A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for 7 Best Practices for Your Organization’s Public Cloud Services Security
Cybersecurity 101/Cloud Security/Public cloud security best practices

7 Best Practices for Your Organization’s Public Cloud Services Security

Learn why public cloud security matters and the best practices you can implement to improve it. We will go over which ones work and yield good results in this guide.

CS-101_Cloud.svg
Table of Contents

Related Articles

  • Infrastructure as a Service: Benefit, Challenges & Use Cases
  • What is Cloud Forensics?
  • Cloud Security Strategy: Key Pillars for Protecting Data and Workloads in the Cloud
  • Cloud Threat Detection & Defense: Advanced Methods 2025
Author: SentinelOne
Updated: September 2, 2025

Public cloud security practices can steer your organization in the right direction when it comes to mitigating threats and ensuring regulatory compliance. Although these measures might not stop every attack, they can greatly minimize the risk of future cases. You can improve your public cloud security posture by incorporating the best practices. In this guide, we will cover critical ones and even include measures that enhance the offerings of public cloud services.

7 Best Practices for Your Organization’s Public Cloud Services Security

Migrating or building your business in the public cloud allows you to scale and grow globally. But without robust public cloud security, you could leave your organization vulnerable to attack.   Essential security considerations must be addressed by every business working in the public cloud. These seven public cloud security best practices will help to protect your assets, your employees, and your customers from breaches and attacks.

  1. Identity and Access Management (IAM)

Implement strong user authentication methods such as multi-factor authentication (MFA) and biometric checks. Users should be given only the permissions they need and access controls should be regularly checked and updated.

You can also:

  • Establish layered authentication by combining MFA (e.g., TOTP-based or biometrics) with single sign-on (SSO) to secure all identity touchpoints.
  • Minimize privilege exposure by creating least-privilege roles, granting temporary elevation for specific tasks, and enforcing session recording and keystroke monitoring on high-risk accounts.
  • Enforce complex password requirements (length, character diversity) and expiration cycles. Incorporate password-less solutions to reduce phishing risk and improve user compliance.
  • Limit root access to break-glass use only, enabling strong auditing on each session. Integrate hardware security modules (HSMs) for additional protection and establish root key rotation policies.
  • Integrate CIAM within enterprise IAM frameworks to centralize customer and employee identity protection.
  • Deploy Identity Threat Detection and Response (ITDR) to monitor identity-based threats in real-time.
  1. Data Encryption

Encrypt sensitive data at rest and in transit. This ensures that the data remains unreadable even if unauthorized access occurs without the proper decryption keys.

Here’s what to do at every stage of data migration:

  • Pre-migration encryption and data classification: Assess the sensitivity of data to determine the necessary encryption standards (e.g., AES-256 for high-sensitivity data). Using client-side encryption tools pre-migration adds a zero-trust layer, ensuring data remains encrypted even before entering the cloud.
  • Cloud-native encryption for data at rest and in transit: Cloud providers’ built-in encryption (AWS KMS, GCP Cloud Key Management) often employs AES-GCM for high efficiency. For data in transit, apply TLS 1.3 or higher, and enforce forward secrecy, protecting session keys from future decryption if private keys are compromised.
  • Post-migration controls and key management: Implement key rotation policies with automated tools to limit the lifespan of keys. Enforce separation of duties (SoD) in key management to ensure that no single user has complete access to both encryption and decryption keys.
  1. Secure Configurations

Misconfigurations are a common security risk in cloud environments, often stemming from default settings that don’t align with an organization’s security requirements. To mitigate these risks, it’s crucial to assess and adjust default configurations thoroughly.   This includes:

  • Disabling unnecessary services
  • Closing unused network ports
  • Implementing strict access control measures

Regularly audit configurations to ensure that they meet evolving security needs and prevent vulnerabilities from arising.

  1. Firewalls and Network Security

Firewalls serve as protective barriers between public cloud resources and external networks, monitoring and filtering network traffic based on predefined security rules. Firewalls provide a first line of defense from external threats and must be set up correctly to effectively monitor and control network traffic. To further protect against web-based threats, public clouds may employ web application firewalls (WAFs) and advanced next-generation firewalls (NGFWs). Virtual Private Clouds (VPCs) can also be implemented to further isolate and control cloud resources.

  1. Monitoring and Logging

Use monitoring tools such as AWS CloudTrail, Azure Monitor, or Google Cloud’s Operations Suite to receive immediate alerts about potential threats. Maintaining detailed logs is equally important, as they provide a record of events that can be used for in-depth analysis and troubleshooting, helping to identify the root cause of incidents and improve security measures over time. A properly configured firewall, as outlined above, can be an important tool for monitoring and logging.

  1. Vulnerability Management

Effective vulnerability management is essential for maintaining cloud security. Regular vulnerability assessments should be conducted to identify weak points in cloud infrastructure, applications, and configurations. These assessments involve:

  • Scanning for known vulnerabilities
  • Misconfigurations or outdated software that could be exploited
  • Once vulnerabilities are identified, patches and fixes are promptly applied to reduce exposure to threats.

Staying informed about emerging threats and zero-day vulnerabilities is paramount for proactive defense. Utilize automated vulnerability management tools to continuously monitor for loopholes and streamline the remediation process, ensuring that security gaps are addressed before they can be exploited.

  1. Compliance Management

Ensuring that your cloud infrastructure adheres to regulatory requirements and industry standards is critical for avoiding legal and financial repercussions. Cloud setups must comply with key regulations and standards, including GDPR, HIPAA, PCI DSS, and ISO/IEC 27001.

Compliance involves securing data, maintaining records, ensuring audibility, and implementing governance frameworks. Since compliance in cloud environments is often a shared responsibility, it’s important to work closely with cloud providers to clarify who is responsible for specific compliance tasks

Tools like AWS Artifact, Azure Compliance Manager, and Google Cloud’s Compliance Reports can help manage compliance obligations by offering insights, audits, and documentation related to regulatory requirements.

Implement Public Cloud Security Best Practices With Sentinel One

Don’t take chances or piecemeal your public cloud services security. The Singularity™ Cloud Security suite includes the Cloud Native Application Protection Platform (CNAPP), the Cloud Workload Protection Platform (CWPP), and much more. Protect your assets and your clients with the best public cloud security available. Sentinel One lets you effectively manage your public cloud security through a suite of products that work seamlessly together to keep your organization steps ahead of attackers.

Conclusion

Don’t neglect your public cloud security. Your users are responsible for uploading their data and sharing but you are responsible for implementing the latest technologies. These practices safeguard unforeseen circumstances and can help secure the whole infrastructure. Foster a culture of accountability and transparency by using these best public cloud security practices today.

Discover More About Cloud Security

What is Cloud Security?Cloud Security

What is Cloud Security?

Cloud security continuously monitors and protects your cloud services and assets. It identifies vulnerabilities, enforces controls, and defends proactively. Learn more.

Read More
What is the Cloud Shared Responsibility Model?Cloud Security

What is the Cloud Shared Responsibility Model?

The cloud shared responsibility model defines security roles. Explore how understanding this model can enhance your cloud security strategy.

Read More
What is Kubernetes?Cloud Security

What is Kubernetes?

Kubernetes is a powerful orchestration tool for containers. Explore how to secure your Kubernetes environments against potential threats.

Read More
What is GKE (Google Kubernetes Engine)?Cloud Security

What is GKE (Google Kubernetes Engine)?

Google Kubernetes Engine (GKE) simplifies Kubernetes management. Learn best practices for securing applications deployed on GKE.

Read More
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use