Cloud & Infrastructure

Is my business data actually secure in the cloud?

Understand the shared responsibility model, what cloud providers secure vs. what you must handle, and a practical checklist to keep your business data safe in the cloud.

centrexIT Team 7 min read

Key Takeaways

  • Cloud providers secure infrastructure, but you're responsible for your data, access controls, and configurations
  • Most cloud breaches stem from customer misconfigurations and weak access controls, not provider failures
  • Encryption at rest and in transit is essential - and usually free or low-cost to enable
  • Compliance certifications (SOC 2, ISO 27001, HIPAA) are achievable in the cloud with proper setup
  • A cloud security checklist covering MFA, encryption, backups, and monitoring is your best defense

“Our data is safer on a server we can see and touch.” We hear this from business owners all the time. It makes intuitive sense - if the server is in your office, you feel like you control it. But feeling secure and being secure are two very different things.

The honest answer to whether your business data is secure in the cloud is: it depends on what you do with it. The cloud itself is extraordinarily well-protected. The gaps almost always come from how businesses configure and manage their side of the equation.

Let’s walk through exactly how cloud security works, where the real risks are, and what you need to do to keep your data safe.

The Shared Responsibility Model: The Most Important Concept in Cloud Security

This is the concept that trips up most businesses. When you move to the cloud, security doesn’t become someone else’s problem. It becomes a shared problem - split between you and your cloud provider.

Think of it like renting office space. The landlord secures the building (locks, fire suppression, security cameras). But you’re responsible for locking your own office door, safeguarding your filing cabinets, and not leaving sensitive documents on the lobby table.

What the Cloud Provider Secures

  • Physical data centers - biometric access, armed guards, 24/7 surveillance, mantraps
  • Network infrastructure - DDoS protection, intrusion detection, traffic encryption at the backbone level
  • Hardware and hypervisors - server maintenance, hardware replacement, firmware updates
  • Global redundancy - data replicated across multiple geographic regions and availability zones

What You Are Responsible For

  • Identity and access management - who can log in, what they can see, and how they authenticate
  • Data encryption - ensuring your data is encrypted both at rest and in transit
  • Configuration management - security groups, firewall rules, storage permissions
  • Application-level security - patching and updating software you run on cloud infrastructure
  • Monitoring and logging - watching for suspicious activity and responding to alerts
  • Backup and recovery - making sure you can recover data if something goes wrong

Responsibility Varies by Service Type

The more the cloud provider manages, the less you have to handle - but you always own data and access.

Security LayerIaaS (Virtual Machines)PaaS (Managed Databases)SaaS (Microsoft 365)
Physical securityProviderProviderProvider
Network controlsSharedProviderProvider
Operating systemYouProviderProvider
Application layerYouSharedProvider
Identity and accessYouYouYou
Data protectionYouYouYou

Key point

No matter which service model you use, you are always responsible for who accesses your data and how it’s protected. That never shifts to the provider.

What Cloud Providers Actually Secure (And How Well)

Major cloud providers invest billions in security every year. To put that in perspective:

  • Microsoft Azure invests over $4 billion annually in cybersecurity and holds 100+ compliance certifications
  • Amazon Web Services (AWS) invests over $2 billion and maintains 98 compliance certifications
  • Google Cloud Platform invests over $2 billion and holds 90+ compliance certifications

Their data centers feature:

  • Redundant power with multiple backup generators
  • Advanced fire suppression systems
  • Multi-layered physical access controls
  • 24/7 security operations centers staffed by hundreds of analysts
  • Automatic failover across geographic regions

Compare that to the typical small business server setup: a closet with a single internet connection, a firewall that might be a version behind, and backups that haven’t been tested in months.

Why it matters

The infrastructure side of cloud security is almost certainly stronger than anything a small or mid-sized business can build and maintain internally. The risk isn’t with the provider’s infrastructure. It’s with what happens on your side.

Encryption: At Rest and In Transit

Encryption is your data’s last line of defense. If someone gains unauthorized access to your files, encryption ensures they can’t actually read anything.

Encryption at Rest

This protects data while it’s stored - sitting on a disk, in a database, or in a storage bucket.

  • How it works: Data is scrambled using an encryption key. Without the key, the data is unreadable.
  • What to do: Enable encryption on all cloud storage, databases, and backups. Most providers offer this by default or with a single toggle.
  • Key management: Decide whether the provider manages your encryption keys or you manage your own. Provider-managed keys are easier. Customer-managed keys give you more control but add complexity.

Encryption in Transit

This protects data while it moves between your devices and the cloud, or between cloud services.

  • How it works: TLS (Transport Layer Security) encrypts data during transmission.
  • What to do: Enforce HTTPS for all connections. Block unencrypted HTTP traffic. Ensure internal cloud-to-cloud traffic is also encrypted.

Encryption Best Practices for SMBs

PracticeDifficultyImpact
Enable default encryption at restEasyHigh
Enforce HTTPS/TLS everywhereEasyHigh
Use provider-managed encryption keysEasyModerate
Implement customer-managed keysModerateHigh
Encrypt backupsEasyHigh
Rotate encryption keys regularlyModerateModerate

Key point

Encryption at rest and in transit should be non-negotiable. The good news is that most cloud platforms make this straightforward - often it’s just a checkbox.

Access Controls: Where Most Businesses Fall Short

If encryption is your last line of defense, access controls are your first. And they’re where most cloud breaches actually happen.

Multi-Factor Authentication (MFA)

MFA is the single most effective security measure you can implement. It requires users to prove their identity with something they know (password) and something they have (phone, security key).

  • 82% of cloud breaches involve compromised credentials. MFA stops the vast majority of these.
  • Enable MFA on every account - no exceptions for executives, IT admins, or “convenience.”
  • Use authenticator apps or hardware keys rather than SMS codes when possible.
  • Cost: Free - built into every major cloud platform.

Role-Based Access Control (RBAC)

Not everyone needs access to everything. RBAC assigns permissions based on job function.

  • Principle of least privilege: Give each user the minimum access required to do their job.
  • Separate admin accounts: Admins should use standard accounts for daily work and admin accounts only when needed.
  • Regular access reviews: Quarterly, review who has access to what. Remove permissions for people who’ve changed roles or left the company.

Conditional Access Policies

Go beyond basic permissions with context-aware rules:

  • Block logins from countries where you don’t operate
  • Require managed devices for sensitive data access
  • Force re-authentication for high-risk actions (deleting data, changing configurations)
  • Block legacy authentication protocols that don’t support MFA

Common Cloud Misconfigurations (And How to Avoid Them)

When cloud breaches make the news, the cause is almost never a hacker breaking through the provider’s defenses. It’s a customer leaving a door wide open.

1. Publicly Exposed Storage Buckets

Companies create cloud storage (AWS S3 buckets, Azure Blob containers) and accidentally leave them accessible to anyone on the internet. This has caused some of the largest data exposures in recent years.

How to prevent it

  • Enable “block public access” settings at the account level
  • Audit storage permissions regularly
  • Use automated tools that flag publicly accessible resources

2. Overly Permissive Security Groups

Firewall rules in the cloud (security groups) that allow traffic from any IP address on any port. This is like leaving every door and window in your building unlocked.

How to prevent it

  • Restrict inbound access to specific IP addresses and ports
  • Never use “0.0.0.0/0” (open to the world) for management ports like RDP or SSH
  • Review security group rules quarterly

3. Unrotated or Shared Credentials

API keys, service account credentials, and admin passwords that haven’t been changed in years - or worse, are shared among multiple people.

How to prevent it

  • Rotate credentials on a regular schedule
  • Use individual accounts for every user (no shared logins)
  • Store secrets in a vault, not in code or spreadsheets

4. Disabled Logging and Monitoring

Many businesses don’t enable cloud audit logs, or they enable them but never review the data. Without monitoring, a breach can go undetected for months.

How to prevent it

  • Enable audit logging on all cloud services from day one
  • Set up automated alerts for suspicious activity
  • Retain logs for at least 90 days (longer for regulated industries)

Compliance Certifications: What They Mean for You

If you’re evaluating cloud security, you’ll encounter terms like SOC 2, ISO 27001, and HIPAA. Here’s what actually matters.

SOC 2

A third-party audit verifying that the provider has controls for security, availability, processing integrity, confidentiality, and privacy. All major cloud providers hold SOC 2 reports.

What it means for you

The provider’s infrastructure meets recognized security standards. But your configuration on top of that infrastructure is your responsibility - and your auditor’s concern.

ISO 27001

An international standard for information security management systems. Demonstrates a systematic approach to managing sensitive information.

What it means for you

The provider follows a structured security framework. If your business pursues ISO 27001, you can leverage the provider’s certification for infrastructure controls.

HIPAA

If you handle protected health information (PHI), you need HIPAA compliance. Cloud providers offer HIPAA-eligible services and will sign Business Associate Agreements (BAAs).

What it means for you

Using a HIPAA-eligible cloud service doesn’t make you HIPAA compliant. You must configure the service correctly, sign a BAA, encrypt PHI, implement access controls, and maintain audit logs.

PCI DSS

For businesses that handle payment card data. Cloud providers maintain PCI DSS compliance for their infrastructure.

What it means for you

You still need to secure your cardholder data environment, implement network segmentation, and maintain your own PCI compliance.

Key point

Compliance certifications tell you the foundation is solid. They don’t tell you the house is built correctly. Your configuration, policies, and practices on top of that foundation determine your actual compliance posture.

Backup and Recovery in the Cloud

“It’s in the cloud, so it’s backed up” is a dangerous assumption. Cloud providers offer high availability (your data is replicated so the service stays running), but that’s not the same as backup.

Why You Still Need Backups

  • Accidental deletion: An employee deletes a critical folder. Replication means that deletion is replicated everywhere.
  • Ransomware: If ransomware encrypts your cloud-synced files, the encrypted versions sync to the cloud.
  • Malicious insiders: A disgruntled employee intentionally destroys data.
  • Retention policies: Cloud services may not retain deleted data long enough for your needs.

Cloud Backup Best Practices

  • Backup to a separate location - different region, different provider, or both
  • Follow the 3-2-1 rule - three copies of data, on two different media, with one copy offsite
  • Test recovery regularly - restoring from backup should be a quarterly exercise, not something you try for the first time during a crisis
  • Define RPO and RTO - how much data can you afford to lose (Recovery Point Objective) and how quickly do you need to recover (Recovery Time Objective)
  • Automate backups - manual backup processes get skipped

Your Cloud Security Checklist

Here’s a practical checklist to evaluate and improve your cloud security posture. Rate yourself honestly.

Foundational (Do These First)

  • MFA enabled on every user account and admin account
  • Encryption at rest enabled on all storage and databases
  • Encryption in transit enforced (HTTPS/TLS everywhere)
  • Strong password policy enforced
  • Offboarding process removes cloud access immediately

Essential (Do These Next)

  • Role-based access control implemented
  • Least privilege principle applied to all accounts
  • Audit logging enabled on all cloud services
  • Automated alerts configured for suspicious activity
  • Backups running to a separate location and tested quarterly

Advanced (Strengthen Your Posture)

  • Conditional access policies in place
  • Data loss prevention (DLP) rules configured
  • Security awareness training covering cloud-specific threats
  • Regular configuration audits (quarterly at minimum)
  • Incident response plan that includes cloud-specific scenarios

The Bottom Line

Your business data can absolutely be secure in the cloud - but security doesn’t happen by default. The cloud provider delivers world-class infrastructure security. Your job is to lock down access, encrypt your data, configure services correctly, monitor your environment, and maintain tested backups.

The businesses that suffer cloud breaches aren’t compromised because the cloud is inherently insecure. They’re compromised because they assumed someone else was handling security, left storage buckets open, skipped MFA, or never tested their backups.

Take the shared responsibility model seriously. Implement the controls in this checklist. And if you’re not sure where you stand, get an assessment.


Want to know if your cloud environment is properly secured? Contact us for a cloud security assessment. We’ll evaluate your configuration, identify gaps, and give you a clear action plan.

Have More Questions?

Our team is here to help. Whether you're evaluating IT services or have a specific question about your technology, we're happy to have a conversation.