Cloud Security Controls
Types of Cloud Security Controls
Classification
Cloud security controls are mechanisms that support risk reduction through layered defense and targeted mitigation across digital assets.
Control Type | Purpose | Example |
---|---|---|
Deterrent | Deter attackers psychologically or informatively | Passphrases that are harder to crack than traditional passwords |
Preventative | Strengthen and proactively secure assets | Disabling unused ports to reduce attack surfaces |
Corrective | Mitigate damage after incidents | Scripts that repair damage and notify admins after unauthorized actions |
Detective | Identify and report ongoing or past attacks | Antivirus software, monitoring tools |
Compensating | Fill gaps where standard controls can’t be applied | Deadbolt added to a locked door handle |
Levels of Application
Multi-Layered Protection
Controls should be applied at various operational levels to ensure robust security posture.
graph TD ServiceLevel["Service Level"] -->|Storage, Compute, Networking| ProtectionA WorkloadLevel["Workload Level"] -->|Apps & Resources| ProtectionB PlatformLevel["Platform Level"] -->|OS, Languages, Runtimes| ProtectionC
- Service Level: Infrastructure components like storage and networking.
- Workload Level: Business applications and their supporting resources.
- Platform Level: Operating environments such as OSes and programming runtimes.
Control Mapping Process
Control Governance Lifecycle
A well-structured mapping process ensures security controls align with organizational and regulatory requirements.
graph TD A[Identify Controls] --> B[Map Required Controls] B --> C[Identify Unmapped Controls] C --> D[Perform Assessment] D --> E[Implement Guardrails]
- Identify Controls – Inventory existing security controls within the cloud environment.
- Map Required Controls – Align existing controls to frameworks like NIST, CIS, or ISO.
- Identify Unmapped Controls – Detect gaps where existing controls do not meet compliance or policy standards.
- Perform Assessment – Evaluate effectiveness and sufficiency of mapped controls.
- Implement Guardrails – Apply policy initiatives via native cloud tools or third-party solutions.
graph TD A[Organization: Example.com] --> B[Folder: Sales] A --> C[Folder: Engineering] A --> D[Folder: Human Resources] C --> E[Project: example dev] C --> F[Project: Example prod] C --> G[Project: example-test]
Penguinified by https://chatgpt.com/g/g-683f4d44a4b881919df0a7714238daae-penguinify