Cloud Security Fundamentals

Cloud security fundamentals describe the core technical controls, architectural principles, regulatory requirements, and professional practices that govern the protection of data, workloads, and infrastructure hosted in cloud environments. This page covers the definition and scope of cloud security as a discipline, the mechanisms through which protections are implemented, the scenarios where these controls are most commonly applied, and the boundaries that determine when different approaches are appropriate. The subject is relevant to IT and security professionals, compliance officers, procurement teams, and researchers navigating the US cloud security service sector.


Definition and scope

Cloud security is the set of policies, technologies, and controls deployed to protect cloud-based systems, data in transit and at rest, and the identities that interact with cloud resources. As defined by the National Institute of Standards and Technology (NIST) in SP 800-145, cloud computing encompasses five essential characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud security addresses threats arising from each of those characteristics.

The discipline spans four primary service models — Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Function as a Service (FaaS) — and three deployment models: public, private, and hybrid cloud. Each combination produces a distinct security surface. A SaaS deployment offloads infrastructure control to the provider, while an IaaS deployment places operating-system-level and above controls with the customer. These distinctions are formally addressed in the shared responsibility model, which NIST and major cloud providers use to delineate which party is accountable for each protection layer.

Regulatory scope is broad. The Federal Risk and Authorization Management Program (FedRAMP), administered by the General Services Administration (GSA), governs cloud services used by US federal agencies and requires compliance with NIST SP 800-53 Rev 5 security controls. Healthcare workloads in the cloud fall under the HIPAA Security Rule (45 CFR Part 164), enforced by the HHS Office for Civil Rights. sec.gov/rules/final/2023/33-11216.pdf)).


How it works

Cloud security operates through layered controls organized across identity, network, data, and workload domains. A structured breakdown of the primary control layers:

  1. Identity and Access Management (IAM): Authentication, authorization, and privilege management for human users and machine identities. Zero-trust principles, covered in detail at zero-trust architecture in cloud, require continuous verification rather than perimeter-only trust.
  2. Data protection: Encryption of data at rest and in transit using standards such as AES-256 and TLS 1.3, along with key management through dedicated hardware security modules (HSMs) or cloud-native key management services. The cloud encryption standards reference covers applicable NIST FIPS 140-3 validated modules.
  3. Network security: Virtual private cloud (VPC) segmentation, firewall rule sets, web application firewalls (WAFs), and distributed denial-of-service (DDoS) mitigation. Cloud network security addresses the architectural patterns in detail.
  4. Cloud Security Posture Management (CSPM): Automated scanning for misconfigurations against baselines derived from frameworks such as the CIS Cloud Benchmarks. CSPM tools identify drift from secure configuration states continuously.
  5. Workload protection: Runtime monitoring and threat detection for virtual machines, containers, and serverless functions, covered under cloud workload protection.
  6. Logging and monitoring: Centralized log aggregation and security information and event management (SIEM), addressed at cloud SIEM and logging.

Controls are validated through periodic cloud security auditing and structured cloud vulnerability management programs.


Common scenarios

Cloud security controls are applied across a defined set of recurring operational scenarios:


Decision boundaries

Selecting among cloud security approaches depends on deployment model, regulatory classification, and risk tolerance — not on vendor preference alone.

IaaS versus SaaS security posture: IaaS customers retain responsibility for OS hardening, patching, and application-layer controls. SaaS customers shift those responsibilities to the provider but retain accountability for access governance, data classification, and configuration of the SaaS application itself. Conflating these responsibility boundaries is among the most common sources of cloud misconfigurations.

CSPM versus CWPP: Cloud Security Posture Management (CSPM) tools address configuration compliance and infrastructure risk. Cloud Workload Protection Platforms (CWPP) address runtime threats within active workloads. Mature programs require both; using CSPM alone leaves runtime threats undetected, while CWPP alone misses infrastructure drift.

FedRAMP-authorized versus non-authorized services: Federal agencies are required to use FedRAMP-authorized cloud services for federal data. Commercial organizations without a federal mandate may use non-authorized services but accept the absence of a standardized third-party assessment against NIST SP 800-53 controls.

The cloud security regulations reference for the US and the NIST cloud security guidelines provide authoritative frameworks for mapping organizational requirements to control selection.


References

Explore This Site