☁️ Cloud Security April 15, 2025 · 10 min read

Cloud Security Posture Management: Build Your Program

Cloud misconfigurations cause more breaches than sophisticated attacks. Learn how to build a CSPM programme continuously monitoring AWS, Azure, and GCP against security benchmarks.

CS
☁️ Cloud Security
CS

Cloud security failures are almost always posture failures — not exotic zero-days or sophisticated nation-state attacks. Our managed vulnerability management service addresses exactly this continuous posture challenge. The data is clear: according to Gartner, through 2025, 99% of cloud security failures will be the customer’s fault, driven by misconfigurations, excessive permissions, and visibility gaps.

Cloud Security Posture Management (CSPM) is the practice of continuously assessing, monitoring, and remediating your cloud configuration risk. A CSPM program doesn’t replace security testing — a dedicated cloud security assessment is still essential — but it’s the operational layer that runs between tests, catching drift and misconfigurations before they become incidents.

This guide walks through how to build that program from nothing.


What CSPM Actually Covers

CSPM is often confused with:

  • CWPP (Cloud Workload Protection Platform) — protects running workloads (VMs, containers) with runtime security, vulnerability scanning, and AV
  • CIEM (Cloud Infrastructure Entitlement Management) — focuses specifically on identities, roles, and entitlements
  • SIEM — aggregates and correlates logs for threat detection and investigation

CSPM is specifically about configuration state — are your cloud resources set up securely? This covers:

  • IAM policy analysis (overpermissioned roles, unused credentials, privilege escalation paths)
  • Network configuration (security groups, NACLs, public exposure)
  • Data security (public S3 buckets, unencrypted databases, logging gaps)
  • Compliance (benchmarks like CIS AWS Foundations, PCI DSS, ISO 27001, SOC 2)
  • Threat detection based on configuration risk

Phase 1: Establish Visibility

You cannot secure what you cannot see. The first phase is about gaining complete, accurate visibility into your cloud environment.

1.1 Inventory Every Account and Subscription

Most organisations have more cloud accounts than they think. Shadow IT, developer sandboxes, and acquired companies all contribute to sprawl. Start with a complete inventory:

  • AWS: Use AWS Organizations to enumerate all accounts. Run aws organizations list-accounts
  • Azure: Check all subscriptions in Azure Management Groups
  • GCP: Enumerate all projects in your GCP Organization

Build this into an asset register — even a spreadsheet to start. You need to know what exists before you can assess it.

1.2 Classify Your Cloud Assets

Not all cloud assets are equal. A production database holding customer PII needs more scrutiny than a development sandbox. Apply a classification:

TierDescriptionExamples
Tier 1 — CriticalProduction systems, customer data, financial recordsProd RDS, customer S3 buckets, payment processing
Tier 2 — SensitiveInternal systems, pre-production, CI/CDStaging environments, artifact repos, secrets managers
Tier 3 — StandardDevelopment, testing, sandboxDev accounts, test databases, POC infrastructure

Apply stricter controls and more frequent assessment to Tier 1.

1.3 Enable Native Cloud Logging

Before any tooling, ensure your cloud’s native logging is enabled everywhere:

AWS:

  • CloudTrail in all regions (multi-region trail with data events)
  • VPC Flow Logs for all VPCs
  • S3 server access logging
  • CloudWatch Logs for application and service logs

Azure:

  • Activity Logs (subscription level)
  • Microsoft Defender for Cloud (formerly Security Center)
  • Azure Monitor diagnostic settings

GCP:

  • Cloud Audit Logs (Admin Activity + Data Access)
  • VPC Flow Logs
  • Cloud Logging export to BigQuery or Cloud Storage for retention

Phase 2: Define Your Security Baseline

A CSPM program needs a clear definition of “secure.” Without a baseline, you can’t measure deviation.

2.1 Choose Your Compliance Frameworks

Select the frameworks relevant to your industry and risk profile:

FrameworkWho Needs It
CIS AWS/Azure/GCP Foundations BenchmarkEveryone — gold standard for cloud hardening
PCI DSSAny organisation handling payment card data
HIPAAUS healthcare and covered entities
ISO 27001Enterprise, regulated industries globally
SOC 2SaaS companies selling to enterprise customers
GDPRAny org processing EU personal data
NIST CSFUS government contractors, critical infrastructure

2.2 Document Your Custom Policies

Beyond external frameworks, document internal policies:

  • “No S3 bucket in production will have public access”
  • “All EC2 instances must use IMDSv2”
  • “IAM roles must not include AdministratorAccess unless explicitly approved”
  • “All RDS instances must be encrypted with a KMS customer-managed key”
  • “Production VPCs must have GuardDuty enabled”

These become the policy rules you’ll enforce through your CSPM tooling.

2.3 Establish a Risk Scoring Methodology

Not every misconfiguration is equal. Develop a scoring approach:

  • Severity — how dangerous is this misconfiguration in isolation? (Critical / High / Medium / Low)
  • Asset classification — does it affect Tier 1 or Tier 3?
  • Exploitability — is this internet-facing? Can it be exploited without authenticated access?
  • Business impact — what data or systems are at risk?

A Tier 1 public S3 bucket with unencrypted customer PII scores much higher than a Tier 3 dev bucket with the same misconfiguration.


Phase 3: Select Your CSPM Tooling

3.1 Native Cloud Tools (Free, Start Here)

Before spending on third-party tools, maximise what your cloud provider gives you for free:

AWS:

  • Security Hub — aggregates findings from GuardDuty, Inspector, Macie, and checks against CIS AWS Foundations, PCI DSS, NIST 800-53
  • AWS Config — tracks configuration changes and evaluates against Config Rules
  • Trusted Advisor — basic checks for security, cost, and performance
  • GuardDuty — threat detection using CloudTrail, flow logs, DNS logs
  • Macie — S3 sensitive data discovery

Azure:

  • Microsoft Defender for Cloud — posture score, compliance dashboard, workload protection
  • Azure Policy — enforce and audit configuration at scale
  • Azure Advisor — security recommendations

GCP:

  • Security Command Center — asset inventory, misconfiguration detection, threat detection
  • Organization Policy Service — enforce constraints org-wide

Start with these. For many organisations, Security Hub + Config (AWS) or Defender for Cloud (Azure) is sufficient.

3.2 Third-Party CSPM Platforms

When to consider a third-party tool:

  • Multi-cloud environment (AWS + Azure + GCP) needing a single pane of glass
  • Larger security team needing workflow integration (ticketing, Slack alerts, JIRA)
  • Advanced CIEM capabilities (entitlement analysis, attack path visualisation)
  • Compliance reporting that needs to look polished for auditors

Leading options:

ToolStrengthsPricing Model
WizAgentless, attack path analysis, excellent multi-cloudPer-asset/subscription
Prisma Cloud (Palo Alto)Comprehensive CNAPP (CSPM + CWPP + CIEM), maturePer-resource
Orca SecurityAgentless, SideScanning™, good SME optionPer-account
LaceworkAnomaly detection, compliance automationPer-account
Aqua SecurityStrong container and Kubernetes focusPer-node
FugueIaC scanning + runtime CSPMPer-resource

3.3 IaC Security Scanning

CSPM finds misconfigurations at runtime — but you want to catch them before deployment. Add IaC scanning to your CI/CD pipeline:

  • Checkov (open source, Bridgecrew) — scans Terraform, CloudFormation, Kubernetes, Helm
  • tfsec (open source) — Terraform-focused
  • Terrascan — Terraform, CloudFormation, Kubernetes
  • Snyk IaC — commercial, integrates with VS Code, GitHub

Example Checkov integration in GitHub Actions:

- name: Run Checkov
  uses: bridgecrewio/checkov-action@master
  with:
    directory: terraform/
    framework: terraform
    output_format: sarif
    output_file_path: checkov-results.sarif

Block PRs that introduce Critical or High findings. Fix in code, not in the console.


Phase 4: Operationalise

Tooling without operations is just expensive noise. Phase 4 turns findings into action.

4.1 Triage and Prioritise

A fresh CSPM deployment on a mature cloud environment will surface hundreds or thousands of findings. Don’t try to fix everything at once. Triage:

  1. Critical findings on Tier 1 assets — fix within 24 hours
  2. High findings on Tier 1 assets — fix within 1 week
  3. Critical/High findings on Tier 2 assets — fix within 2 weeks
  4. Medium findings, all tiers — address in quarterly remediation sprints
  5. Low findings — track and address as capacity allows

Define these SLAs in writing and get leadership buy-in. Without SLAs, findings accumulate.

4.2 Assign Ownership

Every finding needs an owner. In most organisations, cloud security teams find issues but can’t fix them — that requires the engineering teams who own the resources.

Build a responsibility matrix:

  • Security team — triage, prioritise, track SLA compliance, escalate
  • Cloud/platform engineering — fix infrastructure-level misconfigurations (security groups, IAM, account-level settings)
  • Application teams — fix application-specific misconfigurations (their RDS instances, their S3 buckets, their Lambda permissions)

Use your issue tracker (JIRA, Linear, ServiceNow) to assign findings to the right teams with due dates matching your SLAs.

4.3 Automate Remediation Where Safe

Some misconfigurations can be auto-remediated without risk:

  • Enabling CloudTrail if disabled
  • Enabling S3 versioning if missing
  • Enabling RDS automated backups if disabled
  • Adding required tags to untagged resources

Use AWS Config Remediation Actions or custom Lambda functions for auto-remediation. Be conservative — only auto-remediate settings where there’s zero risk of service disruption.

4.4 Alerting and Escalation

Set up tiered alerting:

SeverityAlert ChannelResponse Time
Critical (new finding)PagerDuty / on-callImmediate
High (new finding)Slack #security-alertsWithin 1 hour
Medium (weekly summary)Email to team leadsNext sprint
Compliance driftDashboard + weekly emailNext review cycle

Phase 5: Measure and Report

A CSPM program needs metrics to demonstrate value and drive accountability.

5.1 Key Metrics

Posture metrics:

  • Security posture score over time (target: improving quarter-over-quarter)
  • Number of Critical/High open findings by team/account
  • Mean time to remediate (MTTR) by severity

Process metrics:

  • SLA compliance rate (% of findings fixed within SLA)
  • New findings introduced per week (leading indicator of drift)
  • % of cloud accounts with CSPM coverage

Compliance metrics:

  • CIS benchmark score by account
  • Compliance coverage % against target frameworks
  • Audit findings count (external auditors should see improvement year-over-year)

5.2 Reporting Cadence

ReportAudienceFrequency
Operational findings dashboardSecurity + engineering teamsReal-time
Team remediation statusTeam leadsWeekly
Posture trend reportCISO / VP EngineeringMonthly
Compliance statusCISO + legalQuarterly
Board risk reportBoard / audit committeeSemi-annual

Phase 6: Continuous Improvement

A CSPM program is never “done.” Cloud environments change constantly — new services, new accounts, new teams, new attack techniques.

Quarterly activities:

  • Review and update your policy baseline
  • Assess new cloud services for security controls
  • Run penetration tests on critical cloud infrastructure
  • Review IAM entitlements for privilege creep
  • Assess IaC templates for new misconfiguration patterns

Annually:

  • External cloud security assessment to validate your program
  • Compliance audit
  • Threat model review — has your threat landscape changed?

Quick-Start Checklist

If you’re starting today, here’s your 30-day plan:

Week 1 — Inventory and logging

  • Enumerate all cloud accounts/subscriptions
  • Enable CloudTrail (AWS) / Activity Logs (Azure) / Cloud Audit Logs (GCP) everywhere
  • Enable GuardDuty / Defender for Cloud / Security Command Center

Week 2 — Baseline and tooling

  • Enable Security Hub / Defender for Cloud compliance assessments
  • Choose CIS Benchmark as initial compliance target
  • Get a current posture score

Week 3 — Triage and prioritise

  • Triage all Critical and High findings
  • Assign ownership to each finding
  • Fix top 10 Critical findings

Week 4 — Operationalise

  • Define remediation SLAs
  • Set up alerting (PagerDuty / Slack)
  • Report posture score to leadership

After 30 days you’ll have a functioning CSPM program. The next 90 days are about driving your posture score up and building the operational discipline to maintain it.


CyberneticsPlus helps organisations build and mature cloud security programs. We conduct AWS, Azure, and GCP security assessments, build CSPM architectures, and help teams operationalise cloud security at scale. Contact us to get started.

#CSPM #cloud security #AWS #Azure #GCP #security posture #cloud governance

Need expert help with Cloud Security?

Our certified security team is ready to assess your environment and recommend the right solutions.

Book a Free Consultation