Cloud Security

Cybersecurity Attacks and Defenses in a Cloudy World

Member-only story

AWS, Azure, and GCP Service Comparison*

3 min readApr 15, 2025

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Part of my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Azure Security | Multicloud Security | Data Breaches

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Finally have a minute to put some additional class materials online. One of the things I used to do when I taught my multi-cloud classes was try to list a lot of the security services from each cloud vendor in a chart so students could tell which service names across the vendors relate to each other.

This list is a bit out of date but still may have some use. Some of the things that I know have changed and may not be in the list:

  • AWS has multiple types of policies now for different use cases: resource cross-account sharing policies (RAM) — which I really hope expands quickly because I find it very useful, declarative policies for resource configurations, service control policies, and so on.
  • Microsoft keeps renaming things every five…

--

--

Cloud Security
Cloud Security

Published in Cloud Security

Cybersecurity Attacks and Defenses in a Cloudy World

Teri Radichel
Teri Radichel

Written by Teri Radichel

CEO 2nd Sight Lab | Pentesting | Research | AWS Security Hero | Masters of Infosec & Masters Software Engineering | GSE | IANS | SANS Difference Makers Award