Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity Insights
Top 21 Cloud Security Best Practices

Top 21 Cloud Security Best Practices

Published: 04/23/2026

Written by: Nadine Rozell

Here's a not-so-fun fact: the people trying to breach your environment are organized, well-funded, and getting better at their jobs every year. They're not lone hackers in dark basements. They're running operations with defined roles, real business models, and one very clear goal: finding the crack in your defenses before you do.

The good news? So are the people working to stop them.

With the right controls in place, you can stop reacting to threats and start building an environment that's genuinely hard to crack. In this 2026 guide, we go over 21 practical cloud security tips to get you there.

The best practices for cloud security in this list aren't theoretical. They reflect what the Huntress SOC sees organizations benefit from every single day. 

Key takeaways

  • Cloud security requires visibility across every layer: endpoints, identity, network, and logs

  • A managed SIEM removes the operational burden of log monitoring without sacrificing coverage

  • Endpoint protection can't just mean Windows — Linux and macOS are active attack targets too

  • Identity is the most exploited attack vector in cloud environments; ITDR is essential

  • Most cloud breaches trace back to misconfigurations, not sophisticated zero-days

  • Compliance and security aren't the same thing — but a managed SIEM helps you nail both

Section I: Visibility and monitoring

1. Centralize visibility with a Managed SIEM

You can't stop what you can't see.

A SIEM pulls log data from across your environment — endpoints, firewalls, VPNs, cloud services, identity systems — into one place for threat detection, incident investigation, and compliance. Without one, you're flying blind while attackers count on exactly that.

Traditional SIEMs are expensive, noisy, and require dedicated expertise to run. That's why a managed SIEM solution should be the go-to for teams that want visibility without standing up an in-house security operations function.

What makes a cloud SIEM fast to deploy? Look for a managed model where the vendor handles setup, tuning, and detection writing. The best options reuse existing agents for log collection, ship with pre-built integrations, and use smart filtering to kill noise from day one.

Huntress Managed SIEM uses the same lightweight agent already deployed for EDR to collect Windows Event Logs — no new infrastructure needed. Syslog, API, and cloud source ingestion are all configured through the Huntress portal, and the 24/7 AI-centric SOC monitors, tunes, and only escalates what actually matters. Our proprietary Smart Filtering engine strips non-security-relevant events at ingestion, keeping costs predictable and alert fatigue low.


2. Get your log ingestion strategy right

Logging everything creates its own mess: cost, noise, compliance headaches. Know which sources matter, how to ingest them, and what format your SIEM needs.


Ingestion Method

Protocols/Formats

Common Use Case

Agent-based (OS logs)

Windows XML Event Format

Windows endpoint and server security event logs

Syslog Collector

Syslog over UDP/TCP

Firewalls, network appliances, VPN concentrators

API

REST API (JSON)

Cloud services: AWS CloudTrail, Cisco Meraki, SentinelOne, Duo

HEC (HTTP Event Collector)

HTTPS (JSON)

SaaS platforms sending data directly to the cloud SIEM


For Windows environments, prioritize Security event logs — logon events, privilege use, process creation, and account management. These give your SIEM the sharpest signal for detecting lateral movement, credential abuse, and persistence.


3. Implement continuous compliance monitoring

HIPAA, PCI DSS, CMMC, and SOC 2 expect ongoing controls — real-time alerting, complete audit trails, and evidence you can produce on demand.

A managed SIEM handles this automatically: centralized retention, compliance reports, and searchable evidence without manual log pulls.

On data sovereignty: How vendors handle data residency varies a lot. Before committing, ask: Where is my data physically stored? Is it encrypted in transit and at rest? Can I set retention periods per source? Are audit logs immutable? Huntress Managed SIEM stores data in AWS, encrypted in transit and at rest, with retention configurable from one year up to seven.

Section II: Endpoint and identity protection

4. Deploy EDR across every endpoint — including Linux and macOS

Leaving Linux or macOS endpoints uncovered is one of the most common and costly blind spots in cloud security. Attackers know exactly where you're not looking, and that's where they go first.

The right approach for mixed OS environments is purpose-built coverage for each platform — not a Windows-native tool retrofitted for everything else. You need consistent detection quality, response capability, and SOC oversight whether a threat lands on a Windows server, a developer's Mac, or a Linux host.

Huntress Managed EDR covers all three with purpose-built agents:

  • Windows – Persistent foothold detection, ransomware canaries, process insights, host isolation, managed Microsoft Defender Antivirus

  • macOS – Purpose-built for macOS threats, with tamper protection, XProtect alert visibility, and an 8-minute MTTR

  • Linux – For lightweight, stable monitoring across major distros


5. Protect cloud identities

Identity is the most targeted attack vector in cloud environments. Credential stuffing, phishing, OAuth token abuse, and unauthorized app consents live in identity and auth logs most teams aren't watching. And that's a gap attackers are happy to exploit quietly, for as long as you let them.

Solutions such as ITDR continuously monitor for suspicious sign-ins, privilege escalation, lateral movement, and account takeovers. With Huntress, our Managed ITDR solution covers Microsoft 365 and Entra ID, backed by the same 24/7 SOC that monitors your endpoints. Duo authentication data can also be ingested into Huntress Managed SIEM for correlation with endpoint and network events.


6. Enforce MFA everywhere — no exceptions

A phished password is worthless if an attacker can't get past the second factor. That's it. That's the whole tip. Enforce MFA for all admin and privileged accounts, remote access (VPN, RDP, cloud consoles), SaaS apps, and API service accounts where possible. Conditional access policies in Microsoft Entra ID go even further — requiring step-up authentication based on risk signals like unfamiliar location or device compliance status.


Section III: Infrastructure and data security

7. Practice shift-left security (DevSecOps)

Move security testing earlier in the dev lifecycle to catch misconfigurations and vulnerabilities before they hit production. Run static analysis during code commits, scan container images for CVEs before deployment, and integrate security gates into your CI/CD pipeline. Less firefighting, more building.


8. Implement zero trust network access (ZTNA)

Zero Trust means no implicit trust — even inside your network. Replace broad VPN access with granular, identity-aware controls so users reach specific resources, not the whole network. Start by auditing who has access to what, cutting standing privileges, and enforcing least-privilege policies across your cloud infrastructure.


9. Audit cloud storage permissions regularly

Exposed S3 buckets and misconfigured cloud storage cause a disproportionate share of breaches — almost always because a "public" test setting never got cleaned up. Small slip, massive consequences. Automate regular scans to flag open permissions.

Huntress Managed SIEM ingests AWS CloudTrail and S3 bucket logs, giving your SOC visibility into access events and policy changes.


10. Encrypt data in transit and at rest

Encryption doesn't keep attackers out — but it makes what they find useless. Use TLS 1.2 or 1.3 for data in transit, AES-256 for databases, storage buckets, and backups, and your cloud provider's key management service (AWS KMS, Azure Key Vault) for rotation.


11. Understand the shared responsibility model

AWS, Azure, and GCP secure the underlying infrastructure. You own everything on top: OS configs, data, access controls, and app security. "The cloud provider should have caught it" is almost never a valid defense. Know precisely where your responsibility starts and build your controls from there.


12. Limit privileged account usage

Root and global admin accounts shouldn't be used for everyday work. The blast radius of a compromised privileged account is enormous, and attackers actively hunt for them. Create dedicated accounts for privileged tasks, enforce just-in-time (JIT) elevation where needed, and log every privileged action. Huntress Managed SIEM surfaces Windows Security auditing events tied to privilege use and account management changes.


Section IV: Operational Security

13. Rotate secrets and API keys automatically

Hard-coded credentials and stale API keys keep showing up in breached repos and config files. They're low-hanging fruit — and attackers pick it constantly.

Use secrets management tools (AWS Secrets Manager, HashiCorp Vault, Azure Key Vault) to store and rotate credentials programmatically, set maximum key lifetimes, and revoke anything potentially exposed immediately.


14. Scan your infrastructure as code

Scanning Terraform, CloudFormation, or similar files before deployment catches overly permissive IAM roles, open security groups, and disabled logging before they become incidents. Integrate IaC scanning into your CI/CD pipeline so every infrastructure change gets checked automatically — it's cheap insurance against expensive mistakes.


15. Filter egress traffic

Most cloud security focuses on what's coming in. Egress filtering — controlling what goes out — is equally important and regularly overlooked.

Attackers who establish a foothold need to reach command-and-control infrastructure or exfiltrate data. Allowlist known outbound destinations and flag everything else. DNS tools like Cisco Umbrella (supported by Huntress Managed SIEM!) can catch malicious lookups before they become outbound connections.


16. Micro-segment your cloud workloads

Segmentation limits the blast radius when an attacker gets in. A compromised web server shouldn't be able to reach your database tier, and dev environments shouldn't have a path to production. Enforce this with security groups, VPCs, and network ACLs — and revisit boundaries as your architecture evolves.


17. Run regular penetration tests

Vulnerability scans tell you what's exposed. Pen tests tell you what's actually exploitable and how far an attacker could get. For cloud environments, focus on your external attack surface, east-west movement potential, and privilege escalation paths. Annual testing meets compliance checkboxes; continuous or quarterly testing is real security.


18. Automate incident response

Speed is everything once a threat is confirmed. Nobody wants to be the team getting phone calls at 3am scrambling to figure out what happened and who's responsible. Document playbooks in advance and automate initial containment: isolating a compromised endpoint, revoking a suspicious token, blocking a malicious IP.

For Huntress customers, our 24/7 SOC handles detection-to-remediation directly — clear incident reports with next-step guidance land in your portal when it matters most.


19. Test your backups — actually test them

Ransomware operators increasingly target backup infrastructure to make recovery impossible. If you've never done a full restoration test, you don't actually know your backups work. Cover the basics: automated backups, offsite or air-gapped copies, immutable storage, and scheduled restoration tests. Know your recovery time before you need it.

Section V: People and culture

20. Train your team on cloud-specific threats

Attackers' favorite entry point isn't a sophisticated zero-day. It's people.

A convincing phishing email, a reused password, a hasty click — that's often all it takes. The good news is that a prepared team is genuinely one of your best defenses.

Generic "don't click links" training doesn't cut it for cloud environments — it doesn't address OAuth consent phishing, cloud credential compromise, or shadow IT sprawl. Huntress Managed Security Awareness Training is built on real SOC threat intelligence, so the content stays current with what attackers are actually doing right now — not three years ago. When your team knows what to look for, they stop being a liability and start being part of your defense.


21. Map security controls to compliance frameworks

Security controls and compliance requirements overlap — but they're not the same thing. Mapping your controls to NIST CSF, MITRE ATT&CK, CIS Controls, SOC 2, HIPAA, or CMMC helps you spot gaps, communicate clearly with auditors, and prioritize where to invest. A managed SIEM with built-in compliance reporting handles most of the evidence collection automatically — Huntress can store logs up to seven years, so audit season doesn't have to be a fire drill.

Comparison: Cloud security monitoring approaches

Approach

Visibility

Operational Burden

Compliance Support

Best For

On-premises SIEM

High

Very High

Manual

Large enterprises with dedicated security teams

Self-managed cloud SIEM

High

High

Partial

Teams with in-house SIEM expertise

Managed cloud SIEM

High

Low

Automated

MSPs, IT teams, orgs without a dedicated SOC

EDR only

Endpoint only

Low–Medium

Limited

Environments with minimal log volume needs

No centralized logging

Minimal

None

Non-compliant

Not recommended for any production environment


Cloud security best practices: The bottom line

Cloud security is an overlapping set of controls across endpoints, identity, network, infrastructure, and data. No single tool solves all of it — but the right combination of managed EDR, SIEM, and ITDR, backed by a SOC that actually does the work, gets you close.

Security done right doesn't just reduce risk. It means you can build, hire, and grow without holding your breath every time you ship something new.

Start with visibility. Cover every endpoint and identity system. Automate what you can. And test everything.

Ready to see how Huntress fits into your cloud security strategy? Start a free trial or book a demo.

FAQs

Misconfiguration, by a wide margin. Overly permissive IAM roles, exposed storage buckets, and unmonitored access paths are what attackers walk through — and most are preventable with regular audits, IaC scanning, and a SIEM that flags configuration drift in real time.

One with purpose-built agents for each platform — not a Windows tool retrofitted for everything else. You need consistent detection, response, and SOC coverage across all three. Huntress Managed EDR is purpose-built for Windows, macOS, and Linux, all backed by the same 24/7 AI-assisted SOC.

Modern cloud SIEMs ingest structured logs (JSON, Windows XML) via agents or API, syslog via network device collectors, and SaaS/cloud events via HEC or REST API. Windows endpoints use agents, network devices use syslog, cloud platforms use API or HEC.

It varies — ask vendors directly. Key questions: Where is data stored? Is it encrypted? Can retention be configured per source? Huntress Managed SIEM stores data in AWS, encrypted in transit and at rest, with retention up to seven years.

Avoid per-gigabyte pricing — it penalizes you for logging what you actually need. Per-data-source pricing stays predictable as you grow. Pair it with smart filtering to keep volume controlled without losing coverage. Huntress uses both.

Find one that reuses your existing agent for log collection, configures integrations through a portal, and handles tuning and detection writing for you. Huntress Managed SIEM is built for exactly this — start with your own environment and a pilot group, then scale using the same repeatable pattern.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy