Posts | Projects | Cloudwatch-AI LIVE Demo | Contact

Transitioning from Traditional Cybersecurity to Cloud Security: Skills You Can't Ignore


A major challenge traditional security professionals face in cloud is the paradigm of building and maintaining everything through code. This poses a significant hurdle for many cybersecurity professionals who may not have extensive experience with coding in their day-to-day work. In the cloud, the concept of “everything as code” also necessitates the use of different tools such as git, Jenkins, Jira, and others. As well discussing concepts such as DevOps, DevSecOps and CI/CD.

This article is based on the author’s personal experience transitioning from traditional security to cloud security. Its aim is to provide a suggested roadmap for acquiring the necessary skills to excel in cloud security. While some of these skills may not initially appear directly related to security, it is crucial to remember that we cannot secure what we don’t understand. The depth to which one should explore each topic is an individual decision, typically based on the available time. It is recommended to cover the basics of all these topics and then dig deeper into each one as time permits.

At a high level, securing public clouds is not fundamentally different from securing traditional networks. The same principles still apply. However, there are significant technical differences that need to be considered. One of the key distinctions is the required skills set for effectively securing public clouds like AWS, Azure, and GCP.


Our first skill is Linux. Linux knowledge serves as the fundamental cornerstone across various computer science disciplines. It holds significant importance in traditional security and becomes indispensable in the realm of cloud security.

It is enough to say that every tool mentioned in this article operates on Linux. While some of these tools may have Windows support, it often proves more sensible to run them on Linux. Additionally, Linux being the predominant operating system for running these tools, a solid understanding of Linux facilitates easier comprehension of troubleshooting steps and tutorials shared by others. This aspect is not be underestimated.

When it comes to learning Linux, there are endless resources, ranging from YouTube videos to concise online tutorials. Udemy offers numerous excellent classes, and considering a certification like CompTIA Linux+ might not be a bad idea to enhance one’s proficiency in Linux.


The next logical progression involves selecting one or more cloud providers and delving into understanding their workings. Each provider offers a range of training and certification paths that align with their offerings. It is recommended to start with pursuing these certifications. Also, unless you are in a management or sales role, it is advisable to skip the AWS Certified Cloud Practitioner and instead begin with the AWS Certified Solutions Architect - Associate. The former certification is too basic for our purposes.

While studying cloud technologies, it is essential to cover the core services provided by the chosen provider(s). Additionally, it is crucial to gain proficiency in utilizing command-line interfaces such as awscli and az. It is also important to start learning how to deploy using infrastructure as code, for instance, through tools like CloudFormation. We should not be deploying things manually in the cloud.

Source Code Management (SCM)

Now that we’ve started working with code, it’s important to learn about Source Code Management (SCM) or Version Control. SCM is a system that keeps track of changes to files, especially source code. It allows collaboration among multiple people, maintains a history of modifications, and makes merging changes easier. git is a popular version control system widely used in software development.

As cloud security professionals, we’ll need to deploy certain infrastructure components as code, which means we also need to learn Git. Even if deployment isn’t our primary responsibility, understanding how cloud engineers manage code is crucial for providing security recommendations.

An additional reason for learning about SCMs, is the fact that SCMs bring about security risks. One notable concern is the potential for secrets, such as keys or passwords, to be inadvertently pushed by engineers and stored within the SCM. This makes SCM systems an attractive target for attackers, and makes it our job to protect SCMs.

Learning Git can be challenging for many security professionals. However, once you grasp the basics, create a GitHub repository or two, and start working with it, using Git will become second nature.

To get started, you can refer to these resources:

Infrastructure as code

Having acquired essential foundational tools, we can now dig deeper into Infrastructure as Code (IaC). For AWS, learning CloudFormation is crucial. However, it is equally valuable to learn a cloud-agnostic IaC tool, considering the likelihood of working with multiple cloud platforms as security professionals. Learning a tool like Terraform is highly recommended.

To effectively learn Terraform, it is best to engage in a project that allows hands-on experience. If you don’t have a specific project in mind, create one as a learning exercise.

The Terraform website itself is the ideal starting point for your Terraform journey. It offers comprehensive resources and guidance to facilitate your understanding of the tool and its usage.

DevOps Concepts (CI/CD)

DevOps is a broad topic encompassing various practices and tools. To gain an introduction, I recommend watching this video, which provides a useful overview.

Continuous Integration and Continuous Delivery/Deployment or CI/CD is a crucial aspect of DevOps. It involves continuously adding code and automatically delivering or deploying it to production. This approach enables fast and efficient deployments.

Initially, when starting with Infrastructure as Code (IaC), we often deploy directly from our computers by running commands such as terraform plan and terraform apply. However, in production environments, deployment pipelines are typically utilized. Tools like Jenkins, AWS CodePipeline, Azure DevOps, and Github Actions act as orchestrators, creating deployment pipelines to move code from repositories to production. This is where our Linux knowledge will come in very handy.

When organizations embrace DevOps practices, they usually rely on a suite of tools, including orchestrators and others. As security professionals, it is important for us to learn these tools for several reasons. Firstly, we can utilize the same tools to deploy our own infrastructure. Secondly, we need to understand the risks associated with these tools and how to secure them. Lastly, we can leverage these tools to enforce secure deployments, ensuring that security measures are embedded throughout the deployment process.


After gaining proficiency in Linux, the next logical step is to get into scripting. Scripting skills are essential for working with orchestrators and building deployment pipelines. They also prove invaluable when utilizing command-line tools like az and awscli.

There are multiple scripting languages to choose from, but two prominent ones are Bash and Python. Bash is particularly useful for smaller scripts that involve repeating a specific set of Bash commands. On the other hand, Python shines when it comes to more complex scripts. Moreover, Python is widely used in the security domain, with many security tools being written in Python.

Python offers additional benefits, such as easy integration with cloud services. It can be leveraged to write Lambda functions, and its Boto3 library provides convenient means of interacting with AWS services. This means that we can automate security remediation and responses. If you aspire to deepen your programming skills, Python is often regarded as an easier language to learn and work with.

Configuration Management

The Configuration Management aspect is sometimes overlooked by security professionals, yet it holds significant importance. In a DevOps-driven environment, configuration is treated as code, encompassing all aspects of our infrastructure. While tools like Terraform or CloudFormation are commonly used to build the underlying infrastructure, including VPCs, NAT Gateways, S3 buckets, EC2 Instances and other cloud resources, configuring specific elements within instances require the assistance of a configuration management tool like Ansible, Chef, or Puppet.

There are multiple reasons why it is beneficial to gain proficiency in these tools. Firstly, they prove invaluable for managing our own infrastructure, creating labs, and similar tasks. Additionally, configuration management tools may themselves possess vulnerabilities, which can introduce security risks. Therefore, understanding these tools allows us to address potential vulnerabilities and mitigate associated risks effectively.

Containers and Container Orchestration

Containerization is a significant topic that addresses the challenges of software dependencies. Containers allow us to package software along with all required libraries, ensuring consistent performance across different environments. They rely on Linux Kernel features like Control Groups and namespaces. To understand containerization better, I recommend watching this informative video.

Among container technologies, Docker stands out as one of the most popular. I highly recommend learning how to build Docker images, push them to repositories, and work with containers. This video can be a good intro to docker.

Once you become familiar with containers, it’s essential to explore container orchestration technologies. Kubernetes is an open-source platform that automates the deployment, scaling, and management of containerized applications. It provides a flexible and scalable infrastructure for running distributed systems. With Kubernetes, you can easily manage and orchestrate containers, scale applications based on demand, and ensure high availability.

As containerization becomes increasingly crucial for our infrastructures, specially with the adoption of Microservices architectures, it becomes paramount to understand how it works and how to secure it.

Final thoughts

Although it may seem like a lengthy list of topics to learn, these technologies and tools are essential foundations for understanding and securing the cloud. As we embark on this exploration journey, we bring along our past traditional security experience and adapt it to the cloud and DevOps ecosystem.

By learning about each of these areas, we simultaneously explore their security aspects. It’s important to approach this learning process as an integrated effort, blending our existing knowledge with the new skills we acquire. This iterative approach allows us to navigate the cloud and DevOps landscape while continuously adapting and refining our security practices.

By: Ahmed Abugharbia - Assisted by AI
Date: 05-26-2023