Contact Us Latest Security Reports → 中文
Blog / Technical Guide
TECHNICAL GUIDE

Cloud Security Governance: The Most Common Misconfigurations After Moving to the Cloud and How to Fix Them

Over 80% of cloud data breaches stem from misconfigurations, not zero-day vulnerabilities. This guide analyzes the most common cloud misconfigurations, clears up misunderstandings of the shared responsibility model, and explains how to build continuous cloud security governance.

Hexion Networks Security Research Team · 2025-08-05 · 9 min read
CLOUD SHARED RESPONSIBILITY MODEL Cloud Provider Responsible Physical Data Center Security Hardware & Network Infrastructure Virtualization Layer / Hypervisor Security OS Patching for Managed Services Customer Responsible Data Classification & Access Control ← Most Error-Prone IAM Permissions & Management Network Security Groups & Firewall Rules Encryption at Rest & In Transit Audit Logs & Monitoring Application Layer Security VS CSPM (Cloud Security Posture Management) tools automatically scan all items on the right for compliance

Gartner predicts that through 2025, 99% of cloud security failures will be the customer's fault — not the cloud provider's. Behind this striking number lies a widespread misunderstanding: many enterprises believe "moving to AWS or Azure means we're secure," ignoring that cloud operates under a Shared Responsibility Model — cloud providers are responsible for securing the cloud infrastructure; customers are responsible for securing what they run in the cloud.

Several high-profile Taiwanese enterprise data breaches in 2024 ultimately traced back to the same root cause: S3 buckets configured for public access, API keys leaked to GitHub, or overly permissive IAM policies. None of these were zero-day vulnerabilities — they were all preventable misconfigurations.

Six Most Common Cloud Misconfigurations

① Public Object Storage Access (S3/Blob Public) HIGH RISK

Setting an S3 bucket or Azure Blob to public read access allows anyone to anonymously access the data. The common cause: a developer opens it for testing convenience and forgets to close it before going to production. AWS now provides an account-level "Block Public Access" switch that should be enforced on all production accounts.

② Overprivileged IAM (Violating Least Privilege) HIGH RISK

Granting Administrator permissions for convenience, or using wildcard *:* IAM policies. If an IAM key with such permissions is leaked, an attacker can completely take over your entire cloud account. Use AWS IAM Access Analyzer to regularly review and remove unused permissions.

③ Secrets Leaked to Code Repositories HIGH RISK

Developers hardcode AWS Access Keys, database passwords, or API tokens directly into source code and push to public or private GitHub repositories. GitGuardian statistics show over 10 million secrets are detected on GitHub annually. Use environment variables, AWS Secrets Manager, or Azure Key Vault to manage secrets.

④ Overly Permissive Network Security Group Rules MEDIUM-HIGH RISK

Database security groups allowing 0.0.0.0/0 (global IP) access to ports 3306, 5432, or SSH (22) and RDP (3389) exposed directly to the internet. Restrict database access to only application server IPs. Admin access must go through a Bastion Host or VPN.

⑤ No Logging or Monitoring Enabled MEDIUM RISK

Not enabling AWS CloudTrail, Azure Monitor Logs, or GCP Cloud Audit Logs means there's no way to trace attack paths and scope after an incident. Audit logs should also be stored in a separate, write-protected storage space to prevent attackers from erasing tracks after a breach.

⑥ No Encryption at Rest MEDIUM RISK

Database disks (EBS, RDS), object storage (S3), and backups without encryption create exposure risk from cloud provider insiders or physical access scenarios. Modern cloud encryption is nearly free and transparent — it should be enabled by default.

CSPM: Automating Cloud Configuration Compliance

Cloud Security Posture Management (CSPM) tools continuously scan your cloud environment's configurations, compare them against security best practices and compliance benchmarks (CIS Benchmark, ISO 27001, PDPA), and automatically generate remediation recommendations.

CSPM Core Functions
  • Continuous Visibility: Centralized view of all resource configurations across AWS, Azure, and GCP — automatically identifies publicly exposed resources
  • Compliance Scoring: Automatically evaluates current environment compliance against CIS, NIST, SOC 2, GDPR, and other frameworks — generates auditable reports
  • Drift Detection: Real-time alerts when configurations deviate from security baselines (e.g., someone manually disabled public access blocking)
  • Auto-Remediation: Provides automated remediation scripts for known risky configurations — some tools support one-click fixes
Where to Start

Many cloud providers offer native free CSPM capabilities — AWS Security Hub (with GuardDuty integration), Azure Security Center, and GCP Security Command Center — these are the minimum baseline for cloud security governance and should be enabled from day one, not after an incident occurs.

Establishing a Cloud Security Baseline: Landing Zone Design Principles

Embedding security at account creation is far more efficient than patching after the fact. Here are the security design principles for a cloud Landing Zone:

  1. Account Isolation Strategy: Use separate cloud accounts for production, staging, and development. Restrict cross-account access to prevent development issues from affecting production.
  2. Service Control Policies (SCPs): Enforce security policies at the organization level — such as prohibiting CloudTrail from being disabled or public S3 buckets from being created — even account administrators cannot bypass these.
  3. Centralized Log Account: Create a dedicated logging account where all accounts' CloudTrail logs are centrally stored with immutable protection enabled.
  4. IAM Identity Center (SSO): Use AWS IAM Identity Center or Azure AD to centrally manage human access — avoid long-lived IAM keys scattered across accounts.
  5. Infrastructure as Code (IaC): Manage all resources with Terraform or CloudFormation, version-controlled in git, with security scanning steps integrated into the CI/CD pipeline.
Cloud Security CSPM IAM S3 Configuration Shared Responsibility Landing Zone
Need Expert Security Advice?

Contact Hexion Networks for a cloud security assessment and CSPM deployment recommendations tailored to your environment.

Free Consultation
ALL ARTICLES View All →
Threat Report
2026 Cybersecurity Threat Trends Analysis
2026-01-15
Technical Guide
Zero Trust Architecture Implementation Roadmap
2025-12-10
Threat Analysis
Ransomware Defense Strategy 2026
2025-11-28
Compliance
SEMI E187 Semiconductor Security Compliance Guide
2025-11-05
Threat Analysis
Social Engineering Attacks: From Phishing to AI Deepfake
2025-10-20
Technical Guide
OT/ICS Industrial Security: Purdue Model to Zero Trust
2025-10-08
Technical Guide
Enterprise IoT Security Challenges & Defense
2025-09-15
Threat Analysis
Software Supply Chain Attacks: SolarWinds to XZ Utils
2025-09-02
Technical Guide
MFA & Identity Security: OTP to Passwordless
2025-08-18
Technical Guide
Cloud Security Misconfigurations: Prevention Guide
2025-08-05