Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » 3 Areas Where Cloud Native and Compliance Intersect
Cybersecurity

3 Areas Where Cloud Native and Compliance Intersect

Robert WoodBy Robert WoodAugust 29, 20224 Mins Read
Facebook Twitter LinkedIn Email
Top Cloud Compliance Convergence Areas
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The cloud has exploded. With how the Software-as-a-Service (SaaS) market has grown, organizations or major programs that are fully built on top of cloud services can begin. This is typically what the term “cloud native” implies — from the beginning, all cloud. The potential benefits to compliance and governance efforts in these environments are exciting and worth deep investigation for organizations leveraging the cloud.

One of the chief reasons, I believe, that this benefit exists is not because some organization is magically handling a lot of the compliance work but rather because more of the technology stack is accessible programmatically. This article will explore three of the areas of cloud compliance that I am most excited about.

Access Control and Permissions

Permission sprawl can be a real problem in organizations. Add multiple cloud services that are being quickly provisioned and utilized and the problem can exacerbate fast. Infrastructure service providers (e.g., AWS, Azure, and GCP) all permit programmatic access to their IAM resources to determine exactly who (or what) has access to what. This has led to some exciting solutions being built out that combine time series monitoring with IAM; what’s actually being used and when.

These solutions enable security teams to dynamically modify permissions that are assigned to humans and systems to remove that which is not needed. This is a big step forward to make firm, data-driven attestations about least privilege in a compliance setting.

Configuration Reviews

Almost every piece of software running in an environment needs to be configured to make sure it’s secure. Cloud environments encourage programmatic resource provisioning over clicking around in a UI to configure things. However, even in a declarative state, configuration isn’t always perfect. Having the ability to query the configuration state of a cloud resource is foundational to compliance in the cloud. This continues to mature in the Infrastructure-as-a-Service (IaaS) space with native solutions, like AWS Audit Manager and Security Hub, for example.

I am increasingly excited at the emergence of solutions that enable configuration reviews against Platform- and Software-as-a-Service (PaaS and SaaS) solutions. As these solutions handle bigger percentages of an organization’s workload, especially in a cloud native organization, continuous monitoring is a powerful capability.

Configuration reviews intersecting with compliance framework and control mapping is not only a substantial security benefit but it can streamline audit preparation and execution.

Policy Guardrails

One of the biggest problems with policy, especially in fast-moving environments, is that it gets written and then never looked at. That is until it comes time to do an annual review as part of a compliance exercise.

Policy is important, though. It is the foundation upon which everything else should be built. When a solution enables policy to be codified and built into the way a cloud environment can be used (or not used) it comes alive in a powerful way. Deploying a resource that needs to be used for storing data? It needs to be encrypted. Deploying a server and need SSH access to it? It can’t be accessed publicly, only through a VPN or bastion.

Policy guardrails allow policy to be expressed in a way that can be enforced in real time before a deviation can occur. The challenge then becomes seeking and pushing the boundaries on what controls and aspects of policy and compliance frameworks can be codified into a guardrail.

Concluding Thoughts

When you look at the various controls that are outlined in a given compliance framework — monitoring, IAM, disaster recovery, authentication, and so on — you’ll find that there are many possibilities to streamline. Not all controls can be expressed in terms of an automated or verifiable test, but many can. Not all controls need to be verified in the same way, either. Some are effectively expressed as a guardrail, while others may be better suited to continuous configuration assessments.

This is where creativity comes into play, enabling us to explore the best way to leverage the technology capabilities available to us. This is also where the quest toward easier compliance in the cloud can make significant improvements to your overall security posture.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud Cloud Wars Cloud Wars Archive Compliance Cybersecurity featured governance
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact

May 16, 2025

Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds

May 16, 2025

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact
  • Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.