Why cloud environments also require strategic attention
Increasing risks: a broad shift
According to the CCB (Center for Cybersecurity Belgium), the number of data breaches in Belgian cloud environments increased again in 2023. The threats have become more diverse, more advanced and more international. Whereas classic networks used to be the primary target, today we also see cloud infrastructure, SaaS applications and even access rights of external tools via OAuth under attack.
That reality has less to do with “poorly secured cloud” and everything to do with insufficient visibility into exactly what is going on in the cloud environment.
Trust is not the same as control
Cloud providers typically provide strong basic elements in terms of security. But what you do in the cloud – what files are shared, who has access, how MFA is set up, how administrator roles are distributed – remains your own responsibility.
Without visibility into configuration, logging, access management and connected applications, it is nearly impossible to accurately assess risks or set priorities.
Therein lies immediately the added value of a thorough cloud audit.
What does Cyberplan do?
At Cyberplan, we help organizations regain control of their cloud security. No panic messages or technical dashboards without context, but a structured approach tailored to your environment and maturity.
Among other things, we chart:
- Microsoft 365 security (Teams, OneDrive, Exchange, Entra ID, Conditional Access)
- User and access management: including admins, remote access, MFA and audit logs
- OAuth links: which applications can access your data?
- Domain and email security: SPF, DKIM, DMARC, anti-phishing and forwarding
- Data sharing and compliance policies: also with respect to NIS2, ISO27001 or sectoral standards
We make risks visible, formulate concrete recommendations and, if desired, also assist in follow-up or retesting.
What should you expect?
- Clear reporting for both management and IT
- Independent analysis, with no hidden commercial interests
- Guidance from the CyFun framework or other standards
- Clear action plan that also allows IT partners to concretely assume their role