-premises network. The focus used to be on securely getting inside the bubble, and then everything was fair game. Employees were trusted and access was broad. In the cloud, the bubble is much harder to establish and the stakes are raised for which identities should be trusted to gain access to which resources.

Cloud migration changes organizational cyber environments and potentially increases cyber risk. This is why tools like MFA and thorough PAM controls are important — it’s essential to know where passwords are and how users are getting access.

What was acceptable for securing an on-premises corporate network just a few years ago won’t cut it in the cloud today. Cybersecurity professionals need to consider everything from account details to authentication methods and look at security through the lens of zero trust to make sure cybersecurity teams are granting access without putting their organizations in danger.

Moving to the cloud is an exciting chapter for any organization, but cyber leaders need to make sure they have the proper controls in place so security can keep pace with the speed of business innovation.

KEYWORDS: cloud migration cyber insurance endpoint security human error multi-factor authentication password management

Share This Story

Ian reay headshot

Ian Reay is Vice President of Engineering at Bravura Security. Reay has played a crucial role in the development of security solutions at Bravura Security (formerly Hitachi ID). He began at the company as a developer, advancing to a team lead, and most recently has assumed the position of Vice President of Engineering, where he oversees all elements of product conception, development, and delivery to the market.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!