← Back to all briefings
Governance 6 min read Published Updated Credibility 91/100

NSA guidance on mitigating cloud vulnerabilities

The NSA just published a surprisingly practical cloud security guide. The short version: most cloud breaches come from the same misconfigurations—overly permissive IAM policies, flat networks, exposed management interfaces, and no logging. Turn on CloudTrail, tighten your security groups, and enforce MFA everywhere. The basics still matter.

Reviewed for accuracy by Kodi C.

Governance pillar illustration for Zeph Tech briefings
Governance, ESG, and board reporting briefings

On , the National Security Agency released the report Mitigating Cloud Vulnerabilities, detailing frequent cloud weaknesses including overly permissive IAM policies, flat network architectures, unprotected management interfaces, and insufficient audit logging. The advisory provides concrete architectural and operational controls organizations can adopt immediately to reduce risk from cloud account takeover and data exfiltration.

Common Cloud Misconfigurations Identified

The NSA guidance identifies several categories of cloud misconfiguration that frequently enable security incidents. Identity and access management weaknesses include overly permissive IAM policies granting broader access than necessary, inactive service accounts retaining elevated privileges, and insufficient use of multi-factor authentication for administrative access.

Network segmentation deficiencies expose cloud workloads to unnecessary risk. Common issues include flat network architectures without security group isolation, management interfaces exposed to public internet access, and insufficient use of private endpoints for service-to-service communication.

Visibility gaps prevent detection and response to security incidents. Organizations frequently fail to enable provider-native logging (CloudTrail, Activity Logs, Cloud Audit Logs), forward logs to centralized SIEM platforms, or retain logs for sufficient periods to support incident investigation.

Configuration management weaknesses include manual changes that bypass change control processes, infrastructure-as-code templates without security review, and absence of automated drift detection that would identify configuration regressions.

Identity and Access Management Controls

Enforce least privilege by granting only the minimum permissions required for each role or service. Review and right-size existing IAM policies, removing overly broad permissions accumulated over time. Implement regular access reviews to identify and remove unnecessary privileges.

Enable MFA for all administrative accounts without exception. Cloud provider console access, API access from interactive users, and federated authentication flows should all require multi-factor authentication. Consider phishing-resistant MFA mechanisms such as hardware security keys for highest-privilege accounts.

Constrain role assumptions with context-aware policies that limit where, when, and how credentials can be used. Implement IP-based restrictions, time-based constraints, and conditional access policies that detect and block anomalous authentication patterns.

Implement separation of duties for sensitive operations. Require multiple approvals for high-risk changes, isolate production and development environments with separate identity boundaries, and prevent single administrators from accumulating excessive privilege across environments.

Network Segmentation and Architecture

Isolate management planes from workloads using network security controls. Administrative access should traverse separate network paths with additional authentication and monitoring. Workload-to-workload communication should be restricted to required flows using security groups, network policies, or service mesh controls.

Restrict inbound access using security groups, network ACLs, and service endpoints rather than broad internet exposure. Default-deny configurations should block all traffic except explicitly permitted flows. Review security group rules regularly to identify and remove overly permissive configurations.

Implement private endpoints for services that do not require public internet access. Use VPC peering, transit gateways, or private connectivity options to keep traffic within cloud provider networks rather than traversing public internet.

Deploy web application firewalls and API gateways in front of internet-facing services to filter malicious requests, implement rate limiting, and provide additional logging visibility for external traffic patterns.

Visibility and Monitoring Implementation

Turn on provider-native logging across all cloud accounts and regions. CloudTrail (AWS), Activity Logs (Azure), and Cloud Audit Logs (GCP) should be enabled with management event logging at minimum. Consider enabling data event logging for sensitive storage buckets and databases.

Ship logs to centralized SIEM platforms for correlation, alerting, and long-term retention. Cloud provider log storage provides basic retention, but centralized analysis enables detection of patterns spanning multiple accounts or services.

Align log retention with legal and compliance requirements. Many regulations require specific retention periods for audit logs; ensure cloud logging configurations meet these requirements. Consider immutable log storage to prevent tampering by compromised accounts.

Implement real-time alerting for security-relevant events including administrative authentication, privilege escalation, security group modifications, and access to sensitive resources. Tune alerts to balance detection sensitivity against alert fatigue.

Change Control and Configuration Management

Apply infrastructure-as-code reviews and automated security scanning to prevent misconfigurations before deployment. Integrate cloud security posture management tools into CI/CD pipelines to identify policy violations during the development process.

Implement automated drift detection to identify configuration changes that deviate from approved baselines. Alert on unauthorized modifications and consider automated remediation for high-risk configuration drift.

Establish change management processes for cloud infrastructure that mirror traditional IT change control. Require documented justification, approval workflows, and post-setup verification for infrastructure changes.

Maintain configuration baselines and version history to support incident investigation and rollback. Infrastructure-as-code repositories provide audit trails for configuration changes when properly implemented.

Implementation Priorities and Roadmap

Immediate actions (0-30 days) should include enabling cloud provider logging across all accounts, reviewing and tightening security group rules, and implementing MFA for administrative access. These controls address the highest-risk misconfigurations with relatively low setup effort.

Near-term priorities (1-3 months) should include centralizing log collection, implementing infrastructure-as-code scanning, and conducting full IAM policy reviews. Establish monitoring and alerting for security-relevant events.

Medium-term activities (3-12 months) should include implementing advanced network segmentation, deploying cloud security posture management platforms, and establishing continuous compliance monitoring. Integrate cloud security into regular audit and assessment cycles.

  • Enable cloud provider logging (CloudTrail, Activity Logs, Cloud Audit Logs) across all accounts and regions immediately if not already active.
  • Review IAM policies and remove overly permissive access, implementing least privilege principles across all service accounts and user roles.
  • Implement multi-factor authentication for all administrative and privileged access without exception.
  • Review security group configurations and implement default-deny rules, allowing only explicitly required traffic flows.
  • Deploy private endpoints for services that do not require public internet access, minimizing attack surface exposure.
  • Establish centralized log collection and implement real-time alerting for security-relevant events.
  • Implement automated cloud security posture management to continuously monitor for configuration drift and policy violations.
  • Conduct regular access reviews to identify and remediate accumulated permissions that exceed job requirements.

Key takeaways

The NSA cloud security guidance addresses foundational misconfigurations that enable the majority of cloud security incidents. Organizations frequently underestimate the security implications of default cloud configurations that focus on ease of use over security. Implementing the controls outlined in this guidance significantly reduces attack surface and improves detection capabilities for threats that do materialize.

Beyond the Checklist: What Actually Works

The NSA's guidance is thorough, but let us talk about what it means in practice. Cloud security is not about achieving a perfect audit score—it is about understanding your risk exposure and making intelligent tradeoffs aligned with your mission.

The most common mistake? Treating cloud security as an IT problem rather than a business decision. Your security posture should reflect what you are protecting, not just compliance requirements.

Start With What Matters Most

Before diving into technical controls, answer three questions: What data are you putting in the cloud? Who needs access? What happens if it is compromised? Your answers shape everything from identity management to encryption choices.

Do not try to boil the ocean. Pick two or three high-impact improvements and execute them well. A properly configured identity system with strong MFA will do more for your security than a dozen half-implemented controls.

Continue in the Governance pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

References

  1. NSA Cloud Security Guidance — NSA
  2. NIST SP 800-144 — NIST
  3. CIS Cloud Benchmarks — CIS
  • NSA Cloud Security
  • Misconfiguration
  • IAM
  • Audit Logging
  • Segmentation
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.