TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/definition/cloud-security

What is cloud security?

By Mary E. Shacklett

Cloud security, or cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats. It encompasses securing cloud-based resources, including data centers, servers, networks and virtual machines (VMs).

Cloud security addresses unique challenges such as shared responsibility models, multi-tenancy, data privacy and compliance requirements. The primary concern of cloud security is data privacy and protection during data transfer.

Cloud security is a broader discipline than cybersecurity but has the same goals. However, it differs from traditional cybersecurity because it requires administrators to secure assets within a third-party service provider's infrastructure.

Why cloud security is important

Companies outsource IT data, systems and applications to third-party cloud service providers (CSPs). When IT departments enter into contractual agreements with CSPs, it is understood that the CSP will be responsible for securing the underlying cloud infrastructure. Because no organization or CSP can eliminate all security threats and vulnerabilities, business leaders must balance the benefits of outsourcing cloud services against the data security risk their organizations are willing to assume.

Cloud security is vital for the following:

How cloud security works

Cloud computing operates in the following three main environments:

  1. Public cloud services. Third-party CSPs own and host public clouds. These include software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). Public cloud services, including cloud security services, are available to anyone who wants to use or purchase them. Typically, cloud security in the public cloud focuses on protecting data from distributed denial-of-service attacks (DDoS), malware, hackers and unauthorized access.
  2. Private clouds. Private clouds are hosted by or for a single organization and are not shared with others. Cloud security in private clouds enables organizations to have more control over their data and resources while taking advantage of the cloud's scalability and other benefits.
  3. Hybrid clouds. These include a mix of public clouds, private clouds and on-premises data centers. Cloud security in hybrid clouds involves securing data and apps running in the cloud, other cloud environments and on-premises. It also requires uniform security options, policies and practices for protection across various cloud providers.

As a result, cloud security mechanisms take two forms: those supplied by CSPs and those enforced by customers. Security is rarely the complete responsibility of the CSP or the customer. It is usually a joint effort using a shared responsibility model.

Types of cloud security

Cloud security encompasses various measures taken to protect data, infrastructure, applications and the integrity of cloud environments.

Security as a service is a subset of SaaS. The Cloud Security Alliance defines the following security-as-a-service categories:

  1. Identity access management (IAM).
  2. DLP.
  3. Web security.
  4. Email security.
  5. Security assessments.
  6. Intrusion management.
  7. Security information and event management (SIEM).
  8. Encryption.
  9. BC and disaster recovery.
  10. Network security.
  11. Continuous monitoring.
  12. Penetration testing.
  13. Vulnerability scanning.

These include firewall as a service, cloud-based virtual private networks and key management as a service. Secure access service edge and zero-trust network access are also becoming popular cloud security models.

Top cloud security challenges

The following cybersecurity challenges exist in the cloud:

Security administrators must implement processes to identify and mitigate emerging cloud security threats. These threats typically revolve around newly discovered exploits found in applications, OSes, VM environments and other network infrastructure components. Organizations must quickly and properly update and patch the software they control to handle these security challenges and eliminate emerging threats.

Establishing communication channels between in-house IT and CSP staff is also essential. In-house staff should subscribe to, monitor and digest the CSP's security bulletin stream. Well-documented communication channels must be established and continuously updated so time isn't wasted when working through a security breach.

Cloud security tools

Many of the same tools used in on-premises environments can be used in the cloud, although cloud-specific versions of them might exist. These tools and mechanisms include encryption, IAM and single sign-on, DLP, intrusion prevention systems and intrusion detection systems, and public key infrastructure.

Some cloud-specific tools include the following:

Cloud security best practices

There are separate security SaaS best practices, PaaS best practices and IaaS best practices. Organizations should also adhere to several general cloud security best practices, including the following:

  1. Understand the shared responsibility model. Organizations should understand the responsibilities of their CSPs and security teams, focusing on how they connect to the cloud and control data and access.
  2. Choose CSPs wisely. Businesses should know what security controls the cloud vendors offer and diligently review contracts and service-level agreements.
  3. Adopt an IAM policy. Organizations should implement a granular IAM policy based on the principle of least privilege and strong passwords.
  4. Enforce encryption. Data should always be encrypted, whether at rest, in use or in motion.
  5. Conduct continuous monitoring. Companies should maintain cloud visibility through continuous monitoring. Regular monitoring helps them stay on top of security-related feature updates from cloud providers and establish incident response practices.
  6. Establish and enforce cloud security policies. A cloud security policy outlines the procedures and controls governing data security, applications and infrastructure in cloud environments. It helps ensure that security measures are consistently applied across the organization's cloud deployments and align with regulatory requirements and industry best practices.
  7. Provide security training. Companies should conduct security awareness training for employees, third-party partners and anyone accessing organizational cloud resources.
  8. Perform cloud segmenting. Cloud segmentation involves dividing cloud environments into unique segments or zones based on access requirements, data sensitivity and security controls. Segmenting cloud resources enables organizations to set up granular access controls, ensuring that users and apps only have access to the required resources.
  9. Consider using CIEM. CIEM software is specifically designed to monitor user activities in the cloud. It can provide granular visibility into cloud-based user activities.
  10. Implement strong access controls. Multifactor authentication and rigorous password policies should be enforced.
  11. Ensure safe APIs. All APIs should have strong authentication and encryption and be tested regularly for vulnerabilities.
  12. Consult the Cybersecurity Security Information Sheets. The Cybersecurity and Infrastructure Security Agency and the National Security Agency have released joint Cybersecurity Information Sheets to provide organizations with recommended best practices and mitigations to improve the security of their cloud environment.

Future of cloud security

Cloud security is rapidly evolving, with several emerging trends and technologies shaping its future. According to IBM's "Cost of Data Breach Report 2024," the highest average cost per incident of breached data stored in cloud-based systems reached $5.17 million in 2024. Given the notable surge in cloud-based attacks, it is imperative for companies embracing cloud technology to prioritize strong security measures.

The following are some emerging trends shaping the future of cloud security:

Many organizations lack the in-house cloud security expertise and resources to adequately protect cloud assets during their transition to hybrid and multi-cloud infrastructures. Learn the benefits of outsourcing cloud security and explore the pros and cons of managed cloud security services.

14 Apr 2025

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement