Back to Blog
cloud security risk assessment vendor evaluation security architecture compliance

Assessing Cloud Security Risks: A Framework for Businesses to Evaluate Cloud Service Providers

Vincent E Martinez, MA 8 min read Category: Security

Moving a workload to the cloud does not eliminate risk. It just gives the risk a nicer dashboard.

Your provider becomes part of your supply chain, which means its security posture becomes part of yours. A decision made during procurement can shape what your engineers can do for years. For a small business without a dedicated security team, vendor evaluation is one of the highest-leverage decisions you can make. Done well, it removes whole categories of risk. Done badly, it adds them in ways you may not notice until a very inconvenient Tuesday.

This article gives you a practical framework for that evaluation. It draws from the Cloud Security Alliance’s Cloud Controls Matrix and NIST Special Publication 800-144, then condenses both into the questions we actually ask when auditing a provider for a client.

Start With the Shared Responsibility Model

Every major cloud provider operates under some version of the shared responsibility model. That includes AWS, Microsoft Azure, Google Cloud, and most SaaS vendors. The provider is responsible for security of the cloud. You are responsible for security in the cloud.

That distinction sounds subtle right up until someone asks who left the storage bucket open.

Where the line sits depends on the service type.

  • For infrastructure-as-a-service, the customer’s responsibility extends from the operating system upward. That includes patching, access control, encryption for application data at rest, and all application-layer concerns. This covers services such as raw virtual machines, object storage, and networking.
  • For platform-as-a-service, the provider handles more of the stack, but the customer still controls data, identity, and configuration. This includes services such as managed databases and serverless functions.
  • For software-as-a-service, the provider handles almost everything. The customer still owns identity, data classification, and access decisions. This includes products such as CRMs, helpdesks, and analytics tools.

The first question to ask any provider is not “how secure are you?” It is “where does your responsibility end and mine begin?”

If a provider cannot produce a clear, current shared responsibility matrix, do not rely on it for anything sensitive. If they cannot explain the rules of the game, they are not ready to host your data.

The Seven Evaluation Dimensions

We assess cloud providers along seven dimensions. The weighting depends on your business. A healthcare company will care more about data residency and regulatory compliance than a B2B analytics startup. But every dimension matters, even if your team would prefer to skip ahead to the pricing page.

1. Compliance and Certifications

Compliance certifications show that an external auditor reviewed the provider against a recognised standard. For most small-business evaluations, the baseline is SOC 2 Type II. It shows that controls operated over a defined period, usually twelve months. ISO/IEC 27001 is the closest international equivalent and is often expected in global operations. HIPAA, PCI-DSS, and FedRAMP matter in more specific regulated contexts.

Ask for the actual report, not the glossy marketing summary with reassuring stock photography. A legitimate SOC 2 Type II report is usually shared under an NDA. If a provider cannot produce one, or refuses to share it, that should rule it out for anything beyond low-sensitivity work.

Also, read the exceptions section. Every report has one. And it often contains the part everyone tried hardest not to put in the sales deck.

2. Data Protection and Encryption

Data needs protection:

  • At rest
  • In transit
  • Ideally, in use too

Most modern providers offer encryption at rest by default, but the real question is who controls the keys. With customer-managed encryption keys, you can revoke access by deleting the key. With provider-managed keys, you rely on the provider’s controls to gate decryption. That may be fine. It may also be a trust exercise you did not mean to sign up for.

In transit, TLS 1.2 or higher should be the only option, along with modern cipher suites. Ask how the provider protects traffic between internal services too. Same-region, inter-region, and cross-provider paths all create different risks. Data does not magically become safe just because it is travelling inside a provider’s logo.

3. Identity and Access Management

Strong identity is the foundation of cloud security. Check whether the provider:

  • Integrates with your identity provider through SAML or OIDC
  • Supports multi-factor authentication for every access path
  • Offers fine-grained role-based access control
  • Logs every administrative action, including API access

Avoid providers whose only authentication option is a shared username and password. Small teams already get enough pressure to share credentials “just for now.” A provider that does not support individual identities makes it much harder to revoke one person’s access when they leave. Or when they leave in a way that inspires urgency.

4. Data Residency and Sovereignty

Where is your data physically stored, and where can it be copied? This matters for two reasons:

  • Legal requirements
  • Operational realities

On the legal side, think GDPR and national data protection laws. On the operational side, think latency and resilience to regional outages. Some providers offer region pinning. Others replicate data across regions in ways that are not always obvious in the dashboard, which is exciting only if you enjoy unpleasant surprises.

If your business handles EU personal data, non-EU storage is a GDPR question that needs a defensible answer. If you handle Australian health records, the Australian Privacy Principles impose constraints. Ask explicitly, get the answer in writing, and verify it against the provider’s documented data flow.

5. Incident Response and Breach Notification

No provider is immune to incidents. The real question is how it handles them when things go wrong. Evaluate:

  • Notification timelines
  • The quality of post-incident reports
  • The provider’s history of incidents affecting other customers

Think in hours, not days.

GDPR requires controllers to notify supervisory authorities within 72 hours of becoming aware of a breach. If your provider’s contract allows them 30 days to notify you, your compliance posture is already in trouble before the first incident even happens. That is not a runbook. That is a delayed apology.

6. Business Continuity and Availability

Availability SLAs can sound impressive, but the fine print does a lot of work. A promise of 99.9 percent, 99.95 percent, or 99.99 percent means very little if the contract does not cover the services you actually use.

Ask:

  • Does the SLA cover all relevant services or only a subset?
  • What happens when the provider misses it?
  • Do you get a small service credit or something that resembles meaningful accountability?
  • Does the provider publish post-mortems for regional outages?

Beyond the SLA, ask about backup and recovery. Can you export your data at any time, in a standard format, and at a reasonable speed? Proprietary data formats create business continuity risk, not just engineering inconvenience. Vendor lock-in is much less charming when you are trying to leave quickly.

7. Sub-Processor Transparency

Your provider almost certainly uses other providers. A CRM might rely on:

  • A hosting provider
  • An email delivery service
  • An analytics vendor
  • A payment processor

Each one becomes a fourth party from your perspective. That means you inherit risk without getting direct visibility, which is not ideal.

GDPR requires data processors to disclose sub-processors, and most modern vendors publish a sub-processor list. Read it. Every name on the list represents another trust relationship your data is quietly participating in.

Red Flags That End the Evaluation

Some signals should end the evaluation immediately:

  • Refusal to share a current SOC 2 or ISO 27001 report
  • Lack of multi-factor authentication support
  • No published incident history or post-mortems
  • Shared tenancy without clear data-isolation guarantees
  • Contract terms that disclaim liability for data breaches entirely

Any one of these suggests a provider that has not made the investments required to operate a trustworthy service. For a small business, the cost of choosing that provider often stays invisible right up until it becomes unforgettable.

Building the Evaluation Into Procurement

The best way to apply this framework is to build it into procurement instead of running it ad hoc. A one-page questionnaire covering the seven dimensions can turn this from a special security project into a standard purchasing check.

In practice:

  • Send it to every vendor you consider
  • Store the answers in the vendor record
  • Review them annually

A vendor’s security posture changes over time, and a provider that looked solid two years ago may not look so solid now.

NIST SP 800-161 offers a more formal treatment of supply-chain risk management and is worth reading if your business has regulatory exposure. For most small businesses, consistent use of the framework above is enough to move from ad hoc trust to a defensible, repeatable process. That repeatability turns vendor evaluation from a bottleneck into a quality filter, which is much nicer than turning it into a recurring panic.

Further Reading

Ready to apply this to your project?

Let's talk about your specific challenges.

Start the conversation →