Cloud Service Providers (CSP) secure the cloud (physical security, core infrastructure, virtualization, platform security).
Customers secure what they put in the cloud (data, identities, access management, encryption keys, configurations, and applications).
Responsibilities in practice
Customer responsibilities: Identity and Access Management (IAM), MFA, least-privilege policies, data encryption at rest and in transit, key management, secure secret storage, logging/monitoring, vulnerability management for deployed configurations, patching guest OS, and platform configurations.
CSP responsibilities: physical data center security, underlying hardware and software stack updates, vulnerability management for cloud services, secure defaults for managed services, and ensuring baseline security controls at the infrastructure level.
Cloud network hardening practices
Use isolated networks: Virtual Private Clouds/Virtual Networks with private subnets and carefully controlled public subnets.
Security groups and network ACLs to restrict ingress/egress; enforce least privilege rules.
Bastion hosts or jump boxes for administrative access; require MFA for admin logins.
Centralized logging and visibility: collect VPC/VNet flow logs, firewall logs; integrate with SIEM.
Encryption strategies: at-rest encryption for cloud storage, TLS for data in transit; implement robust key management and rotation policies.
Policy-as-code and automated compliance checks to ensure configurations stay within policy.
Real-world relevance
Common issues include misconfigured security groups with overly permissive access, lack of encryption, and weak identity governance; emphasize automation and continuous governance to mitigate these risks.
Role of the Security Analyst
You will work across OS, on-prem networks, and cloud networks.
Apply knowledge from OS hardening, network hardening, and cloud hardening in real-world tasks:
Assess vulnerabilities and prioritize remediation based on risk.
Design and enforce secure baselines, implement patch management, and ensure configuration compliance.
Monitor logs, detect anomalies, and respond to incidents across on-prem and cloud environments.
Validate cloud configurations against security baselines; enforce least privilege and robust encryption.
Ethical, practical implications
Balance security with operational efficiency and user productivity.
Protect privacy and data protection requirements; maintain auditability and accountability.
Adhere to change management, documentation, and incident response protocols.
Example day-to-day tasks
Audit configuration drift and implement automated remediation.
Conduct tabletop exercises, vulnerability scanning, and patch cycle management.
Review and optimize firewall rules; document changes and maintain ticketing records.