Data Analytics

Cloud security in modern architecture – how to design it right from day one

Agnieszka Ułaniak
Marketing Manager, Altimi
February 11, 2026
2
min read

Why cloud security is an architectural topic, not an “add‑on”

Many companies still treat security as a final stage: after go‑live, before an audit, or when an incident occurs. In the cloud, this mindset quickly translates into costs – not only financial, but also reputational and operational. Cloud architectures are dynamic, automated and often distributed (microservices, containers, test environments, CI/CD pipelines). That is why security must be part of the architecture, the processes and the way teams work.

The key mindset shift is this: in the cloud, security is not a state but a process. It means continuous management of risk, permissions, configuration, visibility and incident response. A well‑designed cloud architecture can increase security and accelerate delivery at the same time – provided the foundations are set up correctly.

Shared responsibility model: the most common source of misunderstandings

The first rule of cloud security is understanding the shared responsibility model: the cloud provider (AWS/Azure/GCP) is responsible for the security “of the cloud” as infrastructure, but the customer is responsible for securing what they build “in the cloud”: configuration, data, identities, applications and access.

The most common mistakes stem from the belief that “the cloud is secure by default”. The platform itself is secure – but it is the organisation’s configuration and processes that determine whether a system is actually resilient to incidents.

Foundations of secure cloud architecture

  1. Identity and access (IAM) – the most important security layer

In the cloud, you do not start with a firewall. You start with who has access to what. IAM is one of the most frequently exploited attack vectors, because errors in permissions can give an attacker the “keys to the kingdom”.

Good practices:

  • Principle of least privilege.
  • Roles instead of permanent, all‑powerful user accounts.
  • SSO + MFA as the default.
  • Separation of accounts/tenants per environment (dev/test/prod).
  • Short‑lived tokens and secret management (no secrets in code or configs).
  • Regular access reviews.

In a mature organisation there is no such thing as a “forever admin”; there are roles and automation.

  1. Network segmentation and environment isolation – limit blast radius

The second layer is the network: zones, segments, subnets, traffic control and restricting access to resources only where necessary.

Good practices:

  • Separate networks/projects per environment and per system.
  • Limiting east–west traffic between services.
  • Egress control and minimising exposure to the public internet.
  • Private endpoints for internal services where it makes sense.
  • Use of WAF, DDoS protection and rate limiting at the edge.

Segmentation should not make engineers’ lives harder – it should limit the impact of a mistake or attack.

  1. Data protection – encryption is only the beginning

In the cloud, data security is more than encryption. It covers the full lifecycle: data classification, access control, retention, backup, auditability and sometimes tokenisation or pseudonymisation.

Good practices:

  • Encryption at rest and in transit.
  • Key management (KMS/HSM) with rotation policies.
  • Data classification and access policies (e.g. for PII).
  • Backups and restore drills.
  • Versioning and protection against accidental deletion.
  • Retention policies aligned with regulations.

For companies operating in the EU, regulatory and industry requirements add another layer – the architecture must actively support auditability and compliance.

4. Application security – because most incidents are not about the infrastructure

In practice, most issues are not caused by “a vulnerability in AWS/Azure” but by application flaws, broken access control or logic bugs.

Good practices:

  • SAST/DAST and dependency scanning in the pipeline.
  • Coding standards and mandatory code reviews.
  • API security (authorisation, rate limiting, input validation).
  • Protection against common vulnerabilities (OWASP Top 10).
  • Container and image hardening (for Kubernetes and similar).
  • Configuration validation and security linting for IaC.

This is where DevSecOps stops being a buzzword and becomes everyday practice.

DevSecOps: how to embed security into the delivery process

The best cloud security does not come from a separate “security team” bolted on at the end, but from a delivery process that minimises risk automatically.

A practical DevSecOps setup should include:

  • CI/CD pipelines with built‑in quality and security checks (tests, scans, policies).
  • Infrastructure as Code plus policy‑as‑code for configuration control.
  • Automatic blocking of deployments that do not meet standards.
  • Central secret management and no secrets in repositories.
  • Automated updates of dependencies and base images.

If teams have to “remember” security manually, errors are inevitable. Automation shifts the dependency from people to process.

Visibility, monitoring and incident response – no security without observability

Without logs and monitoring, you simply do not know what is happening. In the cloud you need:

  • Centralised logging and event correlation.
  • Monitoring of infrastructure and applications (metrics).
  • Alerts with meaningful thresholds.
  • Audit trails for administrative actions (who did what, when).
  • Incident response playbooks and regular exercises.

The best teams do not assume an incident “will never happen”. They assume that when it does:

  • they will detect it quickly,
  • limit the impact,
  • restore the system,
  • learn from it and improve the process.

Most common cloud security mistakes (and how to avoid them)

  • IAM permissions that are far too broad – granted “just for a moment” and never revoked.
  • No environment separation – dev and prod in the same account or network.
  • Secrets in code – API keys and passwords committed to repos.
  • No configuration control – changes “clicked” directly in consoles.
  • No restore testing – backups exist, but nobody knows if they work.
  • Lack of visibility – fragmented logs, no correlation, no usable alerts.
  • Security “at the end” – fixes are late, expensive and painful.

The common pattern: no process and no automation. The cloud is less forgiving because change happens faster.

How to approach cloud security in your organisation: a practical rollout plan

Step 1: Fix the foundations (0–4 weeks)

  • IAM model + MFA/SSO.
  • Environment separation.
  • Basic network layout and segmentation.
  • IaC standard (Terraform or similar).
  • Secret management rules.

Step 2: Embed security into CI/CD (4–8 weeks)

  • Security scans and tests in the pipeline.
  • Policy‑as‑code.
  • Quality gates and release management.
  • Repository standards and review practices.

Step 3: Observability and operations (8–12 weeks)

  • Central logging.
  • Alerting and dashboards.
  • Incident response procedures.
  • DR tests and backup & restore exercises.

Step 4: Maturity and continuous improvement (ongoing)

  • Regular access reviews.
  • Configuration audits.
  • Incident response drills.
  • Automated patching and dependency updates.

Where Altimi fits (partnership approach)

Cloud security is not a one‑off project – it is part of product and organisational maturity. In a partnership‑based model (rather than pure “staffing”), the key is to combine:

  • Cloud architecture and cybersecurity expertise.
  • DevOps/CI/CD and Infrastructure as Code.
  • Operations and managed services.
  • QA and process quality.
  • And, where relevant, data and AI.

In practice, Altimi can support organisations in designing secure cloud architectures, automating DevSecOps, building monitoring and operational processes and running production environments according to clear security and quality standards – in a model that assumes responsibility for outcomes, not just for “delivery of tasks”.

Cloud security = architecture + process + operations

Security in cloud computing starts with IAM, segmentation and data protection, but it does not end with configuration. Ultimately it is about:

  • the delivery process (DevSecOps),
  • automation and configuration control (IaC and policies),
  • observability and incident response,
  • a culture of quality and ownership.

If the cloud is to accelerate your business rather than create risk, security has to be “by default” – built into the architecture and into the everyday way of working.

FAQ

FAQ: Security in cloud architecture

Is the cloud “secure by default”?

Cloud providers deliver a secure platform, but the security of configuration, data, identities and applications is the customer’s responsibility. This is the shared responsibility model. Most incidents are caused by misconfigured permissions, insecure settings or vulnerable applications.

Where should we start with cloud security?

Begin with IAM (SSO/MFA, least privilege), environment separation (dev/test/prod), secret management and automation (IaC). Without these foundations, even the best security tools will not provide real control or auditability.

What does DevSecOps give us beyond “more tools”?

DevSecOps embeds security into the delivery pipeline: scans in CI/CD, policy‑as‑code, automated quality gates and configuration checks. Security stops depending on people remembering steps and becomes an inherent property of the process – which is crucial in dynamic cloud environments.

Articles you might be interested in

Nearshoring in Poland for Germany and Austria: how to organise it as a partnership

March 11, 2026
Minutes

Tech Due Diligence for M&A: code, architecture, security, team

March 11, 2026
Minutes

Technology partner vs. software house: what German and Austrian enterprises really need

March 11, 2026
Minutes