Cloud Security 101


It seems that hardly a week goes by without hearing about a cloud security breach. In late April 2021, there were several, including one from Eversource Energy, another from LogicGate and repercussions from a January breach from Ubiquiti that has been described as “catastrophic.”
Those incidents came as researcher Canalys reported that there were “more records compromised in 12 months than in the previous 15 years combined.” That analysis came despite the fact that cybersecurity investment grew 10 percent in 2020 to $53 billion.
One possible reason for this is, as Canalys believes, companies are still under-investing in security.

Identity Management and Cloud Security

In such a system, in which users could theoretically be anywhere, a cloud computing system needs a robust identity management framework.

For instance, Whole Foods, the supermarket chain, uses Azure Active Directory Premium. In 12 weeks, Whole Foods rolled out Azure Active Directory Premium to all of its 91,000 employees. Such employees use a single sign-on to access more than 30 software as a service (SaaS) applications.

In addition, users with an administrative role should enable multi-factor identification. It’s also imperative to audit any custom role definitions to ensure that none contain unnecessary administrative permissions that could instead be assigned via default roles.

Azure AD Identity Protection team constantly analyzes data to look for weak, compromised or commonly used passwords. When they’re found, they go on a globally banned passwords list.

Cloud Computing Basics

Cloud Computing is more than 20 years old. The earliest known reference to it was in a Compaq internal document in 1996. The term was popularized in the early 2000s and Google’s then-CEO Eric Schmidt used “cloud computing” as a descriptor at a conference in 2006. However, the notion of network computing dates back to the 1960s. The growth of cloud computing has been dramatic. As of 2018, some 73 percent of organizations say they have at least one application, or a portion of their computing infrastructure in the cloud.
That growth may make it seem that corporate concerns about the cloud have been put to rest, but that’s not the case. Why is cloud security still a concern? One reason is the multiplicity of ways for hackers to attack the cloud. A 2020 checkpoint survey found 15 cloud security issues and threats including malicious insiders, data loss/leakage and data privacy/confidentiality.
As we’ve seen, those security issues haven’t put a crimp in proposed cloud spending. Perhaps it boils down to optimism and the industry’s track record at keeping hackers at bay.

Visibility and Compliance for Cloud Security

Everyone doing business in the cloud needs an inventory of what it has in the cloud: servers, cloud provider services, users and cloud tools like load balancers. Ideally, a cloud security system would automate the inventory process.

Labeling is also important. Label data and its level of sensitivity. Such a solution should also allocate where specific data types can reside. An SaaS application should be stored with consideration as to the data will be publicly exposed and who may access it. Cloud-access security broker (CASB) tools stipulate role-based data access, adding another layer or protection.

Azure uses a Secure Score in Azure Security Center to monitor a user’s risk profile and continuously improve their security posture. It is recommended that users set up a regular cadence (typically monthly) to review their Azure score and plan initiatives with specific improvement goals. Microsoft also recommends gamifying the activity if possible to increase engagement and focus from the responsible teams.

Cloud Security Threat Detection

To carry on effective cloud security, inspecting activity needs to automatically and continuously detect any malicious activity. Microsoft employs several services to detect threats, including Azure Defender, which brings advanced, intelligent protection to your Azure and hybrid resources and workloads, and Azure Sentinel, a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.


Cloud computing security is a never-ending commitment. The best defense in such a circumstance is not a single piece of software, but a commitment from a large, tech-savvy organization that has been dealing head-on with security threats for more than 40 years. Microsoft invests more than a billion dollars a year into security to keep its partners’ systems secure against new threats. As we’ve seen, such new threats are emerging all the time, so the best protection is the commitment of a committed partner.

>>> Readmore: Simple Ways to Improve IoT Security

NMS provides support, consulting services for setting up and maintaining information technology systems. Our focused customers are medium and small-sized enterprise who want to outsource IT services so that they can focus on their main businesses while ensuring their IT platform under continuous & secured professional operation and support.

Contact to us:

Hot news

Related posts