Cloud Security Office Hours Banner

Cloud Security Best Practices

The controls that actually prevent breaches, ranked by how often the absence of each one shows up in real cloud incident reports. Vendor-neutral, with the trade-offs called out.

Start with Identity See Real Breaches

The honest version: Most "cloud security best practices" lists are 100 items long and unranked, which is the same as not having a list. The bullets below are ordered by what actually appears as the root cause in our breach kill chains. Master the first three sections and you'll prevent the majority of cloud incidents seen in industry. The later sections are where mature programs differentiate.

If a practice isn't here, that's not because it doesn't matter — it's because we're calling out the high-leverage ones. Pair this page with the cloud security overview for foundational concepts and the certifications guide if you want to formalize.

📖 On this page

  1. Identity & access (most important)
  2. Configuration & posture
  3. Network controls
  4. Data protection & secrets
  5. Logging & detection
  6. Supply chain & CI/CD
  7. Workload & container security
  8. AI & LLM workloads
  9. Governance & people
  10. Anti-patterns: things to stop doing

Identity & access (most important)

If you only fix one category, fix this one. Identity is the perimeter — every cloud breach we've documented involves an identity failure somewhere in the chain.

Configuration & posture

Misconfigurations are the second-most-common breach root cause. The good news: posture management tools have made this category solvable for most organizations.

Network controls

Cloud networks aren't perimeters in the on-prem sense, but the controls still matter — especially for limiting lateral movement and exfiltration.

Data protection & secrets

Logging & detection

You can't respond to what you don't see. The SolarWinds, Capital One, and LastPass incidents all had detectable activity that nothing was watching for.

Supply chain & CI/CD

Modern attackers pivot through your build pipeline. SolarWinds is the canonical case; the npm/PyPI typosquats and the Codecov compromise are routine.

Workload & container security

AI & LLM workloads

The newest category and the one with the most movement. Treat AI workloads as agentic systems with tool access — because that's what they are.

Governance & people

Anti-patterns: things to stop doing

The flip side. If you see any of these in your environment, fix them before working on more sophisticated controls.

Where next