What Is Cloud Security? (Definition, Types, Areas) | Built In (2024)

REVIEWED BY

Mitchell Telatnik | Jan 06, 2023

Cloud security is crucial because users rely on access to their cloud data at any time. As a result,cloud environments must be continuously maintained, making cloud security a vital part of overall enterprise security.

Cloud Security: 6 Types

  1. IAM
  2. Network and device security
  3. Secrurity monitoring/alerting
  4. Governance
  5. Disaster recovery and business continuity planning
  6. Legal compliance

Related Reading From Built In ExpertsWill Cloud Security and Database Performance Forever Be at Odds?

What Are the Types of Cloud Security?

Cloud security includes identity and access management, governance, network and device security; security monitoring and alerting; disaster recovery and business continuity planning; and legal compliance.

Cloud security requires a combination of multiple strategies to ensure across-the-board protection from emerging threats and exposed vulnerabilities. Cloud environments include physical and virtual networks; data storage drives, data servers, virtualization frameworks, operating systems, runtime environments and several other components. This means multiple methods must be utilized to ensure there are no exposed vulnerabilities and threats can be mitigated. Cloud security is accomplished through a combination of data security, identity and access management (IAM); data retention, business continuity planning and governance, such as threat prevention; detection and mitigation policies.

  1. IAM is the process that ensures the correct user has specific access privileges. Common IAM techniques include password management and multi-factor authentication.
  2. Network and device security involves using tools to put barriers between the access and visibility of data in contained environments, including techniques such as encryption and VPNs.
  3. Security monitoring/alerting is the installation of both automated and monitored systems, such as a Security Incident and Event Management (SIEM) platform and a Security Operations Center (SOC), that can check for and immediately bring attention to unusual or compromising activity.
  4. Governance is the enforcing of policies to prevent, detect and mitigate threats, such as user behavior policies and training.
  5. Disaster recovery and business continuity planning are recovery measures taken in the event of technical disaster. These measures include data redundancy tactics like establishing backups and frameworks for testing the validity of backups.
  6. Legal compliance refers to the adherence to legislative policies designed to protect user privacy (GDPR), the integrity of financial data (SOX), government assets (ITAR) and more.

Find out who's hiring.

See jobs at top tech companies & startups

View All Jobs

What Are the 4 Areas of Cloud Security?

Four cloud security solutions include cloud data visibility, control over cloud data, access to cloud data and applications, and compliance.

Cloud security consists of several elements working simultaneously to ensure comprehensive security against threats. Four critical security solutions include visibility into cloud data, control over cloud data, access to cloud data and applications, and compliance.

  1. Visibility into cloud data allows authorized users to view and directly monitor data stored in a cloud environment as well as the network’s stability, with alerting systems used to facilitate mitigation of compromising events.
  2. Control over cloud data pertains to data classification, data loss prevention, collaboration controls and encryption processes.
  3. Access to cloud data and applications is the implementation of user access control systems, device access control systems, abnormal behavior identification systems, malware prevention measures and privileged access control.
  4. Compliance are requirements in place that include data and applications in cloud environments, such as risk assessment and compliance assessment.

What Does Cloud Security Include?

The four central pillars of cloud security are visibility and compliance, compute-based security, network protections, and identity and access management.

  1. Visibility and compliance requires continuous improvement to build an effective cloud security solution, with asset inventory, proven frameworks and data security measures all utilized.
  2. Compute-based security involves all security measures taken to protect end systems, managed services, and workloads running within the cloud This includes measures such as automated vulnerability management and ongoing operational security.
  3. Network protections involve using micro-segmentation to create protection measures dedicated to the live flow of traffic, securing both the cloud environment and the user.
  4. Identity and access management involves the design, configuration and administration of measures that authenticate, authorize and account for (AAA) user and machine identities.
What Is Cloud Security? (Definition, Types, Areas) | Built In (2024)
Top Articles
37 Life-Changing Books You Won’t Be Able to Put Down
Limited Partners and Selling Shareholders: Beware of Post-Closing Unjust Enrichment Claims | Insights | Mayer Brown
Navicent Human Resources Phone Number
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Pet For Sale Craigslist
Amc Near My Location
Chelsea player who left on a free is now worth more than Palmer & Caicedo
Directions To 401 East Chestnut Street Louisville Kentucky
GAY (and stinky) DOGS [scat] by Entomb
Cinepacks.store
Music Archives | Hotel Grand Bach - Hotel GrandBach
270 West Michigan residents receive expert driver’s license restoration advice at last major Road to Restoration Clinic of the year
Natureza e Qualidade de Produtos - Gestão da Qualidade
Sitcoms Online Message Board
7440 Dean Martin Dr Suite 204 Directions
charleston cars & trucks - by owner - craigslist
Craigslist Farm And Garden Tallahassee Florida
Money blog: Domino's withdraws popular dips; 'we got our dream £30k kitchen for £1,000'
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
Vermont Craigs List
Video shows two planes collide while taxiing at airport | CNN
Itziar Atienza Bikini
Craigslist Mt Pleasant Sc
Publix Super Market At Rainbow Square Shopping Center Dunnellon Photos
How Long After Dayquil Can I Take Benadryl
What Are The Symptoms Of A Bad Solenoid Pack E4od?
Happy Homebodies Breakup
Prot Pally Wrath Pre Patch
Fleet Farm Brainerd Mn Hours
Roanoke Skipthegames Com
January 8 Jesus Calling
Culver's.comsummerofsmiles
Speechwire Login
Spirited Showtimes Near Marcus Twin Creek Cinema
James Ingram | Biography, Songs, Hits, & Cause of Death
Citibank Branch Locations In Orlando Florida
Craigslist Gigs Norfolk
6143 N Fresno St
Panchitos Harlingen Tx
THE 10 BEST Yoga Retreats in Konstanz for September 2024
Kgirls Seattle
Plead Irksomely Crossword
Spn-523318
Craigslist Free Manhattan
Silive Obituary
Ehome America Coupon Code
Senior Houses For Sale Near Me
Gary Vandenheuvel Net Worth
Lawrence E. Moon Funeral Home | Flint, Michigan
The Pretty Kitty Tanglewood
Goosetown Communications Guilford Ct
91 East Freeway Accident Today 2022
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6616

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.