Expert Insights on Cloud Security

By

Anthony Rivera, CIO, and Kevin Hartwig, Director of Infrastructure Services

Expert Insights on Cloud Security

As cloud adoption accelerates, so do the stakes for keeping data and systems secure. In early 2025, a major tech conglomerate suffered a high-profile breach when a misconfigured cloud firewall exposed sensitive data from millions of customers across multiple continents. Investigations revealed that overly broad access permissions and poor visibility into their overall security posture contributed to the incident—underscoring the fact that, despite sophisticated tools, even a single gap in configuration can unravel an entire security program. Below, Anthony Rivera and Kevin Hartwig explain how to prevent such missteps by strengthening identity controls, segmenting networks, guarding data, ensuring compliance, managing your security posture, and creating a culture of awareness. 

Shape

 

Identity and Access Management 

In cloud security, Identity and Access Management (IAM) is the foundation governing who can do what, when, and where. Anthony Rivera explains, “Effective IAM is the cornerstone of any cloud security strategy.” He emphasizes the importance of following the principle of least privilege—granting only the minimum permissions necessary—as over-permissioned accounts remain a primary source of breaches. Multi-factor authentication (MFA) is another potent safeguard that drastically reduces the likelihood of compromised credentials. Many organizations also adopt single sign-on (SSO) solutions to centralize identity management, simplifying user provisioning and deprovisioning. Rivera stresses that permission sets should be revisited often; automating provisioning and offboarding ensures that privileges never linger when employees or contractors leave. 

Shape

 

Network Security 

“We often focus so heavily on applications and data that we forget about the underlying network infrastructure that connects everything,” says Kevin Hartwig. A multi-layered strategy begins with segmentation: isolating workloads and environments using Virtual Private Clouds (VPCs), subnets, and security groups. This approach minimizes lateral movement if a breach occurs. Hartwig also endorses a zero trust architecture, which discards the notion of a secure perimeter and instead validates every user, device, and network segment. Encryption for data in transit—especially when crossing different regions or interacting with external services—further bolsters defenses. Hartwig notes that next-gen firewalls, intrusion detection systems, and web application firewalls offer additional layers of protection. He advises reviewing network access control lists regularly and closing any unused ports to limit entry points for attackers. 

Shape

 

Data Protection 

“Data is the lifeblood of modern enterprises. In the cloud, safeguarding it requires a multi-layered approach,” says Rivera. He points to encryption at rest and in transit, facilitated by tools like AWS Key Management Service or Azure Key Vault. Proper key management—secure storage, rotation policies, and strict controls on key access—is equally crucial. He recommends classifying data by sensitivity (confidential, restricted, or public), focusing resources on your most valuable or regulated assets. Frequent audits help keep track of data locations and ensure that the right protections are always in place. In the 2025 breach scenario, a failure to encrypt certain high-value data sets left them vulnerable—an oversight that could have been mitigated by comprehensive audits and encryption policies. Lastly, backups with versioning and restoration tests ensure organizations can recover quickly if data is compromised or lost. 

Shape

 

Compliance and Governance 

“Compliance isn’t just a checkbox; it’s a driver for better governance and robust processes,” emphasizes Hartwig. Whether aligning with GDPR, HIPAA, PCI DSS, FedRAMP, or local regulations, organizations must understand the shared responsibility model, where the cloud provider secures underlying infrastructure while each tenant secures its own data and access. Cloud-native or third-party tools can continuously monitor configurations to detect compliance drift early. Maintaining detailed logs of security configurations and settings streamlines both internal reviews and external audits. Hartwig advocates adopting an infrastructure-as-code approach to standardize governance and minimize manual misconfigurations—two measures that can help avoid the kind of large-scale oversight that led to the 2025 breach. 

Shape

 

Security Posture Management 

Security posture management is an ongoing process of discovering and fixing misconfigurations and vulnerabilities. Rivera points to Cloud Security Posture Management (CSPM) tools for automated scanning, offering real-time feedback on potential gaps. Regular vulnerability assessments on cloud environments, containers, and workloads also bolster defenses. Threat modeling—especially when dealing with microservices or multi-cloud architectures—helps teams anticipate attack paths before threat actors do. Rivera notes that an incident response plan is only as effective as its testing; tabletop exercises or live drills ensure teams can act swiftly under real-world conditions. He also recommends tracking metrics like the number of misconfigurations, average detection time, and patching timelines as part of a continuous improvement cycle. 

Shape

 

Training and Awareness 

“Humans remain both the strongest and weakest link. A single phishing email can undermine even the most sophisticated security controls,” warns Hartwig. Regular training sessions that address both technical subjects—like secure coding practices and configuration do’s and don’ts—and non-technical issues—such as social engineering awareness—are key. Tailoring sessions for specific roles helps employees internalize security best practices that are relevant to their day-to-day work. Hartwig highlights the importance of a culture of security, where employees can report anomalies without fear of blame. Indeed, the 2025 breach might have been spotted sooner if staff had been empowered to question unusual activity and investigate anomalies in access logs. 

Shape

 

The hypothetical 2025 cloud breach illustrates a sobering truth: when organizations overlook even one aspect of their security architecture—be it an open port, a misconfigured role, or an inadequate data protection policy—they risk exposing vast amounts of sensitive data. As Anthony Rivera and Kevin Hartwig stress, a layered approach to cloud security is the best defense. By combining strong identity and access controls, segmented networks, robust data protections, strict compliance measures, proactive security posture management, and a workforce educated to spot threats, companies can enjoy the benefits of cloud computing—while mitigating the very real risks that come with it. 

About the Experts 

Anthony Rivera, CIO of Access Point Consulting, is a seasoned IT and cybersecurity professional with more than 23 years of hands-on experience designing, delivering, and managing advanced cybersecurity architectures. Recognized for his ability to create and implement effective security strategies, Anthony excels at boosting hardware, software, and network performance while ensuring robust information assurance and manageability. 

Kevin Hartwig , Access Point’s Director of Infrastructure Services, has a strong background in Software Engineering and Site Reliability Engineering. He has designed and implemented reliable, cost-effective systems for every stage of customer’s cloud journey. Kevin’s experience spans cloud architecture and performance optimization, making him a trusted advisor for teams navigating complex infrastructure challenges.

Resources

To Enhance Your Cyber Operations

Employing the Concept of “Continuity of Care” in Cybersecurity

Employing the Concept of “Continuity of Care” in Cybersecurity

My wife, Kelly, was a pediatric nurse, having worked in healthcare for over 30 years. I'm biased, but she always got high marks in her profession, from both her peers and from patients for whom she provided care. She provided a level of care that was absolutely critical to ensure patients receive consistent, high-quality treatment across all stages of care. The importance of documentation, communication and a continuity of care was imperative – children’s lives depended on it. But what does continuity of care look like outside the world of healthcare? In the realm of cybersecurity consulting, the principle of continuity is just as vital and plays a pivotal role in safeguarding organizations from evolving cyber threats.

Find out more
Cloud IAM Best Practices – Simplifying Security Without Compromising Access

Cloud IAM Best Practices – Simplifying Security Without Compromising Access

Managing access in the cloud can be stressful. Who should be granted access? What if credentials get exposed? Should you err on the side of security or usability? If you work in Identity and Access Management (IAM), you are likely familiar with these stressors. But there’s good news: Following a few key principles can simplify navigating IAM while at the same time strengthening your organization’s security.

Find out more