Cloud security

Cloud Security Baselines: Where to Start for AWS and Azure

CIS benchmarks, native security controls, and a phased approach to securing your cloud footprint.

Back to blog
Start with identity and network Enforce MFA for human and privileged access, centralize identity (SSO where possible), and restrict admin paths. Pair that with a clear network model: private subnets for workloads, no broad 0.0.0.0/0 on sensitive ports, and logging enabled for control plane and data-plane events. Native controls and benchmarks - AWS: Organizations, SCPs, Config rules, GuardDuty, and KMS-backed encryption defaults. - Azure: Management groups, Azure Policy, Defender for Cloud recommendations, and Key Vault for secrets. Align to CIS or your cloud provider well-architected guidance, then automate checks (policy-as-code or CSPM) so drift is visible weekly, not at audit time. Phased rollout Phase 1: identity, logging, and backups. Phase 2: encryption, key management, and endpoint coverage. Phase 3: advanced detection, IaC scanning, and fine-grained segmentation. Measure progress with a simple scorecard so leadership sees risk reduction over time.