What is Cloud Security?

The vendor-neutral guide. What it is, who's responsible for what, the threats that matter, the tool landscape, and how to start learning โ€” written by practitioners, not a vendor's marketing team.

Abstract illustration depicting digital neural networks and data flow
Photo by Google DeepMind on Pexels

ยท ยท Vendor-neutral ยท View source on GitHub

The 60-second version: Cloud security protects data, identities, and workloads running on AWS, Azure, GCP, and similar platforms. The cloud provider secures the underlying platform; you secure how you configure and use it. Most real breaches come from misconfigurations, over-privileged IAM, stolen credentials, or insecure APIs โ€” not exotic zero-days. The toolkit is built around posture management (CSPM), workload protection (CWPP), entitlement analysis (CIEM), and increasingly the all-in-one CNAPP platforms.

๐Ÿ“– On this page

  1. What cloud security actually is
  2. The shared responsibility model
  3. The core pillars of cloud security
  4. The threats that matter
  5. The tool landscape (CSPM, CNAPP, CWPP, CIEM)
  6. How to get started
  7. Frequently asked questions

What cloud security actually is

Cloud security is the practice of protecting data, applications, identities, and infrastructure that run on cloud platforms โ€” primarily Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), but also second-tier providers like Oracle Cloud, IBM Cloud, and Alibaba Cloud, plus the SaaS layer (Microsoft 365, Salesforce, Snowflake, GitHub, and so on).

It is not a single product or a single team. In a mature organization, cloud security spans configuration management, identity and access, network controls, data protection, application security, threat detection, incident response, and compliance โ€” all running across hundreds or thousands of accounts, subscriptions, and projects.

If you're new to the field, see the cloud security glossary for plain-English definitions of the acronyms in this article.

The shared responsibility model

The single most important concept in cloud security is the shared responsibility model. Cloud providers secure some things; you secure the rest. The line moves depending on the service.

The classic framing:

Where the line sits depends on the service model:

Almost every notable cloud breach comes down to a customer-side failure โ€” not a provider compromise. The Capital One, Snowflake/UNC5537, Microsoft Storm-0558, and LastPass incidents are all instructive. See the breach kill chains for full step-by-step analyses.

Almost every notable cloud breach comes down to a customer-side failure โ€” not a provider compromise. โ€” from the shared responsibility model section above

The core pillars of cloud security

You can carve up cloud security a dozen ways. The pillars below are the ones most teams organize around.

Identity and access management (IAM)

In the cloud, identity is the new perimeter. Every API call is authenticated and authorized against an identity โ€” a user, a role, a service principal, a workload identity. Strong IAM means least-privilege policies, no long-lived access keys where you can avoid them, MFA everywhere, and continuous review of who can do what. Most cloud breaches involve at least one identity failure: an over-privileged role, a leaked key, a phished session token.

Configuration and posture

The cloud is a giant configuration surface. Public S3 buckets, open security groups, unencrypted disks, disabled logging, weak password policies โ€” these are the day-to-day failure modes. CSPM tools exist to find them at scale and keep them fixed.

Network security

VPCs, subnets, security groups, network ACLs, private endpoints, transit gateways, service meshes. The principles are familiar โ€” segment, restrict, monitor โ€” but the implementation is provider-specific and changes constantly.

Data protection

Encrypt data at rest and in transit, manage keys (KMS, Key Vault, Cloud KMS), classify what's sensitive, and prevent exfiltration. Increasingly this also means thinking about what data you let LLMs and AI services see.

Application and workload security

Secure code, dependency scanning, container image hardening, runtime protection for VMs and Kubernetes, serverless function security. CWPP and CNAPP platforms cover much of this.

Threat detection and response

CloudTrail, Azure Activity Log, GCP Audit Logs feeding a SIEM. Provider-native services like GuardDuty, Defender for Cloud, and Security Command Center. Detection content mapped to MITRE ATT&CK Cloud techniques. A response runbook for when something fires.

Compliance and governance

SOC 2, ISO 27001, PCI DSS, HIPAA, FedRAMP, GDPR, the NIS2 Directive. Most of this is "did you implement controls and can you prove it" โ€” and most of the proof comes from configuration evidence the cloud already produces.

The threats that matter

Forget "advanced persistent threats" for a minute. The breaches that actually happen tend to come from a small set of repeatable patterns:

Misconfiguration

Public buckets, exposed databases, open admin endpoints, missing logging.

Over-privileged identities

A workload with *:* when it needed read-only on one bucket. Capital One.

Credential theft

Phishing, info-stealers, hardcoded secrets, leaked CI tokens. Snowflake/UNC5537.

Insecure APIs & SSRF

Apps coerced into calling internal endpoints, including the metadata service. IMDSv2.

Supply-chain compromise

Poisoned dependency, compromised CI step, malicious GitHub Action. SolarWinds.

Account takeover

MFA fatigue, session theft, helpdesk social engineering. Scattered Spider/MGM.

Insider risk

Departing engineers, over-broad access, audit gaps no one was watching.

AI/LLM-specific risks

Prompt injection, data leakage via outputs, agents with too much authority.

Real attacks chain several of these together. To see exactly how, walk through the cloud breach kill chains, all mapped to MITRE ATT&CK Cloud techniques.

Defense in depth โ€” layered cloud security Six concentric layers from outermost (perimeter) to innermost (data), each with its own controls. Defense in depth โ€” every layer has its own controls PERIMETER DDoS ยท WAF ยท CDN NETWORK VPC ยท SGs ยท segmentation IDENTITY IAM ยท MFA ยท SSO WORKLOAD VMs ยท containers ยท K8s APP SAST ยท deps ยท runtime DATA crown jewels
One control per layer is brittle. Stack controls so a single failure doesn't reach the data.

The tool landscape (CSPM, CNAPP, CWPP, CIEM)

The acronym soup is real. Here's a working map of the major categories:

The CNAPP umbrella CNAPP is the umbrella category that bundles CSPM, CWPP, CIEM, DSPM, and IaC scanning into a single platform. CNAPP Cloud-Native App Protection CSPM Posture Public buckets, open SGs, missing logs CWPP Workload VMs, containers, runtime, vuln scan CIEM Identities Who can do what; unused privileges DSPM Data Find, classify, track sensitive data IaC scan Pre-deploy Terraform, CFN, K8s manifests
CNAPP bundles the previously separate categories into one platform. The market is consolidating fast.

For specific tools, hands-on labs, and certifications, see the cloud security resources catalog.

Hand holding a brass padlock, symbolizing security and protection
Photo by Nathan Thomas on Pexels

How to get started

If you're trying to break into cloud security or level up, the path that actually works for most people:

  1. Pick one cloud. AWS, Azure, or GCP. Don't try to learn three at once. AWS has the deepest community and the most learning material.
  2. Learn IAM and networking first. Almost every breach involves one or both. The provider's free training (AWS Skill Builder, Microsoft Learn, Google Cloud Skills Boost) is fine for fundamentals.
  3. Practice on intentionally vulnerable environments. CloudGoat, flAWS, EntraGoat, CNAPPGoat, and PwnedLabs let you exploit and defend without getting fired. See our cloud security CTF directory.
  4. Read real breach post-mortems. Understanding how Capital One, SolarWinds, Snowflake, MGM, and LastPass actually happened teaches more than any textbook. Walk through the breach kill chains.
  5. Pick up one foundational certification. CCSK (Cloud Security Alliance) is vendor-neutral and a great anchor. AWS Security Specialty, Microsoft SC-100/AZ-500, and Google's Cloud Security Engineer are the provider-specific options. See our cloud security certifications guide.
  6. Join a community. Talking to practitioners is how you learn what's actually current. CSOH meets every Friday on Zoom, free, no marketing.

For a structured plan with specific milestones, see the cloud security learning path.

Frequently asked questions

Is cloud security different from regular cybersecurity?

The principles are the same. The implementation is wildly different. In on-prem environments you control the network and physical access; in the cloud you don't. Identity becomes the perimeter. Configuration becomes the attack surface. Everything is API-driven, which means everything is automatable โ€” both for defense and for attackers.

Do I need to know how to code?

Not to start. You will pick up Python and shell over time, plus enough Terraform or CloudFormation to read what your team is deploying. Reading code matters more than writing it for most cloud security roles.

How long does it take to get a cloud security job?

It depends entirely on your starting point. A working sysadmin or network engineer can usually transition in 6โ€“12 months of focused learning plus a cert. Someone starting from zero is more like 1โ€“2 years. Hands-on labs and a portfolio of CTF write-ups beat passive coursework.

What's the salary like?

In the US, cloud security engineers typically land in the $130kโ€“$220k range depending on location, seniority, and whether you're at a big tech company. Specialized roles (cloud incident response, detection engineering, CNAPP architects) trend higher. Outside the US, ranges vary substantially โ€” check local sources.

Should I pay for a bootcamp?

Usually no. The free and low-cost material is excellent if you're disciplined: official provider training, CSA's CCSK study guide, PwnedLabs, our resources catalog, and the CTF directory. Pay for SANS or a focused cert lab if your employer is footing the bill.

What's CNAPP and do I need to care?

CNAPP is the all-in-one cloud security platform category โ€” CSPM + CWPP + CIEM in one tool. If you're an operator at a company buying tools, you'll almost certainly evaluate CNAPP vendors. If you're learning, focus on the underlying concepts (posture, workload, entitlement, runtime) and the products will make sense.

Ready to go deeper?

Pick your next step: