Foundations

Cloud Security
Architecture.

Two decades of senior cloud security architecture across AWS, Azure, and Microsoft 365 — landing zone design, identity and zero-trust, data protection, security engineering, and the translation of regulatory frameworks into cloud controls.

The foundation that AI security is built on.

Most cloud security work today is control theatre — turning on every native control the hyperscaler ships and calling it an architecture. It is not.

A real cloud security architecture is a system of deliberate decisions: where the perimeter is, how identity flows, what data crosses what boundary, which controls are detective and which are preventative, and how the whole thing produces evidence an auditor can read without translation.

Secucloud's cloud security practice exists for organisations that have outgrown the "turn on the defaults" phase of cloud adoption and now need senior architectural judgement to design, review, or recover from what came before.

We work primarily with regulated industries — financial services, healthcare, public sector — where cloud security maturity is no longer optional, and where the consequences of getting it wrong are measured in regulatory action, not just downtime.

A complete operating model
for cloud security.

01
Architect

Landing Zones & Perimeter

The decisions that everything else inherits — account structure, network topology, segmentation, boundary controls, and the principles that govern how new workloads enter the estate.

  • Multi-account / subscription / tenant design
  • Hub-and-spoke and transit network architecture
  • Workload segmentation & blast radius design
  • Internet egress, perimeter, & DMZ patterns
  • Cloud-native firewall & WAF strategy
02
Identify

Identity & Zero Trust

Identity is the new perimeter — and the most common point of compromise in modern cloud breaches. Zero-trust design, conditional access, privileged identity, and the federation patterns that hold it all together.

  • Identity provider strategy & federation
  • Conditional access & risk-based authentication
  • Privileged Identity Management (PIM / PAM)
  • Workload & service identity design
  • Identity governance & lifecycle automation
03
Connect

Network Security

Inside the cloud, network controls remain a critical layer of defence — particularly for east-west traffic between workloads, and for the egress patterns that govern what data can leave.

  • Private connectivity & service endpoints
  • Microsegmentation & NSG / SG strategy
  • DDoS protection design
  • Egress filtering & data exfiltration prevention
  • VPN, ExpressRoute, & Direct Connect security
04
Protect

Data Protection & Sovereignty

Where the sensitive data lives, who can see it, how it's encrypted, where the keys are held, and which jurisdictions it crosses. The data layer is where most cloud security decisions actually matter.

  • Data classification & sensitivity labelling
  • Encryption strategy & key management (CMK / BYOK / HYOK)
  • DLP & sensitive data discovery
  • Data residency & sovereignty design
  • Privileged data access controls
05
Engineer

Security Engineering

Translating security architecture into things that actually run — detection engineering, infrastructure as code, policy as code, and the automation that turns control libraries into living systems.

  • Detection engineering & SIEM content
  • Infrastructure as code (Terraform, Bicep, CloudFormation)
  • Policy as code (OPA, Sentinel, Azure Policy)
  • CSPM & CNAPP strategy
  • Secure-by-default platform engineering
06
Assure

Compliance Architecture

Translating regulatory frameworks into cloud controls that auditors can verify and engineering teams can implement. The unglamorous discipline that turns "compliance theatre" into "evidence on demand".

  • ISO 27001 & SOC 2 cloud control mapping
  • NIS2 & DORA technical control implementation
  • Sector-specific regulation (FCA, PRA, ICO)
  • Continuous compliance & control evidence
  • Audit preparation & gap remediation

Across the three hyperscalers
that matter.

AWS
Amazon Web Services

Multi-account architecture, AWS Organizations, IAM Identity Center, Control Tower landing zones, GuardDuty / Security Hub strategy, and the engineering patterns that make AWS auditable at scale.

  • · Control Tower & Organizations
  • · IAM & Identity Center
  • · Security Hub · GuardDuty
  • · KMS · Secrets Manager
  • · Macie · Detective
Azure
Microsoft Azure

Cloud Adoption Framework landing zones, management group hierarchies, Entra ID architecture, Defender for Cloud, Sentinel, and the deep integration with the Microsoft 365 estate that most enterprises actually run.

  • · CAF Landing Zones
  • · Entra ID · Conditional Access
  • · Defender for Cloud
  • · Sentinel · Lighthouse
  • · Key Vault · Purview
M365
Microsoft 365

Microsoft 365 is the largest SaaS platform most enterprises run — and one of the most under-secured. Tenant security, conditional access, Defender XDR, Purview compliance, and Copilot data boundary architecture.

  • · Tenant security baseline
  • · Defender for Office 365 · XDR
  • · Purview · Information Protection
  • · Intune · Endpoint security
  • · Copilot data boundary design

Four ways to bring
the foundation to bear.

Where AI Security Meets Cloud

AI security is not a separate discipline. It is cloud security at altitude — every AI workload runs on a cloud foundation, and the foundation has to be sound before the AI on top of it can be defensible.

For organisations adopting AI, the cloud security questions arrive first. Where does the model live? What identity calls it? What network can reach it? What data crosses its boundary? These are cloud security questions before they become AI security questions.

Secucloud's AI security practice exists because our cloud security practice exists — and the two work together inside a single engagement when needed. A Cloud Security Architecture Review surfaces the foundation gaps that a Secure AI Architecture Review then builds upon.

Explore AI Security engagements →

Start a Conversation

Need senior judgement on
your cloud foundation?

A 30-minute scoping call. No pitch, no proposal until both sides agree the engagement is right. The fastest way to know whether Secucloud is the right fit is to talk.