Cloud security
Home >> Cloud security
Overview
Cloud security refers to the set of technologies, policies, controls, and best practices used to protect data, applications, and infrastructure hosted in cloud environments.
Key Components of Cloud Security
Identity and Access Management (IAM)
- Controls who can access what.
- Multi-factor authentication (MFA)
- Least privilege access
- Role-based access control (RBAC)
Data Security
- Protects data at rest, in transit, and in use.
- Encryption
- Tokenization
- Secure key management (e.g., KMS)
Network Security
- Protects cloud networks.
- Firewalls and security groups
- Zero-trust network architecture
- DDoS protection
Application Security
- Ensures applications running in the cloud are secure.
- Secure coding practices
- Vulnerability scanning
- Runtime monitoring
Cloud Monitoring & Logging
- Tracks events and identifies threats.
- SIEM systems (e.g., Splunk, Azure Sentinel)
- Cloud-native logs (CloudTrail, CloudWatch, etc.)
Compliance & Governance
- Meets industry requirements.
- GDPR, HIPAA, PCI-DSS, ISO 27001
- Policy enforcement and auditing
Shared Responsibility Model
- Every cloud provider follows this principle:
- Cloud provider -> Secures the hardware, physical network, and data centers.
- Customer Secures -> data, access, configuration, and applications.
The responsibilities differ slightly for laaS, PaaS, and SaaS.