Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Secure a Multi-Cloud Strategy
Cybersecurity

How to Secure a Multi-Cloud Strategy

Bill DoerrfeldBy Bill DoerrfeldOctober 9, 2022Updated:February 16, 20236 Mins Read
Facebook Twitter LinkedIn Email
multi-cloud security strategy
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Multi-cloud is on the rise — 60 percent of organizations are already using multiple clouds. Most are reaping many business benefits from a multi-cloud strategy, such as reduced vendor lock-in, the ability to optimize computing workloads, and even cost reduction. Multi-cloud also empowers developers with more ownership to choose their favorite cloud for deployments.

Although hybrid multi-cloud is the new normal, there are undoubtedly new security implications within this novel paradigm. The most obvious result is an increased surface area for attack. When you’re managing multiple clouds, there’s more room for misconfigurations and more administrative secrets and keys that could be exposed. Inconsistencies between cloud providers could result in broken institutional knowledge, not to mention that cloud-native technologies have varying degrees of default settings — some of which are more locked down than others.

Multi-cloud is becoming an unavoidable reality for most organizations. But, many of the risks associated with multi-cloud can be mitigated. Below is a brainstorm of some strategies to consider as your organization adopts multiple clouds. While not exhaustive, these tips are a starting point for addressing the unique cybersecurity implications of deploying and managing software across various cloud-based environments.

Tip #1: Continually audit your surface area.

The first step of any holistic cybersecurity strategy is to know your surface area. Without a clear depiction of your active workloads and resources and where they’re running across your stack, components could easily be left behind. Forgotten systems or shadow or zombie application program interfaces (APIs) might be outdated and contain unpatched vulnerabilities. It’s also good practice to tag ownership to each resource so that teams know who is in charge of maintaining it. Although still an evolving practice, requesting a Software Bill of Material (SBOM) from cloud-based dependencies is another method to audit your surface area.

Tip #2: Centralize common cloud configurations.

When an engineer goes to deploy code into a given cloud, there are many options to choose from, including region, computing type, size, scalability settings, permissions, and other factors. These fields vary slightly from cloud to cloud and configuring them differs in each cloud graphical user interface (GUI). It’s a good idea to centralize standard cloud configurations for reuse. Building knowledge repositories per cloud makes it easier to deploy code consistently. Even better, codifying configurations as infrastructure-as-code (IaC) can make them more structured for reuse and ensure more consistent policies that enforce access control.

Tip #3: Set guardrails for developers.

CloudOps will want to set common security policies across multiple clouds. For example, you might want to detect suspicious behavior or ensure traffic is not coming from an invalid IP address. Policies should also match developer administrative credentials. Such guardrails could help prevent accidents in the development lifecycle, such as haphazardly opening an EC2 instance or load balancer. Implementing real-time scanning for new code bases and container images, as well as checking policies in real time, can help ensure multi-cloud governance. Open-source tools such as Cloud Custodian or Open Policy Agent are popular options for implementing cloud-native policy-as-code.

Tip #4: Store and share secrets safely.

In 2020, GitGuardian found more than 2 million secrets exposed on GitHub. With more clouds come more secrets and keys to manage infrastructure, which, if leaked, could be used by hackers to escalate their permissions into your walled gardens. Thus, it’s important to ensure these administrative credentials are never revealed or inserted within public code repositories: Everything from API keys to cloud environments should be obfuscated. Furthermore, multiple authentications and authorization checks should be implemented to avoid hasty connections. OAuth and OpenID Connect, for example, help validate user identity, or SPIFFE/SPIRE helps initiate secure service-to-service connections.

Tip #5: Lock down insecure default states.

Don’t assume every platform handles security the same way — certain functions, such as multi-factor authentication, may be turned on by default in one environment but left off in another. Therefore, it’s a best practice to audit the default security schemes when adopting new cloud technologies. Open-source, cloud-native technologies that work between clouds may have insecure states as well. For example, the cloud-native community notes that Kubernetes, the popular container orchestrator, has default states that are “too open.” Applying a zero-trust approach, even for internal testing, can pay dividends in ensuring a more secure footprint.

Tip #6: Keep an eye on cloud vulnerabilities and exploits.

It’s a good practice to keep current with common vulnerabilities and exposures (CVEs), and even implement regular automated scanning of runtime environments. But it’s not only the code you host that might contain vulnerabilities — exploits have been found within major cloud service providers as well. For example, Log4Shell produced vulnerabilities in AWS that recently made it prone to privilege escalation. Or, in 2021, Microsoft Azure’s central database exposed a massive amount of customer records. Where sensitive data is concerned, it’s a good idea to pay special attention to highly valuable ingress and egress ports.

Tip # 7: Practice multi-cloud observability.

Observability is an evolution of application monitoring that involves logs, metrics, and traces to measure a system’s state and the data it creates. It’s been a much-hyped trend in recent years — and for a good reason. Applied to cybersecurity, an investment into observability can help reduce false positives and decrease the mean time to resolutions. These points can then be used to discover performance bottlenecks and the root causes of incidents. Improving how an organization responds to issues (and practicing this response process) can only aid a multi-cloud strategy.

Multiple clouds multiply the security response.

Adopting multiple clouds can multiply success, yet it also multiplies the risk potential. Access control and privilege issues remain a common concern for connected software, and organizations must take care to retain tight cloud service configurations. As investment into abstracted deployment processes increases, guardrails must be adopted to ensure these abstractions aren’t putting an organization at risk.

A defense-in-depth posture utilizes many layers to protect a digital system. In addition to the abovementioned concerns, general cybersecurity guidelines apply just as well to hardening multi-cloud adoptions. These include best practices like planning for backup and recovery, following common cybersecurity frameworks, and always adopting the rule of least privilege. From the onset, all these practices may seem overwhelming, but don’t let analysis paralysis set in — it’s good to start tackling things one at a time.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in GitGuardian?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cloud Wars Archive Cybersecurity Cybersecurity channel GitGuardian multi-cloud
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025

Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

July 1, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.