Cloud Security: The Complete Guide for Compliance and Security Teams
2026-03-08
By Emre Salmanoglu

Cloud Security: The Complete Guide for Compliance and Security Teams

Learn how to implement cloud security controls that satisfy ISO 27001, SOC 2, NIS2, and DORA requirements. Covers shared responsibility, cloud-native security, CSPM, workload protection, and compliance evidence.

cloud security
cloud compliance
shared responsibility
CSPM
compliance

What Is Cloud Security?

Cloud security is the discipline of protecting cloud computing environments — including infrastructure, platforms, applications, and data — from threats, misconfigurations, and compliance violations. It adapts traditional security principles to the dynamic, API-driven, shared-responsibility nature of cloud computing.

For compliance-driven organisations, cloud security is essential because regulators increasingly scrutinise how organisations protect data and systems hosted in cloud environments under ISO 27001, SOC 2, NIS2, and DORA.

Shared Responsibility Model

LayerIaaS (e.g., AWS EC2)PaaS (e.g., Azure App Service)SaaS (e.g., Salesforce)
Physical securityProviderProviderProvider
Network infrastructureProviderProviderProvider
VirtualisationProviderProviderProvider
Operating systemCustomerProviderProvider
Runtime/middlewareCustomerProviderProvider
ApplicationCustomerCustomerProvider
DataCustomerCustomerCustomer
Identity & accessCustomerCustomerCustomer
ConfigurationCustomerCustomerCustomer

Cloud Security Domains

DomainDescriptionKey Controls
Identity & accessAuthentication, authorisation, privilege managementSSO, MFA, least privilege, JIT access
Data protectionEncryption, classification, data loss preventionEncryption at rest/transit, DLP, key management
Network securitySegmentation, traffic filtering, DDoS protectionSecurity groups, WAF, private endpoints, VPN
Workload protectionSecuring VMs, containers, serverlessCWPP, vulnerability scanning, runtime protection
Configuration managementPreventing and detecting misconfigurationsCSPM, infrastructure as code, policy as code
Logging & monitoringVisibility into cloud activity and threatsCloud-native logging, SIEM integration, alerting
Incident responseDetecting and responding to cloud incidentsCloud IR playbooks, forensic readiness

Cloud Security Architecture

ComponentFunctionExamples
CSPMConfiguration compliance and risk assessmentWiz, Orca, Prisma Cloud, AWS Security Hub
CWPPWorkload protection across compute typesCrowdStrike, Aqua, Sysdig
CNAPPUnified cloud-native application protectionWiz, Palo Alto Prisma Cloud
CASBShadow IT discovery and SaaS securityNetskope, Zscaler, Microsoft Defender for Cloud Apps
CIEMCloud identity and entitlement managementErmetic (Tenable), CrowdStrike, Wiz
KMSEncryption key managementAWS KMS, Azure Key Vault, HashiCorp Vault

Cloud Security Controls

ControlDescriptionImplementation
Encryption at restEncrypt all stored dataProvider-managed or customer-managed keys
Encryption in transitEncrypt all data in motionTLS 1.2+, mutual TLS for service-to-service
Least privilege IAMMinimum required permissionsRole-based policies, regular access reviews
Network segmentationIsolate workloads and environmentsVPCs, security groups, private subnets
LoggingRecord all API calls and changesCloudTrail, Azure Activity Log, GCP Audit Logs
MFA enforcementMulti-factor for all cloud accessFIDO2 for admins, conditional access policies
Infrastructure as codeDefine infrastructure in version-controlled templatesTerraform, CloudFormation, Pulumi

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Cloud service securityA.5.23CC6.1Art. 21(2)(d)Art. 28-30
Data protectionA.8.24CC6.1Art. 21(2)(d)Art. 9(2)
Access controlA.8.2CC6.3Art. 21(2)(i)Art. 9(4)
Logging & monitoringA.8.15CC7.2Art. 21(2)(g)Art. 10(2)
Supplier managementA.5.21CC9.2Art. 21(2)(d)Art. 28
Incident responseA.5.26CC7.4Art. 23Art. 17

Audit Evidence

Evidence TypeDescriptionFramework
Cloud security policyDocumented policy covering all cloud environmentsAll frameworks
Shared responsibility matrixDocumented responsibilities per cloud provider/serviceAll frameworks
CSPM scan reportsConfiguration compliance scan resultsAll frameworks
IAM access reviewsEvidence of cloud access rights reviewsAll frameworks
Encryption configurationDocumentation of encryption at rest and in transitAll frameworks
Cloud provider contractsAgreements covering security obligationsNIS2, DORA
Incident response playbooksCloud-specific incident response proceduresAll frameworks

Common Mistakes

MistakeRiskFix
Not understanding shared responsibilitySecurity gaps where neither party manages controlsDocument responsibilities per cloud service
Overly permissive IAM policiesCredential compromise leads to full account takeoverImplement least privilege, use IAM Access Analyzer
Public storage bucketsData exposure and regulatory penaltiesEnable bucket policies, block public access by default
No centralised loggingCannot detect or investigate incidentsAggregate all cloud logs into SIEM
Single-account architectureBlast radius of compromise affects everythingUse multi-account strategy with isolation boundaries
Ignoring cloud provider changesNew features introduce unmanaged riskMonitor provider change logs, update controls quarterly

How Orbiq Supports Cloud Security Compliance

Orbiq helps you demonstrate cloud security controls:

  • Evidence collection — Centralise cloud security policies, CSPM reports, and access reviews
  • Continuous monitoring — Track cloud security posture across providers
  • Trust Center — Share your cloud security controls via your Trust Center
  • Compliance mapping — Map cloud controls to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading