Why Cloud IR Is Different

Incident response in cloud environments is not simply traditional IR performed on virtual machines. The cloud introduces fundamental architectural differences that change how investigations are conducted, evidence is collected, and containment is executed. Treating cloud IR as "the same but remote" leads to missed evidence, botched containment, and destroyed forensic artifacts.

Ephemeral infrastructure is the most disruptive difference. In an on-premises environment, a compromised server sits on a rack, available for imaging and analysis indefinitely. In the cloud, instances spin up and down with auto-scaling groups, containers run for minutes before being replaced, and serverless functions execute for milliseconds. The evidence you need may literally cease to exist between the time you detect the incident and the time you begin your investigation. Cloud IR must be fast, and ideally automated, to capture evidence before it disappears.

API-driven operations mean that nearly everything an attacker does — and nearly everything you do in response — is an API call. Creating an instance, modifying a security group, exfiltrating data from a storage bucket, escalating privileges through role assumption — these are all API operations that are (or should be) logged. This is both a challenge and an advantage. The challenge is the sheer volume and complexity of API logs. The advantage is that cloud environments can provide a more complete audit trail than most on-premises environments ever achieve, if logging is properly configured.

Identity is the perimeter. In traditional environments, network segmentation and firewalls define security boundaries. In the cloud, identity and access management (IAM) is the primary control plane. An attacker with valid IAM credentials can access resources regardless of network location. Cloud IR investigations therefore focus heavily on identity: which credentials were compromised, what permissions did they grant, what actions were taken, and what resources were accessed.

80% Of cloud breaches involve compromised credentials or misconfigurations, according to multiple industry reports. Identity compromise, not malware, is the dominant cloud attack vector.

Multi-region and multi-account complexity adds investigative scope that does not exist in traditional environments. A single compromised IAM user may have accessed resources across multiple regions, multiple accounts, and multiple services. The investigation must span all of these — a compromised access key in us-east-1 may have been used to exfiltrate data from a bucket in eu-west-1 and launch crypto-mining instances in ap-southeast-1.

The Shared Responsibility Model

Before investigating a cloud incident, you must understand what you are responsible for — and what you are not. Every major cloud provider operates under a shared responsibility model that divides security obligations between the provider and the customer. The split varies by service type:

Infrastructure as a Service (IaaS)

For IaaS (EC2, Azure VMs, Compute Engine), the cloud provider is responsible for the physical infrastructure, hypervisor, and host operating system. You are responsible for everything above: the guest operating system, application stack, data, identity management, network configuration, and firewall rules. This means OS-level forensics (file systems, processes, memory) is your responsibility, but you cannot access the hypervisor or underlying hardware. Evidence collection must be done through APIs and in-guest tooling.

Platform as a Service (PaaS)

For PaaS (RDS, Azure App Service, Cloud SQL), the provider additionally manages the runtime, middleware, and operating system. Your forensic visibility is limited to application logs, data, and IAM. You cannot image the underlying OS of a managed database — you can only work with the logs and data access records the service provides.

Software as a Service (SaaS)

For SaaS (Microsoft 365, Google Workspace, Salesforce), the provider manages everything except data and user access. Your investigation scope is limited to audit logs, user activity, and data. Understanding this boundary is critical: you cannot request a memory dump of the server running your SaaS application.

During an incident, you may need to engage the cloud provider's incident response support. AWS, Azure, and GCP all offer IR support through their enterprise support plans, and some offer dedicated security IR teams for major incidents. Know how to reach these teams before an incident occurs.

Critical Log Sources by Provider

The foundation of cloud IR is log data. Each provider offers a distinct set of logging services, and the names, formats, and default configurations differ significantly. Ensure these are enabled and retained before an incident — retroactive enablement does not generate historical data.

Amazon Web Services (AWS)

Microsoft Azure

Google Cloud Platform (GCP)

90 days Default log retention for many cloud services. If you haven't configured extended retention or log export before an incident, critical evidence may already be gone.

Cloud-Specific Attack Patterns

Cloud environments introduce attack vectors that do not exist in traditional infrastructure. Understanding these patterns is essential for effective investigation.

Containment in the Cloud

Cloud containment strategies differ fundamentally from on-premises approaches. You cannot physically disconnect a server. You cannot walk to a rack and pull a network cable. Everything is done through API calls, and every action must be carefully considered for its impact on evidence preservation.

Identity Containment

For compromised IAM credentials, containment focuses on revoking access while preserving the audit trail:

Network Containment

Compute Containment

The critical principle for compute containment is: snapshot before you act, and never terminate an instance you have not preserved.

Storage Containment

Evidence Preservation

Evidence preservation in the cloud faces unique challenges that demand proactive preparation. You cannot retroactively enable logging, extend retention, or recover terminated instances.

Pre-Incident Preparation

During-Incident Collection

When collecting evidence during an active incident, follow this priority order to capture the most volatile evidence first:

  1. Running instance memory — most volatile, lost on stop/terminate
  2. Running instance network state — active connections, listening ports
  3. Running instance process state — process listings, open files
  4. Disk snapshots — persistent but may be modified by the attacker
  5. Cloud API logs — persistent if properly configured and retained
  6. IAM policies and configurations — may be modified during incident
  7. Network configurations — security groups, NACLs, route tables

For each piece of evidence collected, record a chain of custody: what was collected, when, by whom, from where, and how. Use cryptographic hashes (SHA-256) to verify integrity. Store evidence in a dedicated, access-controlled, immutable storage location separate from the compromised environment.

Cloud IR Toolkit

A growing ecosystem of tools supports cloud incident response. Building your toolkit before an incident is essential — you do not want to be evaluating tools during a crisis.

AWS

Azure

GCP

Cross-Cloud

Building Cloud IR Readiness

The organizations that respond effectively to cloud incidents are those that prepared before the incident occurred. Cloud IR readiness is not a one-time project — it is an ongoing practice that must evolve as your cloud environment grows and changes.

"In cloud IR, the incident response process starts months before the incident. The logging you enable today, the retention you configure today, and the IR roles you pre-stage today determine whether you can investigate effectively when a breach occurs."

Cloud environments fundamentally change the practice of incident response, but the core principles remain the same: prepare in advance, detect quickly, contain decisively, preserve evidence carefully, and learn from every incident. The organizations that treat cloud IR as a distinct discipline — not an afterthought bolted onto their existing IR program — are the ones that will navigate cloud incidents with the speed and precision these environments demand.