← Back to Blog

Cloud Security and Compliance During Enterprise Migration

Enterprise cloud migrations create temporary security complexity as workloads exist simultaneously in both on-premises and cloud environments. Here is how to maintain your security posture and compliance obligations throughout the migration process.

By Nina Kowalski, Security Architecture Lead
Cloud security and compliance during enterprise migration

Security incidents during cloud migration are more common than publicly reported. The combination of a complex technical transition, time pressure, expanded attack surface, and temporarily relaxed change management controls creates a window of elevated risk that sophisticated attackers actively exploit. Ransomware groups specifically target organizations in the middle of infrastructure transitions because they know that the usual security controls may be less effective when systems are in flux.

This is not a reason to delay cloud migration — the security posture of a well-designed cloud environment ultimately exceeds what most enterprises can achieve on-premises. It is, however, a reason to treat security and compliance as a first-class concern throughout the migration program rather than something addressed in a post-migration security review. The practices described in this article will help you maintain your security posture during the transition and emerge from the migration with a cloud security architecture that is genuinely stronger than what you had before.

Security Architecture Begins in the Landing Zone

The foundation of enterprise cloud security is the landing zone — the account structure, network architecture, identity configuration, and security controls that host your migrated workloads. Getting the landing zone right before you move the first workload is exponentially easier than retrofitting security controls into an established cloud environment that was built without them.

Every enterprise cloud landing zone should include centralized security monitoring from day one. AWS Security Hub and Azure Security Center aggregate findings from across your cloud environment — GuardDuty threat detection, Config compliance findings, access advisor insights, vulnerability scanning results — into a unified view that your security operations center can monitor. Configure findings to route to your existing SIEM if you have one, ensuring cloud security events are visible alongside your on-premises security monitoring.

Enable CloudTrail (AWS) or Azure Activity Log on all accounts from the moment the landing zone is provisioned. Every API call made in your cloud environment is logged — who made it, from where, when, and what the call was. These logs are your forensic record for security incident investigation and your audit trail for compliance evidence. Store them in a dedicated logging account with read-only access from other accounts, ensuring that a compromise of a workload account cannot be used to delete the evidence of the compromise.

Identity Security: The Highest-Priority Control

Cloud security starts and ends with identity. An attacker with valid credentials and appropriate IAM permissions can do more damage to a cloud environment than any network-based attacker, because valid credentials bypass most perimeter and network controls. Protecting cloud identities — and designing IAM policies that limit the blast radius when credentials are compromised — is the highest-priority security control in any cloud environment.

Enforce multi-factor authentication (MFA) for all human users with access to cloud management consoles and APIs. This is non-negotiable. Console access without MFA is an unacceptable risk — a phished or credential-stuffed user can be limited to read-only damage with MFA, but without MFA the entire account is potentially accessible. Use AWS IAM Identity Center (formerly SSO) or Azure AD Privileged Identity Management (PIM) to provide time-bound, just-in-time access to elevated permissions rather than assigning powerful standing permissions that are available continuously whether or not they are actively needed.

Apply the principle of least privilege aggressively. IAM policies in cloud environments often start too permissive and gradually accumulate permissions as applications request them. This permission accumulation — sometimes called "permission debt" — means that the blast radius of a credential compromise grows over time. Conduct regular IAM access reviews using AWS IAM Access Analyzer or Azure AD Access Reviews to identify and remove permissions that are not actively used. AWS IAM Access Analyzer can identify permissions that have not been exercised in the past 90 days — these unused permissions are candidates for removal without impacting operations.

Network Security Architecture During Migration

During migration, your network must support coexistence between on-premises and cloud environments. This expanded network topology creates new attack paths that need to be protected. Think carefully about what can communicate with what through your hybrid connectivity layer, and enforce those boundaries explicitly through firewall rules and security group policies rather than relying on network topology alone to provide separation.

Implement network segmentation in your cloud VPCs from the start. Separate workloads by sensitivity and function into distinct subnets with explicit routing and security group rules controlling traffic between them. Production workloads should be isolated from development workloads. Systems that handle regulated data (PCI, PHI, PII) should be in isolated network segments with additional controls. Application-tier resources should not have direct connectivity to database-tier resources from the public internet — all external traffic should traverse an application load balancer or API gateway that can inspect and filter requests.

Treat your Direct Connect or ExpressRoute connection as a trusted private network, but not an implicitly authorized one. Enforce security group and network ACL controls on traffic originating from your on-premises environment just as you would for internet-sourced traffic. Insider threats and compromised on-premises systems are real risks; the hybrid connectivity layer should not bypass the security controls you have built for your cloud environment.

Data Protection and Encryption

Data classification is the prerequisite for data protection during migration. Before migrating any data to the cloud, understand what data you are moving, what sensitivity classification it carries, and what regulatory frameworks apply to it. Data that is subject to HIPAA, PCI DSS, GDPR, or other regulatory regimes requires specific controls and documentation that must be in place before the data moves, not added afterward.

Encrypt all data at rest and in transit. AWS and Azure both provide encryption as a default for most managed services when properly configured; audit your configurations to confirm encryption is active. Use customer-managed keys (CMK) in AWS KMS or Azure Key Vault for data that requires key management control beyond the default shared-key encryption offered by cloud providers. Customer-managed keys ensure that you retain control of the encryption key and can revoke access to encrypted data without the cloud provider's involvement.

Data in transit between on-premises and cloud environments should be encrypted over TLS 1.2 or higher. Direct Connect and ExpressRoute encrypt the management plane but do not automatically encrypt the data plane; add TLS termination at the application layer for all application traffic traversing the hybrid connectivity link. Inventory all application integrations that cross the on-premises/cloud boundary and confirm each one uses encrypted transport.

Compliance Validation During and After Migration

Regulatory compliance is not a state that organizations enter once and maintain effortlessly — it is an ongoing demonstration that controls are functioning as designed. Cloud migration changes the evidence you need to collect, the controls you need to demonstrate, and in some cases the compliance boundaries you need to define. Plan compliance validation as an explicit activity in your migration program, not as a post-migration audit scramble.

The shared responsibility model defines the security boundary between cloud providers and customers. AWS and Azure are responsible for the security of the underlying cloud infrastructure; you are responsible for the security of what you deploy on that infrastructure. Your compliance documentation needs to reflect this boundary, providing evidence of your controls for the customer-responsibility portion and pointing to cloud provider compliance documentation (ISO 27001, SOC 2 Type II, PCI DSS AOCs) for the provider-responsibility portion.

AWS Config and Azure Policy continuously evaluate your cloud resources against defined compliance rules and generate findings when resources are non-compliant. Map the compliance requirements of your relevant regulatory frameworks to Config rules and Policy definitions, and configure remediation actions that automatically fix simple configuration drift. Non-compliant resources that cannot be automatically remediated should generate alerts that are investigated and resolved before the next compliance audit cycle.

Incident Response in the Cloud

Your incident response plan must be updated for cloud before you move production workloads. Cloud-specific incident response differs from on-premises incident response in important ways: evidence collection is different (API logs, instance snapshots, VPC flow logs), containment actions are different (security group rules, IAM policy changes, instance isolation), and the tools available for forensic analysis are different.

Document cloud-specific incident response runbooks for your most likely incident scenarios: credential compromise, data exfiltration detection, ransomware activation, unauthorized resource provisioning. Test these runbooks through tabletop exercises and, where practical, simulated incidents before they are needed for real. The worst time to learn your cloud incident response capabilities is during an actual incident.

Key Takeaways

Conclusion

Cloud migration is an opportunity to improve your security posture, not just replicate your on-premises environment in a different location. The cloud provides security capabilities — continuous compliance monitoring, automated remediation, threat detection with machine learning, immutable audit logs, fine-grained identity controls — that are technically and economically out of reach for most on-premises environments. Realizing these security benefits requires deliberate architectural choices and disciplined implementation, but the outcome justifies the investment.

Organizations that treat security as an integral part of the migration program — not a separate workstream to be addressed after the technical migration is complete — emerge from the process with a substantially stronger security posture than they had before. If you are planning an enterprise migration and want to review your security architecture, we welcome the opportunity to provide a structured security assessment.