Back to All News

Ensuring Security in Cloud Services: Best Practices

Article date

02 19 2025

Article Author

Aleksey Shitov, Director of Development

Reading Time

7 minutes

Cloud technologies are rapidly evolving and becoming an integral part of modern IT infrastructure. Companies are increasingly migrating their data, applications, and business processes to the cloud, as it is convenient, cost-effective, and flexible. However, along with the benefits of cloud services, there are also significant challenges in terms of information security.

According to IBM, the average cost of a data breach was \$4.45 million in 2023. This highlights the critical importance of protecting information in the cloud environment. In this article, we will explore the main threats faced by cloud users and provide best practices for ensuring security.

1. The main security threats in cloud services
While cloud providers (AWS, Microsoft Azure, Google Cloud) implement robust security measures, the majority of the responsibility for data protection lies with the clients. Let's discuss the key threats:
Errors in access settings can lead to the leakage of sensitive information. Example: In 2019, Capital One experienced a data breach of 106 million customers due to a misconfigured firewall.

2. Attacks on cloud infrastructure
Hackers can exploit vulnerabilities in service configurations
Common attacks include DDoS, SQL injection, and cross-site scripting (XSS).

3. Unauthorised access
Weak passwords and the absence of multi-factor authentication (MFA) can lead to compromised accounts.

4. Data leakage through third parties
Cloud providers often use third-party services, which creates additional risks.

5. Non-compliance with security requirements and standards
Non-compliance with GDPR, ISO 27001, and other standards can lead to fines and loss of customer trust.

Best practices for cloud security
1. Data encryption
Encryption is one of the most reliable ways to protect data in the cloud. It is used both for information transfer and storage.
At-rest encryption: Protects data stored in cloud storage.
In-transit encryption: the use of TLS/SSL protocols for data transmission.
Example: Dropbox encrypts user data using AES-256.

2. Multi-factor authentication
Using an additional layer of identity verification (e.g., SMS code, biometrics) significantly reduces the likelihood of account compromise.
Microsoft reports that MFA prevents 99.9% of account attacks.

3. Minimising access rights (Least Privilege Access)
Separating roles and accesses helps prevent information leaks within the organisation.
Using RBAC (Role-Based Access Control) and Zero Trust policies.

4. Monitoring and logging
Cloud providers provide monitoring tools (AWS CloudTrail, Azure Monitor) which allow you to track abnormal activity.
It is important to analyse security logs in a timely manner.

5. Data backup
Regular backups allow you to quickly restore data in case of loss.
Cloud services (such as Google Drive, OneDrive) offer automatic backups.

6. Regular software updates and vulnerability fixes
System updates address known vulnerabilities.
Using automated patch management systems (Patch Management).

7. API security
APIs are a common target of attacks, so it's important to use authentication tokens and secure API Gateway.

8. Employee training
The human factor remains one of the main risks
Conducting regular cybersecurity training.

Cases and examples
Case: Uber and data breach
In 2016, Uber was attacked, and hackers gained access to the data of 57 million users. The main cause of the leak was the compromise of developer credentials in the cloud service. The company did not immediately report the incident, which led to multimillion-dollar fines and a damaged reputation.
Conclusion: Even the largest companies can make mistakes in the security of cloud services, highlighting the importance of strict access control and monitoring.

Case: Netflix and the Zero Trust Approach
Netflix applies a Zero Trust model, where no user or device is considered trusted by default. Strict authentication and access control policies are used to protect cloud services. This allows the company to minimise risks and prevent data breaches.

The security of cloud services is not just the responsibility of the provider, but a shared responsibility between the business and users. Implementing best practices such as encryption, MFA, monitoring, and backup can help minimise risks and ensure reliable data protection.

It is important to understand that cyber threats are evolving, which means that security strategies must be constantly updated. Only a comprehensive approach to information protection can help companies avoid the serious consequences of attacks and maintain customer trust.