$30 off During Our Annual Pro Sale. View Details »

Where do we stand? Cloud Maturity Models & Secu...

Where do we stand? Cloud Maturity Models & Security Posture

This session covers what one does in the Google Cloud as Day 2 operations, how one leverages the cloud maturity and well-architected framework to their advantage and what to evolve around security in the cloud.

Avatar for Mohammed Fazalullah

Mohammed Fazalullah PRO

November 25, 2025
Tweet

More Decks by Mohammed Fazalullah

Other Decks in Technology

Transcript

  1. Proprietary + Confidential The Maturity imperative Tactical to Transformational The

    transition to cloud is a re-architecture of organizational behavior, not just IT capability. We must move from sporadic, reactive firefighting to a cohesive, strategic engine of predictive, AI-driven operations. From Responsibility to Shared Fate We are evolving beyond the traditional "Shared Responsibility Model." In a "Shared Fate" model, Google Cloud actively reduces our risk burden through opinionated blueprints, managed services, and active threat intelligence.
  2. Proprietary + Confidential Understanding Priorities Business As Usual (BAU) Primary

    Outcome Delivering current operating model at lowest cost Avoid capital costs and reduce opex on cloud managed infrastructure Increase Agility, reduce vendor lock-in and lower admin burden Leverage Cloud Native capabilities and scale to enable new revenue streams Become disruptive in chosen markets as a digital native H M M L L H H M L - Best with Google (BWG) Consolidating Optimising Modernising Exploiting Transforming Open Agile Portability Status quo CAPEX Least cost IT Savings OPEX or CAPEX Familiar (aaS) Scale Actionable insights Automation Capability Cloud native speed IT as Code Disruptiveness Business Value Thriving Surviving Change Complexity Value of investment Business Improvement Data enablement
  3. Proprietary + Confidential Industry maturity models for organizational capability Name

    Characteristics Common gaps to address Level 1 Ad-Hoc/Initial Exclusively on-premises, no cloud usage Cloud awareness, executive buy-in, strategy Level 2 Managed/Rep eatable Opportunistic cloud usage, no centralized strategy, IaaS/SaaS adoption Governance framework, security policies, standardization Level 3 Defined/Opti mized Documented practices, Cloud CoE forming, PaaS adoption Full automation, comprehensive policies, scalability Level 4 Measured/Ma naged Well-defined governance, IaC practices, advanced monitoring Full operational automation, emerging tech adoption Level 5 Optimized/Inn ovative KPIs actively tracked, continuous improvement, predictive operations Innovation platform, maintaining competitive edge
  4. Proprietary + Confidential Cloud maturity statistics in the industry Only

    8% of organizations qualify as highly cloud-mature (HashiCorp/Forrester 2024) High-maturity organizations report 86% stronger security posture vs 66% for low-maturity 64% of organizations report shortage of cloud staff expertise 64% of organizations report shortage of cloud staff expertise
  5. Proprietary + Confidential Evolution of Cloud Maturity Tactical Reactive "Shadow

    IT", lift-and-shift migrations, and manual security ("ClickOps"). The cloud is viewed merely as a data center. Strategic Standardized tooling, implementation of Landing Zones, and a "Cloud First" mandate. Governance shifts from reactive to proactive. Transformational Cloud-native adoption (Serverless, AI/ML), "Shift Left" security, automated & ephemeral infrastructure. Cloud becomes a differentiator.
  6. Proprietary + Confidential Deep Dive: People & Culture Learn: Quality

    of Knowledge Mature organizations avoid the "echo chamber" by leveraging experienced partners and "external experience." Learning moves from individual heroics to institutional capability through blameless post-mortems and formal certification paths. Lead: The Mandate Effective leadership requires more than permission; it demands sponsorship. Leaders must define the "Cloud Operating Model" (COM) and align Development, Security, and Operations teams toward shared business outcomes.
  7. Proprietary + Confidential Deep Dive: Tech & Trust Scale: Abstracting

    Complexity Stop managing VMs. True scaling involves refactoring applications to use managed services (like Cloud Run) and enforcing consistency via Infrastructure as Code (IaC). You cannot scale people linearly with infrastructure. Secure: Identity-First Security controls must scale automatically with the environment. We move from a perimeter-based security model to a multi-layered, Identity-Centric Zero Trust model that protects data regardless of location.
  8. Proprietary + Confidential The Well-Architected Review 1. Assess Identify critical

    workloads and understand the business context and goals. 2. Deep Dive Probe architecture against the 5 pillars to uncover hidden risks. 3. Roadmap Translate technical findings into a prioritized, actionable remediation plan. 4. Remediate Execute fixes to reduce High Risk Issues (HRIs) and improve posture.
  9. Proprietary + Confidential Security by design Zero Trust Architecture Adopt

    a "Never trust, always verify" stance. Access is granted based on identity and context, not network location. Shift-Left Security Integrate security early in the SDLC. Scan code and Infrastructure-as-Code (IaC) templates for vulnerabilities before they are deployed. Shared Fate Move beyond shared responsibility. Leverage Google's opinionated blueprints, and active monitoring to actively reduce your risk burden.
  10. Proprietary + Confidential Maturity Blockers The Blob Migrating monolithic applications

    without refactoring ("Lift and Shift"). This results in high cloud costs with none of the agility benefits. ClickOps Configuring infrastructure manually via the console. This leads to configuration drift, security gaps, and impossible disaster recovery. Over-Provisioning Allocating maximum resources "just in case" due to legacy habits. This violates the Cost Optimization pillar and wastes budget.
  11. Proprietary + Confidential Securing with a Landing Zone Resource Hierarchy:

    Strict organization using Folders (Prod vs. Non-Prod) to isolate environments and policies. Shared VPC: Centralized networking governance allowing application teams to consume network resources without managing them. Identity: Federated Cloud Identity with strict Group-based access controls and separation of human vs. machine users.
  12. Proprietary + Confidential Security Command Center The Risk Engine SCC

    Enterprise identifies "Toxic Combinations"—critical paths where a minor issue (public bucket) connects with a major vulnerability to create a breach. Virtual Red Teaming Continuous, automated attack path simulations identify "chokepoints" in your defense, allowing you to prioritize fixes based on exposure scores.
  13. Proprietary + Confidential Bridging the gap Culture: From Gatekeeper to

    Enabler Security must shift from being a blocker to an enabler. By using Landing Zones to provide "Guardrails," we allow developers to move fast within safe parameters, satisfying both speed and risk requirements. Finance: ROI of Security Reframe "Technical Debt" as "Financial Risk Exposure." Investment in the "Scale" and "Secure" themes (automation) directly reduces the "Annualized Loss Expectancy" (ALE) of a potential breach.
  14. Proprietary + Confidential Path to transformation Phase 1 Day 1

    Enforce MFA, secure root account, delete default VPCs, enable centralized audit logs. Phase 2 Foundation Deploy Enterprise Blueprint (Terraform), Enable SCC Premium, Form Cloud CoE. Phase 3 Transform Implement Attack Path Simulation, Integrate Gemini for SecOps, Continuous WAF Reviews. Future State Predictive Security, AI-driven operations, Cloud as a competitive differentiator.
  15. Proprietary + Confidential FinOps maturity - Crawl-Walk-Run Crawl Walk Run

    Cost Allocation ~50% of spend allocated 80%+ allocated, automated tagging Near-complete allocation, unit economics Forecasting 20%+ variance acceptable 15% variance target <10% variance, predictive modeling Anomaly Detection Manual review Automated alerts, some automation Real-time detection, automated response Rate Optimization No CUD/discount utilization Active CUD management Centralized optimization, automated purchasing Showback/Cha rgeback Basic cost reporting Automated showback to teams Full chargeback with P&L integration
  16. Proprietary + Confidential SLO-based monitoring Definition Example SLI (Service Level

    Indicator) Quantitative measurement of performance % of HTTP 2xx responses, p95 latency SLO (Service Level Objective) Target value for SLI 99.9% availability over 30-day window Error Budget Allowable failure (100% - SLO) 0.1% = ~43 minutes/month downtime
  17. Proprietary + Confidential Incident response maturity with defined roles Role

    Responsibility Incident Commander (IC) Coordinates overall response, maintains living incident document Communications Lead (CL) Updates stakeholders, handles incoming communications Operations Lead (OL) Focuses on mitigation, minimizes user impact, resolves problem
  18. Proprietary + Confidential Maturing infrastructure deployment with GitOps Description Characteristics

    Level 0: Pre-adoption ClickOps, manual scripts Deployment inconsistency, no audit trail Level 1: Foundations Configs in Git, drift detected Visibility into changes, manual correction Level 2: GitOps-enabled Continuous reconciliation Automated drift correction, multiple teams deploying Level 3: Fleet Management Multi-cluster GitOps Standardized configs across thousands of clusters
  19. Proprietary + Confidential Secure the Foundation • Enforce immediate hygiene

    • Establish visibility • Assess the gaps • Stop "ClickOps" Innovate & Scale • Predictive Security • Full GitOps Maturity • Revenue Generation • Zero Trust at Scale Standardize & Govern • Deploy Landing Zones • Form the CoE • Adopt Shared Fate • Initiate FinOps Time Maturity & Security Posture Day 1 Early Weeks Ongoing 1 2 3 Next Steps - Accelerating Cloud Maturity & Security