The defaults are not secure. Every major cloud breach in the last five years — Capital One, Twitch, Samsung, Toyota — traced back to a misconfiguration that the cloud provider’s default settings didn’t prevent. AWS, Azure, and GCP give you the tools to build Fort Knox or a house of cards. The platform doesn’t care which one you pick. And the usual suspects know exactly which default settings to probe first.

This is the checklist. Not theory, not architecture diagrams — the specific settings and configurations that would have prevented most of the breaches you’ve read about. Go through it. Check every item. The cloud provider’s shared responsibility model means everything above the hypervisor is your problem.

DO / DON’T

DO:

DON’T:

Identity and Access Management

IAM is where most cloud breaches begin. One overly permissive policy, one set of leaked credentials, one forgotten service account — and the whole environment is compromised.

Root / Owner Account Lockdown

IAM Policies

CISA’s Cloud Security Technical Reference Architecture provides the baseline framework for federal cloud deployments, but the principles apply to everyone.

Logging and Monitoring

If you can’t see what’s happening, you can’t detect a breach. Enable logging before you deploy a single workload.

Centralized Logging

Log Integrity

Alerting

Network Controls

VPC / VNet Design

Security Groups / NSGs

Storage Security

Block Public Access

Encryption at Rest

Secrets Management

Hardcoded secrets are the cockroaches of cloud security — they’re everywhere and nearly impossible to fully eliminate.

CIS Benchmarks

The Center for Internet Security (CIS) publishes detailed hardening benchmarks for AWS, Azure, and GCP. These are consensus-based, independently audited checklists that cover everything on this page and more.

Run the benchmarks against your environment. Tools like Prowler (AWS), ScoutSuite, and cloud-native services (AWS Security Hub, Azure Defender, GCP Security Command Center) can automate the assessment.

Fix everything flagged as Critical or High. Review everything flagged as Medium. This isn’t optional — it’s the bare minimum.

The cloud gives you power. It also gives you the power to misconfigure yourself into a headline. Go through this list. Check every item. The shared responsibility model means everything above the foundation is yours to secure — or yours to lose.