What We Do
How We Do
Get Started

How to Secure Your Multi-Cloud Environment

BY eSentire

October 7, 2021 | 5 MINS READ

Cloud Protection

Managed Detection and Response

Want to learn more on how to achieve Cyber Resilience?


Over the past few years, we have seen a significant movement towards the adoption of cloud computing and cloud security. In addition to storing critical data assets solely in physical data centers (“on-prem environment”), organizations are utilizing the cloud to store and maintain these critical data assets, largely due to its cost-effectiveness, instant scalability, and reliability.

In fact, while some organizations maintain a strictly cloud environment, many others have chosen to utilize cloud and on-prem environments (“hybrid environment”) to run their applications seamlessly.

However, we have also seen the adoption of multi-cloud, especially given the monumental rise of cloud providers like Microsoft Azure, Google Cloud, and Amazon Web Services (AWS). The 2021 State of the Multicloud report highlights that 92% of organizations have adopted a multi-cloud strategy today, with 62% of organizations utilizing at least two cloud platforms.

A multi-cloud environment simply means that an organization is leveraging more than one cloud service provider (CSP), depending on which provider is the most appropriate solution for each use case. For example, your organization may choose to leverage AWS for infrastructure and Google Workspace for internal team collaboration.

Shared Responsibility Model in the Cloud

Regardless of the CSP chosen by your team, one thing is clear: when it comes to cloud security, every cloud service provider maintains a shared responsibility model. So, although the provider maintains some responsibility for securing their cloud environment, the organization also has to take responsibility over cloud security.

This means that you, as the cloud customer, will always be responsible for the data you store in the cloud and managing who has access to it. This is why cloud misconfigurations are a significant threat for cloud security. For example, if your organization uses AWS for data storage, the onus of securing that data storage and maintaining the integrity of that security will always fall on your organization, not on AWS.

Of course, the shared responsibility differs greatly between the use of IaaS, PaaS, and SaaS:

Simplifying Multi-Cloud Security with MDR for Cloud

One of the most fundamental challenges for securing data assets in the cloud is misconfigurations, which has resulted in multiple high-profile security breaches, such as with CapitalOne and Tesla. Of course, this is complicated further by the fact that each cloud service provider has their own set of best practices and toolsets for proper configuration and access management, known as the CIS benchmark. Therefore, it’s critical to have capabilities for cloud security posture management and 24/7 cloud threat detection and investigations in the cloud.

eSentire’s MDR for Cloud offering provides Cloud Security Posture Management (CSPM) as well as 24/7 Threat Detection and Investigation to ensure you have deep visibility into your cloud environment and that it’s protected from cloud-specific cyber threats.

This means your organization benefits from:

Your organization (alongside your security provider) must be aware of what resources are publicly accessible and what’s “typical behavior” for users and endpoints for those resources. Second, once those typical behaviors are established, your security provider can alert the SOC when there are deviations with any of those publicly accessible resources.

Here’s what a real-world example looks like of eSentire protecting your cloud assets:

Amazon Web Services (AWS)

Azure Sentinel & Azure Active Directory (AD)

Google Cloud Platform (GCP)

The Threat

A threat actor gains access to your AWS Elastic Compute Cloud (EC2) instance to download user data to harvest sensitive information or find additional AWS vulnerabilities.

A threat actor attempts to gain access to a user account by removing important security controls like multi-factor authentication (MFA)..

Threat actors can create cloud instances in unused geographic service regions to avoid detection since GCP users can maintain control over where the data is stored.

How eSentire Investigates and Responds

Our SOC analysts get alerted on suspicious query activity based on the proprietary detectors we have built. The SOC analysts then conduct deeper investigation to identify the source user, determine the exact instances where the downloads took place, and correlate the information with any other suspicious activity found.

A sudden change in MFA requirements is very unusual and a potential indicator of compromise. So, our 24/7 SOC Analysts are alerted via Azure Sentinel whenever MFA requirements are removed and follow a proprietary runbook to streamline the investigation process.

With the right context established and the eSentire Atlas XDR platform’s direct integration with Azure AD, our analyst can suspend the credentials of the user who removed the MFA policy, minimizing the risk of any other important security policies being tampered with

We use our proprietary GCP detector to scan for cloud activity in unused regions and alert our 24/7 SOC Analysts if any such activity is identified immediately.

If a true positive is confirmed, the user credentials are suspended and our analysts will perform additional investigations to determine whether additional malicious admin activities have happened.

Your Outcome

Once our SOC analysts conduct their investigations, you’re alerted on whether the incident is a true or false positive, full support over the incident response and resolution, and a 20-minute SLO for investigations, leading to a drastically reduced threat dwell-time.

It’s very clear that multi-cloud is the next chapter in the cloud adoption story, especially as there is no real need for businesses to rely solely on one platform anymore.

To learn more about eSentire simplifies multi-cloud security with MDR for Cloud offering, book a meeting with a security specialist now.


eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.

Read the Latest from eSentire