Cloud Security
The comprehensive set of policies, controls, technologies, and practices designed to protect cloud-based infrastructure, applications, and data from threats, ensuring confidentiality, integrity, and availability in cloud computing environments.
Cloud security addresses the unique challenges of protecting resources in cloud computing environments, where the shared responsibility model distributes security obligations between the cloud provider and the customer. In Infrastructure as a Service (IaaS), the provider secures the physical infrastructure while the customer is responsible for operating systems, applications, and data. In Platform as a Service (PaaS), the provider additionally manages the runtime environment. In Software as a Service (SaaS), the provider handles most security layers, but the customer retains responsibility for access management, data classification, and configuration. Understanding and correctly implementing the shared responsibility model is fundamental to cloud security.
Cloud security is relevant across all compliance frameworks, even though most standards were written before cloud adoption became widespread. ISO 27001 applies fully to cloud environments, and ISO 27017 provides additional cloud-specific security controls. SOC 2 examinations frequently evaluate cloud infrastructure security, and cloud providers often maintain their own SOC 2 reports that customers can leverage. GDPR applies regardless of where data is processed — cloud deployments must meet the same data protection requirements as on-premises systems, with additional considerations for cross-border data transfers when cloud regions span jurisdictions. NIS2 explicitly addresses cloud computing services and requires appropriate security measures. In technology due diligence, cloud architecture, configuration security, and the use of cloud-native security services are key assessment areas.
Practical cloud security encompasses multiple domains: identity and access management (IAM policies, service accounts, least privilege), network security (VPCs, security groups, private endpoints), data protection (encryption at rest and in transit, key management), workload security (hardened images, container security, serverless security), configuration management (cloud security posture management, infrastructure as code), monitoring and logging (cloud-native logging services, SIEM integration), and compliance automation (continuous compliance checking against benchmarks like CIS). Organizations should implement cloud security baselines aligned with frameworks such as the CIS Benchmarks, use infrastructure as code to enforce consistent security configurations, and regularly assess their cloud security posture using automated scanning tools.
Related frameworks
Related terms
Container Security
The practices and tools used to protect containerized applications throughout their lifecycle, from securing container images and registries to runtime protection, orchestration security (e.g., Kubernetes), and network policies within container environments.
Encryption
The process of converting data into an encoded format that can only be read by authorized parties who possess the correct decryption key. Encryption protects data confidentiality both at rest (stored data) and in transit (data being transmitted over networks).
Identity and Access Management
The framework of policies, processes, and technologies that manages digital identities and controls user access to critical systems and data. IAM encompasses identity lifecycle management, authentication, authorization, single sign-on, directory services, and privileged access management.
Network Segmentation
The practice of dividing a computer network into smaller, isolated segments or subnets to limit lateral movement, contain security breaches, and enforce granular access policies between network zones.
Zero Trust Architecture
A security model that eliminates implicit trust based on network location and instead requires continuous verification of every user, device, and request before granting access to any resource, operating on the principle of 'never trust, always verify.'
Assess your compliance posture
Run a free self-assessment for ISO 27001, SOC 2, GDPR, NIS2, or Tech DD and see exactly where you stand.
Start free assessment