Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections. Cloud security refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.
The 6 pillars of Robust Cloud Security:
Enforcement of virtual server protection policies and processes such as change management and software updates
Enhanced data protection
IAM and Authentication controls across complex infrastructures
Safeguarding all applications (and especially cloud-native distributed apps) with a next-generation web application firewall
Threat intelligence that detects and remediates known and unknown threats in real-time
Zero- Trust cloud network security controls across logically isolated networks and micro-segments
The way cloud security is delivered will depend on the individual cloud provider or the cloud security solutions in place. However, implementation of cloud security processes should be a joint responsibility between the business owner and solution provider.