← Back|CYBERSECURITYβ€ΊSection 1/16
0 of 16 completed

Cloud security

Intermediate⏱ 14 min readπŸ“… Updated: 2026-02-17

Introduction

Netflix, Uber, Airbnb, Swiggy β€” ella companies um cloud la run aaguranga. 92% of organizations cloud use pannuranga. But cloud la data store pannaa security enna aaagum? πŸ€”


Cloud security is different from traditional security. Un office la server iruntha nee physical ah lock pannalaam. Cloud la? Provider kitta infrastructure irukku, un kitta data and application irukku.


Indha article la cloud security fundamentals, shared responsibility, common mistakes, and best practices β€” ellam paapom! β˜οΈπŸ”’

Shared Responsibility Model

Cloud security la most important concept β€” Shared Responsibility Model:


LayerIaaS (EC2)PaaS (RDS)SaaS (Gmail)
**Data**You πŸ‘€You πŸ‘€You πŸ‘€
**Application**You πŸ‘€You πŸ‘€Provider ☁️
**OS/Runtime**You πŸ‘€Provider ☁️Provider ☁️
**Network**Shared 🀝Provider ☁️Provider ☁️
**Infrastructure**Provider ☁️Provider ☁️Provider ☁️
**Physical**Provider ☁️Provider ☁️Provider ☁️

Simple ah sonna:

  • ☁️ Cloud Provider: Building security, hardware, network infrastructure
  • πŸ‘€ You: Data, access control, application configuration, encryption

Analogy: Apartment la irukkura maari β€” building security apartment owner paapparu, but un flat lock pannuradhu un responsibility! 🏠

Top Cloud Security Threats

Cloud Security Alliance (CSA) top threats:


1. Misconfiguration πŸ”§ β€” #1 Threat!

  • Public S3 buckets, open security groups
  • Default credentials, unnecessary permissions
  • 2023 la 65% of cloud breaches misconfiguration dhaan!

2. Insecure APIs πŸ”Œ

  • Weak authentication on APIs
  • No rate limiting
  • Sensitive data in API responses

3. Lack of Cloud Security Architecture πŸ—οΈ

  • Lift-and-shift without security redesign
  • No network segmentation
  • Missing monitoring and logging

4. Insufficient Identity Management πŸ‘€

  • Over-privileged IAM roles
  • No MFA for admin accounts
  • Shared credentials

5. Account Hijacking 🎭

  • Phishing for cloud console credentials
  • Stolen API keys in GitHub repos
  • Session hijacking

6. Insider Threats πŸ•΅οΈ

  • Disgruntled employees
  • Accidental data exposure
  • Shadow IT (unapproved cloud services)

Real Breach: S3 Misconfiguration

βœ… Example

Capital One Breach (2019) β€” 106 million customers affected! 😱

What happened:

1. AWS WAF (Web Application Firewall) misconfigured

2. Attacker SSRF (Server-Side Request Forgery) exploit pannaru

3. EC2 instance metadata access pannaru

4. IAM role credentials steal pannaru

5. S3 buckets la irundhu massive data download

Root cause: Over-privileged IAM role + WAF misconfiguration

Lesson:

- βœ… Least privilege IAM roles

- βœ… IMDSv2 use pannunga (metadata protection)

- βœ… Regular security audits

- βœ… CSPM tools use panni misconfigurations detect pannunga

Cost: $300 million+ in fines and remediation! πŸ’Έ

Cloud IAM β€” Identity & Access

Cloud la IAM (Identity and Access Management) is king! πŸ‘‘


AWS IAM Best Practices:

  • πŸ” Root account use pannaadheenga β€” IAM users create pannunga
  • πŸ”‘ MFA enable pannunga β€” especially admin accounts
  • πŸ“‹ Least privilege β€” minimum permissions mattum
  • πŸ”„ Key rotation β€” Access keys regularly rotate pannunga
  • πŸ“Š CloudTrail β€” All API calls log pannunga

IAM Policy Example:

json
{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Action": "s3:GetObject",
    "Resource": "arn:aws:s3:::my-bucket/*",
    "Condition": {
      "IpAddress": {
        "aws:SourceIp": "203.0.113.0/24"
      }
    }
  }]
}

Idhu specific IP range la irundhu mattum S3 read access allow pannum.


Service Accounts / Roles:

  • Applications ku long-term credentials venaam
  • IAM Roles use pannunga (temporary credentials)
  • Cross-account access ku Assume Role use pannunga

Cloud Network Security

Cloud la network security traditional la irundhu different:


VPC (Virtual Private Cloud) 🌐:

  • Un own isolated network in cloud
  • Subnets: Public (internet access) vs Private (internal only)
  • Route tables control traffic flow

Security Groups πŸ›‘οΈ:

  • Instance-level firewall
  • Stateful β€” return traffic automatic allow
  • Default: All outbound allow, all inbound deny

NACLs (Network ACLs) πŸ“‹:

  • Subnet-level firewall
  • Stateless β€” explicit allow/deny both directions
  • Additional layer of defense

Best Architecture:

code
Internet
    β”‚
    β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   WAF    β”‚  ← Web Application Firewall
β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜
     β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  ALB     β”‚  ← Public Subnet (Load Balancer)
β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜
     β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  App     β”‚  ← Private Subnet (Application)
β”‚  Servers β”‚
β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜
     β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚    DB    β”‚  ← Private Subnet (Database)
β”‚  (RDS)   β”‚     No internet access!
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Cloud Security Tools

Cloud security ku essential tools:


CSPM (Cloud Security Posture Management) πŸ“Š:

  • Misconfigurations detect pannum
  • Compliance check pannum
  • Tools: Wiz, Prisma Cloud, AWS Security Hub

CWPP (Cloud Workload Protection) πŸ’»:

  • Containers, VMs, serverless protect pannum
  • Runtime protection
  • Tools: Aqua Security, Sysdig, Lacework

CASB (Cloud Access Security Broker) πŸ”:

  • Shadow IT detect pannum
  • Data loss prevention
  • Tools: Netskope, Zscaler, Microsoft Defender for Cloud Apps

CIEM (Cloud Infrastructure Entitlement Mgmt) πŸ‘€:

  • Over-privileged identities find pannum
  • Least privilege enforce pannum
  • Tools: CrowdStrike, Ermetic, Authomize

CategoryPurposeTop Tool
CSPMMisconfigurationWiz
CWPPWorkload protectionAqua
CASBSaaS securityNetskope
CIEMIdentity managementCrowdStrike

Container & Kubernetes Security

Modern cloud apps containers la run aaguranga β€” security critical!


Container Security Checklist πŸ“‹:

  • βœ… Base images scan pannunga (vulnerabilities)
  • βœ… Minimal base images use pannunga (Alpine, distroless)
  • βœ… Run as non-root user
  • βœ… Read-only file systems
  • βœ… Resource limits set pannunga
  • βœ… Image signing and verification

Kubernetes Security ☸️:

  • RBAC (Role-Based Access Control) properly configure
  • Network Policies β€” pod-to-pod traffic restrict
  • Pod Security Standards β€” privileged containers avoid
  • Secrets management β€” External secrets operator use
  • Admission controllers β€” OPA/Gatekeeper

yaml
# Kubernetes Security Best Practice
apiVersion: v1
kind: Pod
spec:
  securityContext:
    runAsNonRoot: true
    readOnlyRootFilesystem: true
  containers:
  - name: app
    resources:
      limits:
        memory: "128Mi"
        cpu: "500m"

Cloud Logging & Monitoring

"You can't protect what you can't see!" πŸ‘οΈ


AWS Security Logging:

  • CloudTrail β€” All API calls log (who did what, when)
  • VPC Flow Logs β€” Network traffic metadata
  • GuardDuty β€” AI-powered threat detection
  • Config β€” Resource configuration history
  • SecurityHub β€” Centralized security findings

Azure Security Logging:

  • Activity Log β€” Subscription-level events
  • Diagnostic Settings β€” Resource logs
  • Microsoft Sentinel β€” Cloud SIEM
  • Defender for Cloud β€” Security recommendations

Must-Do Logging:

  1. πŸ“ Enable CloudTrail in ALL regions
  2. πŸ“ S3 access logging enable
  3. πŸ“ VPC Flow Logs enable
  4. πŸ“ Send all logs to central SIEM
  5. πŸ“ Set up real-time alerts for critical events
  6. πŸ“ Log retention β€” minimum 1 year for compliance

Secure Cloud Architecture

πŸ—οΈ Architecture Diagram
```
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚            Secure Cloud Architecture              β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                    β”‚
β”‚  PERIMETER                                         β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”         β”‚
β”‚  β”‚  CloudFlare/WAF β†’ DDoS Protection    β”‚         β”‚
β”‚  β”‚  API Gateway β†’ Rate Limiting, Auth   β”‚         β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         β”‚
β”‚                      β–Ό                             β”‚
β”‚  PUBLIC SUBNET                                     β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”         β”‚
β”‚  β”‚  Load Balancer (ALB/NLB)             β”‚         β”‚
β”‚  β”‚  Bastion Host (SSH jump box)         β”‚         β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         β”‚
β”‚                      β–Ό                             β”‚
β”‚  PRIVATE SUBNET (App Tier)                        β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”         β”‚
β”‚  β”‚  ECS/EKS Containers                   β”‚         β”‚
β”‚  β”‚  Security Groups: port 443 only       β”‚         β”‚
β”‚  β”‚  IAM Roles: least privilege           β”‚         β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         β”‚
β”‚                      β–Ό                             β”‚
β”‚  PRIVATE SUBNET (Data Tier)                       β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”         β”‚
β”‚  β”‚  RDS (encrypted), ElastiCache         β”‚         β”‚
β”‚  β”‚  No internet access!                  β”‚         β”‚
β”‚  β”‚  Security Groups: app tier only       β”‚         β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         β”‚
β”‚                                                    β”‚
β”‚  MONITORING: CloudTrail + GuardDuty + SIEM        β”‚
β”‚  SECRETS: AWS Secrets Manager / Vault              β”‚
β”‚  BACKUP: Cross-region encrypted backups            β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
```

Cloud Compliance

⚠️ Warning

πŸ“‹ Compliance Frameworks cloud la follow pannanum:

- SOC 2 β€” Security, availability, processing integrity

- ISO 27001 β€” Information security management

- PCI DSS β€” Credit card data handle pannaa mandatory

- HIPAA β€” Healthcare data (US)

- GDPR β€” European user data

- India DPDP Act β€” Indian personal data protection

⚠️ Remember: Cloud provider certifications un compliance guarantee aagaadhu! Provider infrastructure certified, but un application and data handling nee separately prove pannanum.

βœ… Use AWS Artifact, Azure Compliance Manager for reports.

Cloud Security Best Practices

πŸ’‘ Tip

πŸ† Top 10 Cloud Security Best Practices:

1. πŸ” MFA enable for ALL accounts (especially root/admin)

2. πŸ“‹ Least privilege IAM policies

3. πŸ”’ Encrypt data at rest AND in transit

4. 🌐 Private subnets for sensitive workloads

5. πŸ“Š Enable ALL logging (CloudTrail, Flow Logs)

6. πŸ” Use CSPM for continuous monitoring

7. πŸ”„ Automate security with IaC (Terraform + tfsec)

8. πŸ“¦ Scan container images before deployment

9. πŸ—οΈ Use secrets management (no hardcoded keys!)

10. πŸ§ͺ Regular penetration testing

Start with #1 and #2 β€” maximum impact, minimum effort! πŸ’ͺ

Summary

Key Takeaways 🎯:


  1. Shared Responsibility β€” Provider infra, you data + config
  2. Misconfiguration = #1 cloud threat β€” automate checks!
  3. IAM = Most critical β€” least privilege, MFA, role-based
  4. Network = VPC, subnets, security groups layered defense
  5. Logging = Enable everything, centralize in SIEM
  6. Tools = CSPM + CWPP + CASB for comprehensive coverage
  7. Compliance = Your responsibility, not just provider's

Cloud security is a journey, not a destination. Continuous monitoring and improvement venum! β˜οΈπŸ”’

🏁 Mini Challenge

Challenge: Secure AWS/Azure Account Setup


2-3 weeks time la cloud security architecture setup pannunga:


  1. Cloud Account Hardening β€” AWS free tier account create pannunga. Root account MFA enable pannunga, IAM users create pannunga (least privilege roles). Access keys rotate pannunga regularly.

  1. S3 Bucket Security β€” S3 bucket create pannunga, public access block enable pannunga. Server-side encryption configure pannunga. Bucket policies restrict pannunga (specific IPs, roles mattum access).

  1. VPC Configuration β€” VPC create pannunga, subnets (public/private) setup pannunga. Security groups configure pannunga (inbound/outbound rules). Network ACLs layer add pannunga.

  1. CloudTrail & CloudWatch β€” CloudTrail enable pannunga (audit logging). CloudWatch dashboards setup pannunga. Suspicious activities detect panna alerts create pannunga.

  1. Secrets Management β€” AWS Secrets Manager use panni database credentials, API keys store pannunga. Rotation policies configure pannunga.

  1. Compliance Check β€” AWS Config enable pannunga. Misconfigurations detect panna rules setup pannunga. Compliance reports generate pannunga.

Certificate: Nee cloud security architect! β˜οΈπŸ”

Interview Questions

Q1: Shared responsibility model β€” AWS/Azure perspective la?

A: AWS = infrastructure security (physical, network, host). Customer = data security, application security, IAM, OS patching, encryption. Clear responsibility boundary. Customer misconception β€” AWS secure illanu think pannum, but misconfiguration risk high.


Q2: Cloud misconfiguration β€” most common issues?

A: Public S3 buckets, overly permissive IAM roles, unencrypted data, default credentials, missing MFA. Automated scanning tools (CSPM) identify panni fix pannunga important.


Q3: Multi-cloud strategy β€” security implications?

A: Each cloud platform different security tooling. Consistency maintain panna challenging. Centralized SIEM, unified IAM solution, compliance tracking across clouds β€” setup required. Cost increase possible.


Q4: Containers (Docker/Kubernetes) security?

A: Image scanning (vulnerabilities check), registry access control, runtime security (behavior monitoring), secrets management, network policies. Orchestration platform (Kubernetes) secure configuration critical.


Q5: Cloud cost optimization β€” security impact?

A: Cost-cutting = security compromise risk. Reserved instances, auto-scaling optimize panna dapat. But insufficient monitoring resources, security tools disable panna etc safety risk. Balance important.

Frequently Asked Questions

❓ Cloud secure ah irukka?
Cloud providers (AWS, Azure, GCP) infrastructure romba secure ah maintain pannuranga. But un application and data security un responsibility. Shared responsibility model follow pannunga.
❓ Most common cloud security mistake enna?
S3 buckets or storage ah publicly accessible ah viduradhu! Misconfiguration is #1 cloud security risk. Always check access permissions.
❓ Cloud security certifications enna irukku?
AWS Certified Security Specialty, Azure Security Engineer (AZ-500), CCSP (Certified Cloud Security Professional), Google Cloud Security Engineer.
❓ Multi-cloud use pannaa security epdhi manage pannum?
CSPM (Cloud Security Posture Management) tools use pannunga β€” Prisma Cloud, Wiz, Orca. They work across AWS, Azure, GCP. Centralized visibility provide pannuranga.
🧠Knowledge Check
Quiz 1 of 2

Shared Responsibility Model la data security yaaru responsibility?

0 of 2 answered