{"id":75116,"date":"2026-04-17T02:27:33","date_gmt":"2026-04-17T02:27:33","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=75116"},"modified":"2026-04-17T02:27:33","modified_gmt":"2026-04-17T02:27:33","slug":"cloud-security-becomes-a-critical-skill-as-threats-rise-across-modern-infrastructure","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/cloud-security-becomes-a-critical-skill-as-threats-rise-across-modern-infrastructure\/","title":{"rendered":"Cloud Security Becomes a Critical Skill as Threats Rise Across Modern Infrastructure"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.pexels.com\/photos\/35686447\/pexels-photo-35686447.jpeg\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>The rate of cloud adoption is changing across the technology scene in both positive and negative ways. With the increase in security challenges that are amplified by the complexities of distributed systems, shared responsibility models, and security configurations, the challenges of modern infrastructure are growing rapidly.&nbsp;<\/strong><\/p>\n\n\n\n<p>At modern centers of IT, cloud computing is vital. This is viewed in terms of all the activities carried out, from developing applications that support data storage. With the desire for improved operational efficiency and scaled potential, the desire to move workloads to the cloud is ever-increasing.&nbsp;<\/p>\n\n\n\n<p>However, the negative side of this is the security challenges that come with the cloud. These problems are not visible in the traditional infrastructure models. With the increase in adoption, <a href=\"https:\/\/orca.security\/resources\/blog\/what-is-cloud-security\/\" target=\"_blank\" rel=\"noopener\">cloud security explained<\/a> becomes a matter of dire necessity. This urgency arises from the shift in certain roles and responsibilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The rapid shift to cloud is reshaping how organizations think about risk<\/h2>\n\n\n\n<p>The urgency associated with modern cloud technologies demonstrates the need for true cloud computing security. In simplified terms, cloud computing security is a combination of various tools and policies that are put in place to secure cloud-based systems, data, and infrastructure. In the context of cloud computing, security is a shared responsibility. The provider is tasked with securing the infrastructure, and the customer is responsible for securing configurations, workloads, and access.<\/p>\n\n\n\n<p>Implementing this model has created uncertainty in many businesses. Gaps in protection often result from misunderstandings around responsibility. As per IBM\u2019s Cost of a Data Breach Report 2024, data breaches cost businesses an average of 4.45 million dollars, with cloud misconfigurations cited as a cause in numerous cases.<\/p>\n\n\n\n<p>There has been an evolution in how risk management is approached. The conventional perimeter-based risk techniques are ineffective in environments with distributed systems. Organizational security is focused on Identity and Access Management systems, controls, and continuous operational systems. With an expanding cloud environment, organizations must reconfigure their risk management systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security responsibilities are expanding beyond traditional IT boundaries<\/h2>\n\n\n\n<p>Security responsibilities have changed as a result of cloud adoption. Security teams operating in a centralized fashion have been replaced with security roles dispersed across the development, DevOps, and infrastructure teams.<\/p>\n\n\n\n<p>Over four million people are still needed to fill roles in the global cybersecurity workforce, according to the <a href=\"https:\/\/www.isc2.org\/insights\/2024\/10\/isc2-2024-cybersecurity-workforce-study?queryID=0b3cec3b266e158b8703f4ad157dd018&amp;utm_\" target=\"_blank\" rel=\"noopener\">2024 ISC2 Cybersecurity Workforce Study. <\/a>The rapid workforce shortage has made it difficult for organizations to complete security tasks and has necessitated the use of interdepartmental units. As a result, securing infrastructure and applications is now the responsibility of individuals who are not in recognized security positions.<\/p>\n\n\n\n<p>The implications of this are far-reaching. When coding, developers are now expected to incorporate security measures. Engineers must ensure that the infrastructure is configured properly. All teams are expected to set up and manage systems to facilitate continuous operational monitoring for the purpose of identifying and responding to threats. The absence of proper coordination is likely to result in an unchecked spread of vulnerabilities and other threats.<\/p>\n\n\n\n<p>Organizations are embedding security actions into workflows and fostering shared responsibility. Nonetheless, to be effective, there must be training and alignment, as distributed responsibility without these elements can heighten risk instead of mitigating it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Misconfigurations and visibility gaps continue to expose critical systems<\/h2>\n\n\n\n<p>Among the cloud security incident causes, misconfigurations are the most common. Sensitive information can be left accessible to unauthorized parties due to improperly configured storage, excessive permissions, or exposed services.<\/p>\n\n\n\n<p>The Verizon Data Breach Investigations Report 2024 states that human error remains a contributory factor to numerous breaches and is particularly critical in the cloud due to the complex configurations. Because of the expansive nature of cloud services, even the smallest error can have devastating effects.<\/p>\n\n\n\n<p>The challenge of visibility is even greater. With the growing adoption of multi-cloud and hybrid systems, the organization and tracing of distributed constituents and their access terminals becomes increasingly complex. The security teams are the most affected as they are often left without a complete understanding of the environment.<\/p>\n\n\n\n<p>Effective security is reliant on ongoing surveillance and effective management of the organization\u2019s assets. <a href=\"https:\/\/www.devopsschool.com\/#\">Tools<\/a> that detect anomalies and misconfigurations can be useful in risk mitigation, but they cannot be relied on to eliminate risk. The data provided must be reviewed and analyzed to determine and address the priority areas, and that can be done only by qualified personnel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DevOps teams are being pushed to integrate security earlier in the lifecycle<\/h2>\n\n\n\n<p>The adoption of DevOps has accelerated the focus on speed, automation, and delivery continuity. Such priorities guided the organizations focus on security. Instead of treating it as a final activity, teams now integrate security earlier in the development lifecycle.<\/p>\n\n\n\n<p>The term DevSecOps refers to the incorporation of security into every step of the development and deployment lifecycle. Some of the processes involved are prompts for code scanning, assessment of vulnerabilities, and automated policy enforcement.<\/p>\n\n\n\n<p>According to the GitLab Global DevSecOps Report 2024, more than 70 per cent of developers say they are responsible for the security of the processes they work on. This shows an increasing number of professionals expecting security to be an issue that every member of the team contributes to.<\/p>\n\n\n\n<p>The earlier security is implemented, the more benefits can be gained. By implementing security measures during the development process, costs can be reduced, and security and the number of vulnerabilities can be limited. Automated security controls improve consistency, reduce manual work, and can speed up processes. The benefits are directly related to having the knowledge and skills needed to be successful.<\/p>\n\n\n\n<p>It&#8217;s a given that when security responsibilities increase, staff need the skills to implement secure design and systems development to reduce risk. Early security processes should not be implemented without staff having the requisite skills.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rate of cloud adoption is changing across the technology scene in both positive and negative ways. With the increase in security challenges that are amplified by the complexities of distributed systems, shared responsibility models, and security configurations, the challenges of modern infrastructure are growing rapidly.&nbsp; At modern centers of IT, cloud computing is vital&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[11138],"tags":[],"class_list":["post-75116","post","type-post","status-publish","format-standard","hentry","category-best-tools"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/75116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=75116"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/75116\/revisions"}],"predecessor-version":[{"id":75117,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/75116\/revisions\/75117"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=75116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=75116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=75116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}