Cloud Security Best Practices

The controls that actually prevent breaches, ranked by how often the absence of each one shows up in real cloud incident reports. Vendor-neutral, with trade-offs called out.

Close-up of a checklist with green checkmarks
Photo by Towfiqu barbhuiya on Pexels

ยท ยท Vendor-neutral ยท View source on GitHub

The honest version: Most "cloud security best practices" lists are 100 items long and unranked, which is the same as not having a list. The bullets below are ordered by what actually appears as the root cause in our breach kill chains. Master the first three sections and you'll prevent the majority of cloud incidents seen in industry. The later sections are where mature programs differentiate.

If a practice isn't here, that's not because it doesn't matter โ€” it's because we're calling out the high-leverage ones. Pair this page with the cloud security overview for foundational concepts and the certifications guide if you want to formalize.

๐Ÿ“– On this page

  1. Identity & access (most important)
  2. Configuration & posture
  3. Network controls
  4. Data protection & secrets
  5. Logging & detection
  6. Supply chain & CI/CD
  7. Workload & container security
  8. AI & LLM workloads
  9. Governance & people
  10. Anti-patterns: things to stop doing

The 8 practice areas

Ranked roughly by how often the absence of each shows up in real cloud incidents. Click any tile to jump to its details:

Cloud security maturity model Four stages from reactive to optimized, each with characteristic practices and tooling. Cloud security maturity โ€” most teams sit between Stage 2 and 3 1. REACTIVE "Find out from a breach" Manual fixes only No central logging Ad-hoc IAM No posture scans "We'll figure it out" 2. DEFINED "Written policies" CIS benchmarks Periodic scans Centralized logs Quarterly reviews PDFs nobody reads 3. MANAGED "Continuous detection" CSPM / CNAPP live IaC scanning Auto-tickets ATT&CK-mapped SLA-tracked alerts 4. OPTIMIZED "Self-healing" Toxic-combo detect Auto-remediation Threat hunting Resilience drills Few teams reach here
The practices below are roughly ordered by where they show up in this maturity ladder โ€” start with the Stage 2 essentials, layer Stage 3 tooling once those are in place.

Identity & access (most important)

If you only fix one category, fix this one. Identity is the perimeter โ€” every cloud breach we've documented involves an identity failure somewhere in the chain.

Cloud identity hierarchy Top-down view of how cloud identity nests: Organization at the top, then accounts, then roles and service principals, then identities, then permissions. Cloud identity hierarchy โ€” controls cascade down, blast radius cascades up ORGANIZATION SCPs / Org policies / Tenant root AWS Account workload-isolation boundary Azure Subscription billing + RBAC scope GCP Project resource container IAM Roles & Service Principals trust policy + permission policy Managed Identities + App Registrations Service Accounts & Workload ID project-scoped + GKE WI Human users SSO + MFA + JIT Workload identities no long-lived keys External / federated OIDC, SAML Down โ†“ controls (least privilege at every level) Up โ†‘ blast radius (one over-privileged role can break the org)
The deeper a permission lives, the more painful misconfiguration is at the top. SCP / org-policy at the root is the cheapest control by orders of magnitude.
In the cloud, identity is the new perimeter โ€” and most cloud breaches involve at least one identity failure. โ€” why the section above is first, not last

Configuration & posture

Misconfigurations are the second-most-common breach root cause. The good news: posture management tools have made this category solvable for most organizations.

Network controls

Cloud networks aren't perimeters in the on-prem sense, but the controls still matter โ€” especially for limiting lateral movement and exfiltration.

Data protection & secrets

A business analyst reviews a colorful bar chart and documents at a desk
Photo by RDNE Stock project on Pexels
A diverse group of professionals engaged in a collaborative office meeting with laptops
Photo by Yan Krukau on Pexels

Logging & detection

You can't respond to what you don't see. The SolarWinds, Capital One, and LastPass incidents all had detectable activity that nothing was watching for.

Supply chain & CI/CD

Modern attackers pivot through your build pipeline. SolarWinds is the canonical case; the npm/PyPI typosquats and the Codecov compromise are routine.

Workload & container security

AI & LLM workloads

The newest category and the one with the most movement. Treat AI workloads as agentic systems with tool access โ€” because that's what they are.

Zero Trust core principles The three foundational principles of zero trust: verify explicitly, use least privilege access, and assume breach. Zero Trust โ€” three principles, applied everywhere ZERO TRUST "Never trust, always verify" VERIFY EXPLICITLY Every request, every time โ€ข Phishing-resistant MFA โ€ข Device posture checks โ€ข Conditional access โ€ข Continuous re-auth LEAST PRIVILEGE Just enough, just in time โ€ข Role-based access โ€ข JIT elevation (PIM) โ€ข Short-lived credentials โ€ข Continuous review ASSUME BREACH Limit blast radius โ€ข Micro-segmentation โ€ข Encrypt everything โ€ข Detection & response โ€ข Tabletop drills
Apply all three at every layer of the defense-in-depth stack โ€” at the perimeter, at the network, at identity, at workloads, at data.

Governance & people

Compliance framework overlap Three-circle Venn diagram showing how SOC 2, ISO 27001, and PCI DSS share a common control core, with framework-specific extensions on the outside. Compliance frameworks share more than they don't SOC 2 trust services criteria ISO 27001 ISMS standard PCI DSS card-data specific Auditor attestation Risk register + Annex A Network seg, no stored PAN + Encryption at rest + Vuln management + Change mgmt SHARED CORE access control ยท MFA logging ยท backups
Most cloud configuration evidence (CloudTrail, IAM policies, encryption settings) maps to all three frameworks. Build the controls once; tag them per-framework for the auditor.

Anti-patterns: things to stop doing

The flip side. If you see any of these in your environment, fix them before working on more sophisticated controls.

Where next