M&G Group Services
Back to Insights
Cloud Security8 min readMarch 22, 2026

Cloud Security Architecture: What Every Business Must Get Right in 2026

Most businesses move to the cloud and assume security is handled. It isn't. Here's a practical framework for securing your cloud environment before it becomes a liability.

The cloud promised simplicity. In practice, it introduced an entirely new threat surface that most businesses don't fully understand — and don't have a plan to address.

According to the 2024 Verizon Data Breach Investigations Report, misconfiguration remains the leading cause of cloud security incidents. Not sophisticated zero-day attacks. Not nation-state adversaries. Misconfiguration — which means the breach was preventable.

This guide covers the foundational elements every business must get right to operate securely in the cloud.

The Shared Responsibility Model: What Cloud Providers Don't Secure For You

The most important concept in cloud security is one that most businesses misunderstand: the shared responsibility model.

AWS, Azure, and Google Cloud secure the infrastructure — the physical hardware, the hypervisor, the global network. They do not secure your data, your configurations, your access controls, or your applications. That's your responsibility.

This distinction matters enormously in practice:

  • Your S3 buckets being publicly accessible? Your responsibility.
  • Your IAM roles having overly permissive policies? Your responsibility.
  • Your virtual machines running unpatched software? Your responsibility.
  • Your encryption keys being poorly managed? Your responsibility.
  • Many organizations discover this boundary only after an incident. The time to understand it is now.

    Identity and Access Management: The Most Critical Control

    In cloud environments, identity is the perimeter. An attacker who obtains valid cloud credentials — whether through phishing, credential stuffing, or a leaked API key — can access your environment as if they were a legitimate user.

    The fundamental principles of cloud IAM:

    Least privilege. Every user, role, and service should have only the permissions required to perform its specific function — nothing more. The most common IAM finding in cloud security assessments is roles with far broader permissions than they need: developers with production database access, Lambda functions with admin privileges, CI/CD pipelines that can modify IAM policies.

    No long-lived credentials. Static access keys that never rotate are a persistent liability. Use IAM roles instead of access keys wherever possible. For CI/CD pipelines accessing AWS, use OIDC federation rather than storing access keys in environment variables.

    MFA everywhere. Multi-factor authentication should be enforced on all human accounts that access cloud infrastructure, especially root/admin accounts. The AWS root account should be locked away with MFA and almost never used.

    Privileged access management. For highly privileged operations, implement a just-in-time access model: access is granted only when needed, for a specific duration, with full audit logging.

    Network Security: Segmentation and Visibility

    Your cloud network architecture should be designed on the assumption that some workloads will be compromised, and the impact must be contained.

    VPC design and segmentation. Group workloads by trust level and sensitivity. Your public-facing web servers live in public subnets. Your application servers live in private subnets. Your databases live in isolated database subnets with no direct internet access. Security groups and NACLs enforce the boundaries.

    No public exposure without necessity. Every publicly accessible resource — S3 buckets, databases, EC2 instances, Kubernetes dashboards — is a potential target. Audit your public attack surface regularly. The AWS Trusted Advisor and Azure Secure Score surfaces many of these issues automatically.

    VPN or Private Link for internal communication. Service-to-service communication within your cloud environment should stay within the VPC. Traffic going out to the internet and back in is unnecessary exposure.

    DNS security. Subdomain takeover — where an expired DNS record points to a resource you no longer own — is a surprisingly common cloud vulnerability. Audit your DNS records against your active cloud resources.

    Data Protection: Encryption and Classification

    Encryption at rest. Every storage service — S3, EBS volumes, RDS databases, DynamoDB tables — should have server-side encryption enabled. Most cloud providers make this easy; it's often a checkbox in the console. There is no legitimate reason for production data to be unencrypted at rest.

    Encryption in transit. All communication between services should use TLS. Disable unencrypted protocols. For S3, enforce HTTPS-only bucket policies. For databases, require SSL connections.

    Key management. Who can access your encryption keys? AWS KMS and Azure Key Vault allow fine-grained control over key access. Encryption is meaningless if the keys are accessible to anyone who can access the encrypted data.

    Data classification. Know what categories of data you store — PII, financial records, health information, credentials — and where they live. You cannot protect what you haven't inventoried.

    Logging, Monitoring, and Detection

    Security controls only create value if you know when they're being violated. Without logging, you have no ability to detect attacks in progress or investigate after the fact.

    Enable cloud-native logging immediately:

  • AWS CloudTrail (all regions, all management events, S3 data events for sensitive buckets)
  • AWS Config (resource configuration change history)
  • VPC Flow Logs (network traffic metadata)
  • AWS GuardDuty (threat detection — behavioral analysis of CloudTrail, DNS, and VPC Flow Logs)
  • Set up alerting for high-priority events:

  • Root account usage
  • IAM policy changes
  • Security group rule changes
  • CloudTrail logging disabled
  • High-volume S3 GetObject operations (potential data exfiltration)
  • Failed MFA attempts
  • Establish a log retention policy. Security investigations and compliance requirements often require log data going back 12 months or more. Define a retention period, enforce it with lifecycle policies, and archive to lower-cost storage tiers for older data.

    Vulnerability Management and Patch Cadence

    Cloud environments do not update themselves. OS-level vulnerabilities in your EC2 instances, container vulnerabilities in your ECS tasks, and dependency vulnerabilities in your Lambda functions all require active management.

    Use managed services where possible. Managed databases (RDS, Aurora), managed Kubernetes (EKS), and serverless compute (Lambda) shift much of the patching burden to the cloud provider for the underlying infrastructure.

    For workloads you manage, establish a patching cadence: critical vulnerabilities within 48–72 hours, high within 7 days, medium within 30 days. Use AWS Systems Manager Patch Manager or equivalent to automate and audit patching.

    Scan container images before deployment. Images with known critical vulnerabilities should not reach production. Amazon ECR, Azure Container Registry, and Google Artifact Registry all offer native scanning.

    The Cloud Security Posture Management (CSPM) Baseline

    A Cloud Security Posture Management tool continuously monitors your cloud configuration against security best practices and compliance benchmarks (CIS Benchmarks, AWS Security Best Practices, SOC 2, PCI-DSS).

    AWS Security Hub, Microsoft Defender for Cloud, and Google Security Command Center are the native options. They surface misconfigurations, compliance violations, and security findings in a unified dashboard.

    The goal: zero critical findings. Use the findings as a prioritized remediation backlog. Review and address new findings weekly.

    Where to Start

    If you're securing a cloud environment for the first time, this is the priority sequence:

    1. Enable MFA on all accounts — especially root/admin. Today.

    2. Audit IAM permissions — identify and remediate overly permissive roles.

    3. Enable logging — CloudTrail, Config, GuardDuty at minimum.

    4. Audit public exposure — every public S3 bucket, every security group rule allowing 0.0.0.0/0.

    5. Enable encryption — on all storage services.

    6. Run a CSPM scan — and work through the critical findings.

    Cloud security is not a project you complete. It's a practice you sustain. The organizations that do it well build it into their normal operational cadence — not as a special initiative, but as how they work.

    Ready to apply this to your business?

    Our team can assess your current security posture and show you exactly what to prioritize — at no cost.

    Get a Free Security Audit