Five Best Practices for Cloud Security
Five Best Practices for Cloud Security
Provide another layer of security Master the balance between Simplify access management
by requiring two or more of the security and productivity in multi-cloud environments
following authentication methods: by factoring how a resource with unified cross-cloud
is accessed into access control visibility into all permissions and
• Something you know (typically
decisions. Implement automated identities and automate least
a password)
access control decisions for privilege policy enforcement
accessing your cloud apps that consistently to protect your
• Something you have (a trusted
are based on conditions. most sensitive cloud resources.
device that is not easily
duplicated, like a phone)
Secure score in Microsoft Track your secure score Involve your DevOps teams
Defender for Cloud offers progress over time and create in your security strategy.
hundreds of out-of-the-box rich, interactive reports that you Help them understand and
recommendations mapped can share with key stakeholders implement key policies and
to industry best practices and to demonstrate how your deploy application security
regulatory standards. security team is continually at the beginning of the
improving the organisation’s development lifecycle.
cloud security posture.
Encrypt data at rest and in transit, and When a company operates primarily on premises,
consider also encrypting data at use with it owns the whole stack and is responsible for its
confidential computing technologies. own security. Depending on how you use the cloud,
your responsibilities change, with some responsibilities
moving to your cloud provider.
Ensure threat detection is Use a cloud provider that Consider a cloud-native SIEM
enabled for virtual machines, integrates threat intelligence and that scales with your needs,
containers, databases, storage, provides the necessary context, uses AI to reduce noise and
IoT and your other resources. relevance and prioritisation for requires no infrastructure.
Microsoft Defender for Cloud you to make faster, better and
has built-in threat detection that more proactive decisions.
supports all major Azure and
AWS resource types.
Setting up your firewall is still Protect web assets and networks A flat network makes it easier
important, even with identity from malicious traffic targeting for attackers to move laterally.
and access management. You application and network layers Familiarise yourself with
need controls in place to protect to maintain availability and concepts like virtual networking,
the perimeter, detect hostile performance while containing subnet provisioning and
activity and build your response. operating costs. IP addressing. Use micro-
A web application firewall (WAF) segmentation and embrace the
protects web apps from common concept of micro-perimeters to
exploits like SQL injection and support zero-trust networking.
cross-site scripting.
What’s next?
Are you looking to strengthen the security
of your cloud workloads?
Get expert guidance through the Azure Migration and Modernisation Programme
© 2022 Microsoft Corporation. All rights reserved. This document is provided ‘as-is’. Information and views expressed in this document, including
URL and other Internet website references, may change without notice. You bear the risk of using it. This document does not provide you with any
legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.