0% found this document useful (0 votes)
20 views10 pages

Week 4 Paper Cloud Security

The document discusses the evolving landscape of cloud security, highlighting significant threats such as quantum computing, advanced persistent threats (APTs), and supply chain attacks. It emphasizes the need for modern security models like Zero Trust Architecture and cloud-native security to address these challenges, while also advocating for hybrid and multi-cloud environments to enhance security and flexibility. Ultimately, it calls for a strategic, cultural, and adaptive approach to cloud security in response to the increasing sophistication of cyber threats.

Uploaded by

jrosado915
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

Week 4 Paper Cloud Security

The document discusses the evolving landscape of cloud security, highlighting significant threats such as quantum computing, advanced persistent threats (APTs), and supply chain attacks. It emphasizes the need for modern security models like Zero Trust Architecture and cloud-native security to address these challenges, while also advocating for hybrid and multi-cloud environments to enhance security and flexibility. Ultimately, it calls for a strategic, cultural, and adaptive approach to cloud security in response to the increasing sophistication of cyber threats.

Uploaded by

jrosado915
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

"The Future of Cloud Security"

Julian Rosado
Keiser University
Cloud Security (CIS2690)
Daniel Robertson, M.S., CISSP
July 6th, 2025
In the technological landscape, cloud computing has radically

transformed this realm by providing flexible, scalable, and cost-effective

infrastructure for organizations of all sizes. However growth of this magnitude

does not come without pains, as the complexity of this field and the threats

faced within scale alongside it. New challenges arise as emerging tech brings in

advanced cyber adversaries, leading to traditional security methods becoming

outdated and unable to keep up. Of the threats that cybersecurity must deal with

these days, the most pressing are quantum computing, advanced persistent

threats (APTs), and supply chain attacks.

Once just a theoretical concept, quantum computing has steadily evolved

towards reaching practical application. What makes quantum computing

different from the classical form is that it utilizes qubits, which have distinct

advantages over the standard bits normal computers use. Most notably, they

make use of an ability called superposition, which “can be described as both 0

and 1, or as all the possible states between 0 and 1 because it actually

represents the probability of the qubit’s state” (Schneider, 2024). This means

that quantum computers are capable of processing at a significantly faster rate.

These functions make quantum computing exceptionally dangerous in one area:

cryptography. Most public-key encryption algorithms are based on

mathematical problems that classical computers struggle to solve. Using Shor’s

algorithm, an algorithm that puts quantum computing in the spotlight, powerful

quantum computing can easily defeat many of today’s encryption methods.

Work on countering this threat has already begun, as the security community
has been developing cryptographic algorithms that can withstand quantum

attacks.

Advanced persistent threats are people, not machines or algorithms, that

infiltrate networks and commit espionage, taking advantage of human lapses in

judgement and monitoring. They are especially dangerous because they can be

backed by criminal organizations and nation-states. APTs are not

uncounterable, as there are means of preventing such lapses made by humans.

Organizations should make use of Zero Trust Architecture (ZTA), a system that

makes use of least privilege. “Least privilege means that users and devices are

only granted the permissions they need to perform their tasks. This helps reduce

the attack surface and makes it more difficult for attackers to gain access to

sensitive data” (Anon, 2023). Other options include behavioral analytics,

continuous monitoring of systems, and robust access controls.

Lastly, “supply chain” attacks are another tactic employed by attackers.

Supply chains do not include physical components alone, but open-source

libraries, third-party services, APIs, etc. These are not the primary targets,

however, as they simply act as a stepping stone towards the broader systems

they are a part of. The interconnectedness of cloud environments ultimately

becomes their downfall, allowing attackers access to one vendor or provider to

another. Rather than steal information, attackers introduce malicious code and
backdoors for other attackers to enter otherwise secure environments. A real

world example would be the SolarWinds incident in 2020, in which “The breadth

of the hack is unprecedented and one of the largest, if not the largest, of its kind

ever recorded…the hack compromised the data, networks and systems of

thousands when SolarWinds inadvertently delivered the backdoor malware as

an update to the Orion software” (Kerner, 2023). In order to mitigate these

attacks, organizations need to assess the third-party vendors or providers they

associate with, as well as making use of DevSecOps in order to employ secure

software development practices.

While these aforementioned threats seem daunting, cloud security

models have begun to evolve to counter them. One model that can serve as the

frontline defense is Zero Trust Architecture. It operates on one principle: “Never

trust, always verify.” ZTA never assumes any user, device, or system is to be

trusted by default. Access is instead granted on a continuous identity check, as

well as device health, location, and user behavior. It is the foundational security

model that protects distributed, cloud-based workloads, particularly in hybrid and

remote-first organizations.

Cloud-native security takes the place of traditional security tools as it

focuses on protecting the cloud stack itself, which includes the services,

workloads, infrastructure, and applications. These architectures focus on

embedding themselves into the runtime environments and development

pipeline, making sure there is protection for an entire lifecycle of cloud

workloads. Using key tools such as Cloud Security Posture Management

(CSPM) for misconfiguration identification and Cloud Infrastructure


Entitlement Management (CIEM) for managing identity permissions, CNS

provides scalable, automated, and context-aware security.

Finally, we will address cloud security environments that have risen to

meet the challenges presented today: hybrid cloud and multi-cloud

environments. Hybrid cloud environments are where organizations combine

one or more public cloud platforms with on-campus infrastructure; they require a

unified strategy bringing together both legacy and modern cloud services. “With

the hybrid cloud, organizations can experience the best of both worlds. They

can rely on the third-party public cloud to scale and optimize their resources

while still using the on-premises, private cloud to manage more critical

workloads that may require greater levels of security or control” (Anon, n.d).

Multi-Cloud Security involves making usage of multiple cloud providers like

AWS and Azure to prevent vendor lock-in, improve redundancy, and optimize

cost and performance. It offers enhanced security, offers flexibility in regulations

and compliance, and has improved redundancy and reliability.

In conclusion, cloud computing is a field with near limitless possibilities,

but is not free from dangers as threat actors will always seek some way of

stealing information and causing disruptions. The strategy of “castle-and-

moat” no longer functions in today’s world. It requires post-quantum

readiness, proactive defense, robust supply chains, and unified, adaptive

policies. It’s not just about tools, but strategy, culture and continuous

evolution.
References
Neuens, E. (2023, August 2). What is Zero Trust Architecture? | SANS
Institute. Www.sans.org. https://www.sans.org/blog/what-is-zero-
trust-architecture/

IBM. (2024, February 28). Qubit. Ibm.com.


https://www.ibm.com/think/topics/qubit

Oladimeji, S., & Kerner, S. M. (2023, November 3). SolarWinds hack


explained: Everything you need to know. TechTarget.
https://www.techtarget.com/whatis/feature/SolarWinds-hack-
explained-Everything-you-need-to-know

Microsoft. (n.d.). What Is DevSecOps? Definition and Best Practices |


Microsoft Security. Www.microsoft.com.
https://www.microsoft.com/en-us/security/business/security-
101/what-is-devsecops

Anon. (n.d). What is Hybrid Cloud Computing – Definition | Microsoft Azure.


Azure.microsoft.com. https://azure.microsoft.com/en-
us/resources/cloud-computing-dictionary/what-is-hybrid-cloud-
computing/
Street Address
City, ST ZIP Code

You might also like