What's actually wrong with most cloud deployments.
The cloud isn't broken. The way it's typically deployed is. Common patterns we see when we onboard a new client — whether they're on Microsoft 365, Azure, AWS, or a mix of all three:
- Root/global admin rights handed out to four or five people who don't need them
- MFA configured but not enforced — bypassable by anyone who pushes back
- External sharing wide open in SharePoint, OneDrive, or S3 buckets (the AWS equivalent disaster)
- Email forwarding rules quietly siphoning data to personal addresses (a classic compromise indicator)
- Licenses or reserved-instance commitments paid for but not assigned, or assigned to ex-employees
- Azure VMs or EC2 instances running 24/7 that only need to run during business hours
- Reserved Instances or Savings Plans that could halve compute cost — never purchased
- Conditional access / IAM policies either non-existent or wide-open
- S3 buckets with public-read ACLs that nobody remembers configuring (the perennial AWS breach headline)
None of this is the cloud's fault. It's what happens when a tenant or account gets stood up by someone in a hurry and never gets a proper review. The fix isn't a migration — it's a configuration overhaul, then ongoing administration with someone who knows what to look for, in whichever platform you're running.