Home > Cybersecurity > Expert Contributor

Why Cloud Security Is a Business Imperative, Not an IT Task

By Juan Carlos Carrillo D Herrera - OneSec
Director de Cybersecurity Consulting Services (CCS)

STORY INLINE POST

Juan Carlos Carrillo D Herrera By Juan Carlos Carrillo D Herrera | CEO - Mon, 05/26/2025 - 06:00

share it

The cloud has completely changed how we store, access, and share information. Since its  inception, the cloud has proven to be an indispensable tool for businesses and individual users,  offering unprecedented flexibility and efficiency. 

The Latin American cloud computing market is experiencing significant growth, with a  compound annual growth rate (CAGR) of 15.45% between 2025 and 2030. The market is  estimated to reach US$55.21 billion in 2025 and US$113.23 billion in 2030. The adoption of cloud  solutions is skyrocketing, with an average growth rate of 31.2% by the end of 2022 and a  compound growth rate of 31.9% by 2025. 

One of the cloud's main functions is to boost remote access to data and applications. The cloud  offers scalable and cost-effective solutions that enable businesses to adjust quickly to market  demands. With the ability to store large volumes of data and run complex applications, the cloud has become a fundamental pillar of digital transformation. 

Saying "cloud security is just a checklist" is wrong. Nothing could be further from the truth. 

Cloud security is strategic. In today's rapidly evolving digital landscape, the cloud offers  incredible opportunities and introduces unique security challenges. How can we move beyond a  reactive, compliance-driven approach and adopt a proactive and effective cloud security posture? 

 

Cloud Security Transformation: From Expense to Strategic  Imperative 

We are at a crucial point in cybersecurity and undergoing a profound transformation. Gone are  the days when cybersecurity was a mere cost center, a budget item susceptible to cuts in times of  austerity. 

If we mix the cybersecurity and cloud situations, we have the perfect storm. 

The idea that cloud security is just a matter of "checking boxes" to comply with basic rules and  regulations is dangerously obsolete in today's digital landscape, characterized by sophisticated  and constantly evolving threats. 

In today's dynamic context, most CISOs assume a responsibility transcending mere technical  implementation. CISOs have become strategic communicators, with the crucial task of driving this  new understanding at the C-suite and among business leaders. They must clearly and  convincingly articulate how investment in cybersecurity is not a cost center, but a fundamental  pillar for resilience, the protection of critical assets, the preservation of reputation, and, ultimately, business sustainability in an increasingly complex and threatening digital  environment. This evangelization is vital to align security objectives with the organization's  strategic goals, ensuring that cybersecurity is intrinsically integrated into decision-making at all  levels. 

 

The Illusion of Safety: How to Unmask the Risks in the Cloud? 

You can't protect what you don't know. Just as illusions can deceive the eye, malicious actors are  adept at creating a false sense of security in the cloud. We must help organizations look beyond  the surface and truly understand what they are "seeing" in their cloud environments. 

The attack surface in the cloud includes visible assets, such as servers and applications, and  those that have been forgotten or misconfigured, such as unsecured storage buckets or exposed  access keys. A notable case was the Capital One breach in 2019, where a misconfigured AWS  bucket exposed the data of more than 100 million customers. This incident underscores the  importance of understanding what cyber attackers can "see" and what the organization must  control. 

 

Challenges and Realities of Cloud Security 

1. Visibility: Managing security in hybrid and multicloud environments is complex. 

2. Compliance: Compliance with various regulatory requirements (HIPAA, SOC 2, GDPR,  LFPDPPP, CCPA) adds another layer of complexity. 

3. Prioritization: Organizations struggle to prioritize and address the most critical  vulnerabilities. 

4. Skills Gap: Lack of experience in cloud security is a significant barrier. 

5. Ill-Founded Trust: 43% believe the public cloud is riskier than on-premises  environments. 

6. Multicloud Complexity: 72% of organizations using the cloud employ two or more  cloud providers. 

7. Implementation Gaps: Only 3% have implemented and consistently revamped a cloud  security plan across all areas. 

 

Three Steps to Cloud Security Success 

There are three key steps for starting a cloud security project: 

1. Discovery: Continuously discover identities, infrastructure, workloads, and data across  multicloud environments.

2. Risk Management: Visualize, prioritize, and remediate cloud security and compliance  risks. 

3. Scalability: Integrate security into CI/CD pipelines and DevSecOps workflows.

 

Call to Action 

Cloud security isn't a one-time project; it's an ongoing process requiring continuous effort. It is not an IT problem; it is a business enabler. 

We must guide the C-level to understand and accept this constant process. 

 

Key Actions: 

1. Implement a governance framework: Define a RACI table, assign responsibilities, and  create policies and procedures specific to cloud security (the on-premises frameworks  might not apply to the cloud world). 

2. Implement proactive threat detection and response mechanisms: Employ monitoring  tools, Cloud-Native Application Protection Platform, Cloud Security Posture  Management, and incident response plans to address threats, in, of, and for the cloud. 

3. Enforce the principle of least privilege and strong identity and access management: Limit user permissions to only what is necessary and implement multifactor  authentication (MFA) across all cloud resources. 

4. Continuous Compliance: Vulnerability identification done periodically is not enough in  the cloud. Threats could be active for minutes, so security compliance needs to be a 24/7  mandate. 

5. Prioritize data protection and encryption: Implement appropriate encryption  procedures for data, either at rest or in transit, and establish robust data loss prevention  (DLP) strategies.

You May Like

Most popular

Newsletter