Quiz-Takers Return Again and Again to Prove Their Serverless Knowledge
This past November, the Cloudtech team attended AWS re:Invent, the premier AWS customer event held in Las Vegas every year. Along with meeting customers and connecting with AWS teams, Cloudtech also sponsored the event with a booth at the re:Invent expo.
With a goal of engaging our re:Invent booth visitors and educating them on our mission to solve data problems with serverless technologies, we created our Serverless Smarts quiz. The quiz, powered by AWS, asked users to answer five questions about AWS serverless technologies, and scored quiz-takers based on accuracy and speed at which they answered the questions. Paired with a claw machine to award quiz-takers with a chance to win prizes, we saw increased interest in our booth from technical attendees ranging from CTOs to DevOps engineers.
But how did we do it? Read more below to see how we developed the quiz, the data we gathered, and key takeaways we’ll build on for re:Invent next year.
What We Built
Designed by our Principal Cloud Solutions Architect, the Serverless Smarts quiz was populated with 250 questions with four possible answers each, ranging in difficulty to assess the quiz-taker’s knowledge of AWS serverless technologies and related solutions. When a user would take the quiz, they would be presented with five questions from the database randomly, given 30 seconds to answer each, and the speed and accuracy of their answers would determine their overall score. This quiz was built in a way that could be adjusted in real-time, meaning we could react to customer feedback and outcomes if the quiz was too difficult or we weren’t seeing enough variance on the leaderboard. Our goal was to continually make improvements to give the quiz-taker the best experience possible.
The quiz application's architecture leveraged serverless technologies for efficiency and scalability. The backend consisted of AWS Lambda functions, orchestrated behind an API Gateway and further secured by CloudFront. The frontend utilized static web pages hosted on S3, also behind CloudFront. DynamoDB served as the serverless database, enabling real-time updates to the leaderboard through WebSocket APIs triggered by DynamoDB streams. The deployment was streamlined using the SAM template.
Please see the Quiz Architecture below:
What We Saw in the Data
As soon as re:Invent wrapped, we dived right into the data to extract insights. Our findings are summarized below:
- Quiz and Quiz Again: The quiz was popular with repeat quiz-takers! With a total number of 1,298 unique quiz-takers and 3,627 quizzes completed, we saw an average of 2.75 quiz completions per user. Quiz-takers were intent on beating their score and showing up on the leaderboard, and we often had people at our booth taking the quiz multiple times in one day to try to out-do their past scores. It was so fun to cheer them on throughout the week.
- Everyone's a Winner: Serverless experts battled it out on the leaderboard. After just one day, our leaderboard was full of scores over 1,000, with the highest score at the end of the week being 1,050. We saw an average quiz score of 610, higher than the required 600 score to receive our Serverless Smarts credential badge. And even though we had a handful of quiz-takers score 0, everyone who took the quiz got to play our claw machine, so it was a win all around!
- Speed Matters: We saw quiz-takers soar above the pressure of answering our quiz questions quickly, knowing answers were scored on speed as well as accuracy. The average amount of time it took to complete the quiz was 1-2 minutes. We saw this time speed up as quiz-takers were working hard and fast to make it to the leaderboard, too.
- AWS Proved their Serverless Chops: As leaders in serverless computing and data management, AWS team members showed up in a big way. We had 118 people from AWS take our quiz, with an average score of 636 - 26 points above the average - truly showcasing their knowledge and expertise for their customers.
- We Made A Lot of New Friends: We had quiz-takers representing 794 businesses and organizations - a truly wide-ranging activity connecting with so many re:Invent attendees. Deloitte and IBM showed the most participation outside of AWS - I sure hope you all went back home and compared scores to showcase who reigns serverless supreme in your organizations!
Please see our Serverless Smarts Leaderboard below

What We Learned
Over the course of re:Invent, and our four days at our booth in the expo hall, our team gathered a variety of learnings. We proved (to ourselves) that we can create engaging and fun applications to give customers an experience they want to take with them.
We also learned that challenging our technology team to work together and injecting some fun and creativity into their building process combined with the power of AWS serverless products can deliver results for our customers.
Finally, we learned the value of thinking outside the box to deliver for customers is the key to long term success.
Conclusion
re:Invent 2023 was a success, not only in connecting directly with AWS customers, but also in learning how others in the industry are leveraging serverless technologies. All of this information helps Cloudtech solidify its approach as an exclusive AWS Partner and serverless implementation provider.
If you want to hear more about how Cloudtech helps businesses solve data problems with AWS serverless technologies, please connect with us - we would love to talk with you!
And we can’t wait until re:Invent 2024. See you there!

This past November, the Cloudtech team attended AWS re:Invent, the premier AWS customer event held in Las Vegas every year. Along with meeting customers and connecting with AWS teams, Cloudtech also sponsored the event with a booth at the re:Invent expo.
Related Resources

With over 700 data breaches in the healthcare sector in 2024, comprising 186 million records, the need for data security has never been more important for SMBs in healthcare. For small and medium-sized businesses (SMBs) with limited IT resources, AWS provides a scalable, cost-effective solution for achieving HIPAA compliance.
AWS offers an array of tools specifically designed to safeguard Protected Health Information (PHI) while ensuring that sensitive data remains both secure and accessible. AWS Key Management Service (KMS) enables encryption of data both at rest and in transit, ensuring PHI is securely protected.
AWS Identity and Access Management (IAM) provides granular access controls, ensuring only authorized personnel can access sensitive data. Additionally, AWS CloudTrail allows businesses to track access and changes to data for auditing purposes, making compliance monitoring more streamlined.
While achieving HIPAA compliance may initially appear complex, AWS simplifies this process with built-in resources like these, which help manage and enforce compliance requirements, even for SMBs lacking dedicated IT teams.
What is HIPAA, and why is it important for healthcare SMBs?
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. It is a U.S. federal law designed to protect electronic PHI. For healthcare SMBs handling sensitive patient data, HIPAA compliance isn't optional; it's a critical legal requirement.
HIPAA has two key components:
- The Privacy Rule establishes standards for how medical records and personal health information must be kept confidential and used responsibly.
- The Security Rule focuses on protecting electronic health information, setting requirements for securing data during storage and transmission.
Understanding these components helps healthcare SMBs design cloud environments that meet regulatory demands, safeguard patient trust, and avoid costly compliance violations.
What are the key HIPAA requirements for AWS compliance?

Meeting HIPAA compliance in the cloud means following specific rules to protect electronic Protected Health Information (PHI). AWS provides a robust set of services to help SMBs align with these requirements. Here are the critical HIPAA compliance elements to focus on when using AWS:
1. Business associate agreement (BAA)
SMBs must sign a BAA with AWS. This legally binds AWS to safeguard PHI within its infrastructure. Without this agreement, storing or processing PHI on AWS would not meet HIPAA standards.
2. Access control
Fine-tuned access management is essential. AWS Identity and Access Management (IAM) lets SMBs restrict PHI access strictly to authorized users, applying role-based permissions and enforcing multi-factor authentication (MFA) to minimize unauthorized entry risks.
3. Security incident procedures
HIPAA requires a clear process for addressing security breaches. AWS tools like AWS CloudTrail and Amazon GuardDuty enable continuous monitoring, helping SMBs detect and respond quickly to suspicious activities involving PHI.
4. Transmission security
Protecting PHI while it moves across networks is mandatory. AWS enforces secure protocols like HTTPS, VPN connections, and AWS Direct Connect to safeguard data during transit.
5. Encryption
AWS Key Management Service (KMS) offers robust encryption controls, ensuring that sensitive information, such as PHI, is encrypted both at rest and in transit. This ensures that only authorized personnel can access the data, maintaining the highest security standards.
6. AWS's shared responsibility model
AWS secures the underlying infrastructure, but SMBs must secure their data and applications. This means properly configuring services like IAM, enabling encryption, and continuously auditing compliance settings.
By understanding AWS's compliance tools and the shared responsibility model, SMBs can confidently store and manage PHI in a secure cloud environment, ensuring HIPAA compliance with the proper safeguards.
How to achieve HIPAA compliance in AWS environments: Key steps for SMBs
Achieving HIPAA compliance in AWS environments is a critical priority for SMBs handling sensitive health data. To ensure their AWS infrastructure meets HIPAA’s stringent requirements, businesses must follow a clear and comprehensive approach. Below are the essential steps SMBs should take to build a secure, compliant environment on AWS:
1. Sign the business associate agreement (BAA)
A Business Associate Agreement (BAA) legally binds AWS and the customer, confirming AWS’s commitment to safeguarding Protected Health Information (PHI) within its cloud infrastructure. SMBs can obtain and manage their BAA through AWS Artifact, a self-service portal providing access to AWS compliance reports, certifications, and agreements. Without a signed BAA, using AWS for PHI storage or processing would not satisfy HIPAA requirements.
With the BAA in place, the next step is to configure AWS services correctly to meet compliance demands.
2. Configure AWS services for HIPAA compliance
To ensure AWS services are HIPAA-compliant, follow these essential steps for the services most frequently used.
- Amazon EC2 (Elastic Compute Cloud):
Encrypt data at rest using AWS Key Management Service (KMS) with encrypted EBS volumes. Secure network access by setting up Security Groups and Network Access Control Lists (NACLs) that limit traffic to authorized IP addresses and ports. This reduces exposure to unauthorized access.
- Amazon S3 (Simple Storage Service):
Enable server-side encryption using either SSE-S3 (AWS-managed keys) or SSE-KMS (customer-managed keys via KMS) to protect PHI at rest. Implement fine-grained access control policies and IAM roles to restrict bucket access strictly to authorized users and services. Regularly audit bucket policies to prevent accidental public exposure.
- Amazon RDS (Relational Database Service):
Use encryption at rest and in backups via KMS. Control database access by enabling IAM authentication and restricting network access with VPC security groups. Properly configure database parameters to limit privileges, ensuring only authorized personnel can read or write PHI.
After these configurations are in place, continuous monitoring and auditing are essential to ensure ongoing compliance.
3. Monitor and audit compliance
Continuous monitoring ensures that the environment stays secure and compliant:
- AWS CloudTrail: Tracks all API calls and user activities across AWS services, creating a comprehensive audit trail necessary for HIPAA reporting and security investigations.
- AWS Config: Continuously evaluates AWS resource configurations against predefined compliance rules. It alerts SMBs to any deviations, such as unencrypted resources or open permissions, enabling timely remediation.
Enabling detailed logging on critical services like S3, EC2, and RDS and setting up alarms with Amazon CloudWatch helps SMBs detect and respond to suspicious activity proactively.
Protecting data isn’t just about security; it also requires planning for availability and disaster recovery.
4. Data protection and disaster recovery
Ensuring data protection and availability is key for HIPAA compliance:
- Amazon S3 and Glacier: Amazon S3 and Glacier offer reliable backup solutions, but ensuring encryption is enabled for backup data is critical. This ensures that even stored backups of PHI are protected in compliance with HIPAA standards. Enable server-side encryption (SSE) for data at rest in S3 and Glacier.
- AWS Infrastructure Support: AWS’s global infrastructure, with multiple regions and availability zones, supports disaster recovery by replicating data. This redundancy ensures data availability even during service disruptions, minimizing downtime and helping SMBs stay compliant with HIPAA’s availability requirements.
In addition to protecting data at rest and during recovery, securing data during transit is equally important.
5. Secure data transmission with TLS/HTTPS
HIPAA mandates that PHI must be encrypted while in transit:
- AWS enforces secure protocols such as HTTPS and VPN connections to safeguard data. SMBs should configure applications and endpoints to require these protocols. This helps protect PHI from interception during transfer.
Despite best efforts, common misconfigurations can create compliance gaps, so being aware of these pitfalls is crucial.
6. Common misconfigurations to avoid
Achieving HIPAA compliance requires careful configuration. Here are some common misconfigurations SMBs should watch out for:
Encryption issues
- Problem: PHI must be encrypted at rest and in transit.
- Solution: AWS services like Amazon S3 and Amazon RDS offer AES-256 encryption for data at rest by default. However, businesses should ensure encryption is enabled for backups and configure encryption settings for other services. For data in transit, SSL/TLS encryption is also available and should be enabled to protect data during transmission.
Access Control Failures
- Problem: Misconfigured access controls can expose data.
- Solution: To implement the least privilege principle, create custom IAM roles with only the necessary permissions for each user or service.
For example, restrict access to PHI by creating specific IAM policies that grant read-only access to authorized users while limiting write access to a select few.
AWS also provides tools to assist SMBs in maintaining proper configurations and compliance.
7. Tools to prevent misconfigurations
AWS offers several tools to help SMBs monitor and address misconfigurations:
- AWS Trusted Advisor: Provides recommendations for improving security, including encryption and access control.
- AWS Config: Continuously monitors AWS resource configurations for compliance.
- AWS CloudTrail: Records detailed logs for monitoring and auditing purposes.
These tools help with compliance but do not guarantee full HIPAA compliance. They must be configured correctly.
By following these steps, SMBs can configure their AWS environment to be HIPAA-compliant, ensuring that they securely handle and store health-related data.
Also Read: Building HIPAA-compliant applications on the AWS cloud
Best practices for maintaining AWS HIPAA compliance

Beyond leveraging AWS’s built-in tools, SMBs should adopt a set of best practices that solidify and sustain HIPAA compliance in their cloud environments. These practices help reduce risks associated with misconfigurations, human error, and evolving regulatory demands.
- Regular audits: Periodically review AWS configurations, access controls, and security settings to ensure they continuously meet HIPAA requirements and adapt to any regulatory updates.
- Automated compliance checks: Use AWS-native services such as AWS Config Rules and AWS Security Hub to automate compliance checks. This helps reduce human error and quickly identifies potential misconfigurations.
- Partner with security experts: Partnering with experienced cloud security providers, especially those familiar with HIPAA and AWS, can offer tailored guidance, ongoing compliance management, and rapid incident response.
By combining regular manual reviews with automation and expert support, SMBs can effectively manage their AWS environments, reduce compliance risks, and maintain the highest standards of data security.
Wrapping up
Achieving HIPAA compliance in AWS environments is a significant challenge for SMBs, especially those in healthcare and life sciences. The complexities of configuring AWS services to meet stringent security and compliance standards can lead to potential risks, including misconfigurations, data breaches, and costly penalties. Without expert guidance, navigating the shared responsibility model of AWS and protecting sensitive health information becomes increasingly complex.
Cloudtech specialises in helping SMBs overcome these challenges by providing tailored AWS solutions that ensure HIPAA compliance. Their AWS Foundations package offers a secure, scalable cloud setup using AWS Control Tower. It includes built-in security measures and ensures compliance with HIPAA, SOC 2, and GDPR standards. Cloudtech's team of experts works closely with businesses to design and implement cloud infrastructures that are both efficient and compliant, allowing companies to focus on their core operations while maintaining the highest standards of data security.
Ready to secure an AWS environment and achieve seamless HIPAA compliance? Contact Cloudtech today to build a compliant and scalable cloud infrastructure tailored to business needs.
FAQs
- How can SMBs ensure their AWS environment is always up to date with HIPAA regulations?
To stay compliant, SMBs need to monitor any regulatory changes and ensure their AWS infrastructure reflects those updates. AWS provides regular updates on compliance certifications, and SMBs should leverage AWS's documentation and services like AWS Artifact to remain aligned with the latest HIPAA regulations.
- What should SMBs do to manage audit trails for HIPAA compliance in AWS?
Maintaining proper audit trails is crucial for HIPAA compliance. SMBs should implement logging mechanisms using AWS services like AWS CloudTrail and Amazon CloudWatch, ensuring that all actions on PHI are tracked and stored securely. These logs should be regularly reviewed to ensure no unauthorised access or policy violations.
- How does AWS's shared responsibility model impact HIPAA compliance for SMBs?
AWS's shared responsibility model divides the responsibility for HIPAA compliance between AWS and the customer. While AWS is responsible for securing the cloud infrastructure, SMBs must manage the security of their data, configure services correctly, and ensure access controls and encryption measures are in place.
- Can SMBs use AWS to meet other healthcare compliance requirements besides HIPAA?
Yes, AWS offers tools and resources that support compliance with other regulations, such as GDPR and SOC 2, in addition to HIPAA. SMBs can configure their AWS environment to comply with multiple standards by using services like AWS Config and AWS CloudTrail, ensuring a broad scope of regulatory compliance.

As of 2025, 57% of technical professionals focus on cloud cost optimization, reflecting a clear shift in how businesses, especially small and medium-sized ones (SMBs), are prioritizing financial efficiency in their cloud strategies. Cloud computing offers SMBs flexibility and scalability, but it can lead to inefficient and costly environments without careful oversight. Even with usage-based pricing models from providers like AWS, many still face avoidable costs from idle or over-provisioned resources, such as unused storage or virtual machines.
For SMBs, cloud computing offers unparalleled flexibility and scalability to support growth. However, without careful management, cloud environments can quickly become inefficient and costly. Even though cloud providers like AWS charge businesses based on actual usage, many SMBs still face expenses from idle or underutilized resources. These unused resources, such as over-provisioned storage or idle virtual machines, can lead to unnecessary costs that directly impact an SMB's bottom line.
What is cloud cost optimization?
Cloud cost optimization is not just about reducing expenses. It's about improving resource efficiency while maintaining or even enhancing performance. SMBs often find it challenging to manage cloud costs effectively. Fortunately, AWS offers built-in tools like AWS Cost Explorer, AWS Budgets, and AWS Trusted Advisor, which provide insights into cost optimization without complex configurations.
Cloud cost optimization strategies and best practices

For small and medium-sized businesses (SMBs), managing cloud costs efficiently is critical, especially given the limited IT teams and tight budgets. AWS provides an extensive range of tools to help SMBs maximize their cloud investment while minimizing unnecessary spending.
1. Effective resource management
Effective resource management is key to avoiding over-provisioned services that unnecessarily inflate cloud expenses. SMBs with limited resources need to monitor and adjust usage regularly to ensure they only pay for what they actually need.
- Identify and remove unutilized or idle resources: Cloud resources can easily become underutilized over time. Regular audits using tools like AWS Cost Explorer can help SMBs identify unused services or resources and eliminate them to save costs.
- Rightsize cloud services: After identifying idle resources, ensure your cloud services are appropriately sized. AWS Compute Optimizer helps businesses resize instances to match their actual usage needs, ensuring they aren't overpaying for compute power or storage.
2. Utilize AWS Auto Scaling for demand-based resource allocation
Auto-scaling is a powerful feature that enables SMBs to dynamically adjust compute resources based on real-time demand. This means businesses only pay for what they actually use. AWS Auto Scaling automatically increases capacity during traffic spikes and scales down during quieter periods, helping SMBs maintain performance without overspending.
3. Optimizing compute resource procurement
Choosing the right pricing models and procurement strategies for compute resources can help SMBs achieve long-term savings while ensuring optimal performance.
- Use reserved instances for predictable workloads: For workloads that run consistently, like web servers or internal business tools, Amazon Reserved Instances offer significant cost savings compared to on-demand pricing. They’re a smart choice for SMBs looking to reduce cloud expenses while maintaining reliable performance.
- Implement Savings Plans: For SMBs that experience varying usage, AWS Savings Plans offer more flexibility. These plans allow businesses to commit to a certain amount of resource usage (across services like compute and storage) for discounted rates, enabling them to optimize costs during fluctuating demand.
- Take advantage of spot instances: Amazon EC2 Spot Instances provide substantial savings (up to 90%) for non-critical workloads that can be interrupted. For SMBs, this is an effective option for processing tasks that are not time-sensitive, like batch processing or data analysis, without impacting core business operations.
4. Data storage and transfer optimization
While cloud storage provides scalability, it can also become a costly overhead if not managed effectively. SMBs can take steps to optimize storage usage and reduce costs.
- Choose the right storage options: Amazon S3 offers several storage tiers (e.g., S3 Standard, S3 Intelligent-Tiering, and S3 Glacier) that allow SMBs to store data based on its usage. For frequently accessed data, use high-performance storage, while low-access data can be stored in more cost-effective options like S3 Glacier or S3 Intelligent-Tiering.
- Implement data lifecycle management: Using Amazon S3 Lifecycle Policies, SMBs can automate the movement of data between storage tiers based on access patterns, ensuring they aren’t overpaying for expensive storage.
- Control data transfer fees: Data transfer costs, especially across regions, can add up. Using AWS services like AWS Direct Connect for private connectivity between on-premises and AWS can reduce data transfer costs while enhancing performance.
5. Cloud deployment strategies
Choosing the right cloud deployment strategy is vital for balancing cost and scalability, especially for SMBs.
- Decide between single or multi-cloud deployments: While single-cloud deployments offer simplicity, a multi-cloud strategy can provide flexibility and cost savings. By using services from different providers, SMBs can take advantage of competitive pricing models, ensuring they get the best deal for their needs.
- Adopt a cloud-native architecture: Building applications using cloud-native principles ensures they are fully optimized for AWS services like AWS Lambda for serverless computing, or Amazon ECS and Amazon EKS for containerized environments. Cloud-native architectures automatically scale based on demand, reducing over-provisioning and improving resource efficiency.
6. Monitoring and automation
Monitoring cloud costs and using automation tools is key to controlling expenses over time.
- Set automated alerts for budget overages: AWS Budgets allows SMBs to set cost thresholds and automatically alerts them when they approach or exceed the budget. This helps prevent unexpected overages and provides transparency into spending.
- Automate shutdowns of unused environments: Implement AWS Auto Scaling and AWS Lambda to automatically shut down non-production environments during off-hours, ensuring you’re not paying for resources that aren’t being used.
- Regularly review pricing and service usage: With AWS Trusted Advisor and AWS Cost Explorer, SMBs can continuously monitor and analyze their resource usage, identifying potential savings and making informed decisions about adjusting their cloud usage.
7. Cultivating a cost-aware culture
Creating a cost-aware culture across an SMB can help control cloud expenses and optimize usage.
- Promote transparency in cloud spending: Encouraging transparency within teams about cloud spending enables responsible usage. With AWS Cost Explorer, SMBs can break down costs by team, department, or project, helping every department understand the impact of their cloud usage.
- Encourage collaboration between finance and IT teams: Cloud cost management is not just an IT responsibility. SMBs should foster collaboration between IT and finance departments to ensure that cloud spending is aligned with overall business objectives and budgets.
- Implement showback or chargeback models: By allocating cloud costs to specific departments using AWS Cost Allocation Tags, SMBs can encourage departments to optimize their usage, reducing waste and promoting cost-conscious behavior.
By following these strategies and best practices, SMBs can achieve significant cloud cost savings without compromising performance, scalability, or flexibility. These approaches allow SMBs to make the most out of their cloud infrastructure, ensuring that every dollar spent is driving business growth.
Benefits of cloud cost optimization
Cloud cost optimization provides significant advantages, particularly for small to medium-sized businesses (SMBs) with limited IT resources. By adopting strategic cost management practices, SMBs can improve their cloud efficiency, reduce unnecessary expenses, and maintain tighter control over their budgets. Here’s how cloud cost optimization can benefit SMBs:
1. Cost savings
Cloud cost optimization helps SMBs reduce cloud expenses by identifying and eliminating waste. Using AWS Reserved Instances and Savings Plans ensures predictable, discounted pricing while aligning cloud resource consumption with actual needs.
Example: A small e-commerce SMB could reduce its cloud expenses by reserving compute capacity for consistent traffic months, which lowers long-term costs compared to on-demand pricing.
2. Improved efficiency
Optimizing cloud resources through rightsizing (adjusting resource allocation based on actual usage) and eliminating idle capacity boosts system performance and reduces overhead costs. AWS Auto Scaling helps businesses scale up or down dynamically based on real-time demand, preventing overprovisioning and underutilization.
Example: A business running a customer-facing app can use AWS Auto Scaling to allocate only the necessary compute resources during peak hours, scaling down when demand decreases.
3. Smarter budgeting
With tools like AWS Cost Explorer and AWS Budgets, SMBs gain better visibility into their cloud resource usage, enabling more accurate cost forecasting and easier tracking of expenses. This visibility empowers businesses to set realistic budgets and prevent overspending.
Example: An SMB can create custom cost and usage reports using AWS Cost Explorer to monitor monthly cloud spending, identify trends, and predict future costs based on past usage patterns.
4. Enhanced performance
Cloud resources optimized for specific workloads enhance both performance and speed. For SMBs, this means faster customer interactions and improved operational efficiency, resulting in better customer satisfaction.
Example: Amazon RDS (Relational Database Service) allows SMBs to fine-tune their database performance by selecting instance types that align with workload demands, ensuring optimal database speed while keeping costs in check.
5. Reduced security risks
Unused or excess resources can become potential security vulnerabilities. By eliminating unnecessary cloud services, SMBs reduce the attack surface and improve their overall security posture.
Example: Removing unneeded EC2 instances or switching off unused development environments reduces the potential for security risks like unauthorized access.
6. Sustainability
Cloud cost optimization can also contribute to sustainability efforts by reducing energy consumption. Optimizing resource usage not only lowers cloud costs but also helps SMBs reduce their carbon footprint.
Example: SMBs can reduce their energy consumption by adopting AWS Lambda, which runs code only when needed and scales automatically, optimizing compute power usage and reducing environmental impact.
As SMBs look to capitalize on these benefits, it's crucial to recognize the challenges they face when it comes to managing cloud costs.
Challenges SMBs face with rising cloud costs

Despite the clear benefits, SMBs often face challenges when it comes to managing cloud costs. Key issues such as complex pricing models, lack of visibility, and resource mismanagement can hinder effective optimization. Here are some common pain points for SMBs:
1. Complex pricing models
Cloud pricing models can be difficult to navigate, leading to unpredictable costs. With AWS offering numerous pricing options (on-demand, reserved, spot instances), SMBs may struggle to understand the best choices for their needs.
Example: Without the right knowledge, an SMB could overpay for on-demand compute resources when AWS Savings Plans or Reserved Instances would provide significant cost savings for predictable workloads.
2. Lack of visibility
Without the right monitoring tools, SMBs may miss inefficiencies in their cloud usage, such as unused resources or over-provisioned services. Tools like AWS CloudWatch and AWS Cost Explorer provide detailed insights into usage patterns, helping businesses identify cost-saving opportunities.
Example: An SMB using multiple cloud storage types without proper monitoring might unknowingly leave large amounts of data in expensive storage tiers, which could be moved to lower-cost options like Amazon S3 Glacier for archiving.
3. Scalability issues
SMBs experiencing rapid growth may struggle to manage cloud resources effectively. They may find that their infrastructure isn’t designed to scale as efficiently as required, leading to increased costs or performance degradation.
Example: As an SMB grows, it can adopt a cloud-native architecture using AWS Lambda and AWS Fargate to scale applications seamlessly without the need for manual intervention, ensuring the infrastructure can handle traffic spikes without overspending.
4. Resource mismanagement
Overbuying cloud services or failing to shut down unused resources leads to wasteful spending. Many SMBs unintentionally keep resources running after they’re no longer needed, contributing to unnecessary costs.
Example: An SMB running a temporary development environment in Amazon EC2 could use AWS Lambda or automate resource shutdown during off-hours with AWS Auto Scaling to avoid paying for idle resources.
5. Inadequate governance
Poor governance practices can make it difficult for SMBs to track and control cloud spending. With multiple departments using cloud resources independently, it’s easy for costs to spiral out of control.
Example: Implementing AWS Organizations and using Service Control Policies (SCPs) can help SMBs enforce cost control and governance across departments, ensuring cloud resources are allocated efficiently and within budget.
Overcoming these challenges requires a combination of the right AWS tools, proactive monitoring, and well-established governance practices. By addressing these issues, SMBs can take control of their cloud expenses and optimize resources effectively.
Wrapping up
SMBs often face the challenge of managing cloud costs effectively. Without a clear strategy for cloud cost optimization, companies may experience overspending on underutilized resources, leading to financial strain. By implementing structured approaches to monitor and manage cloud usage, businesses can reduce unnecessary expenses and allocate resources more efficiently, supporting sustainable growth.
Cloudtech specializes in helping SMBs optimize their cloud costs through tailored AWS solutions. Their team, primarily former AWS professionals, offers expertise in building secure, scalable, and cost-effective cloud infrastructures. By partnering with Cloudtech, businesses can modernize their applications, streamline data management, and enhance operational efficiency, all while keeping costs under control.
Take control of cloud expenses today. Reach out to Cloudtech to discover how their customized solutions can optimize cloud costs and drive business growth.
FAQs
- How can SMBs optimize cloud costs during periods of rapid growth?
During rapid growth, SMBs often face challenges scaling their cloud infrastructure efficiently. Implementing a flexible cloud cost optimization strategy, such as utilizing scalable resource models and revisiting usage patterns regularly, can help avoid unnecessary costs while scaling.
- What role does cloud governance play in cost optimization?
Cloud governance ensures clear policies and controls around cloud usage, preventing overuse or mismanagement of resources. Proper governance practices, such as setting up cost control mechanisms and user access policies, can ensure that cloud resources are utilized efficiently and within budget.
- How can businesses compare cloud service providers for cost-effectiveness?
SMBs can compare cloud service providers by evaluating their pricing models, discounts, and features. Tools like AWS pricing calculators and third-party comparison platforms can provide insights into the most cost-effective providers for their specific needs.
- How can businesses reduce hidden cloud costs associated with data transfer?
Businesses can minimize data transfer costs within AWS by optimizing storage strategies, such as using appropriate storage tiers, and limiting unnecessary cross-region or cross-Availability Zone data transfers, which often incur higher fees. AWS provides tools like Amazon S3 Transfer Acceleration and AWS Direct Connect that help reduce latency and transfer costs, especially for large-scale data movement. Careful planning of data flows and leveraging these AWS-native options can significantly control and lower transfer expenses.

Cloud adoption is now a core part of business operations. For SMBs moving from traditional systems to the cloud, new security challenges require careful attention. The market for cloud security software is expected to reach nearly USD 37 billion by 2026, showing how many companies are investing to keep their data safe. At the same time, almost two-thirds of security experts believe artificial intelligence will play a significant role in detecting and stopping threats faster than ever before.
Because cloud data is stored remotely and accessed from many locations, it is exposed to new types of risks. For small and medium-sized businesses (SMBs) with limited IT resources, this shift introduces security concerns that are hard to manage without the right expertise. Small mistakes, such as misconfigured cloud settings or accidental data leaks, can lead to significant problems, including lost revenue and reputational damage.
This article looks closely at the most significant cloud security threats to watch in 2025. It aims to help small and medium-sized businesses understand what is at stake and how to stay ahead of these risks.
What is AWS security?
AWS Security is a comprehensive framework that helps protect data, applications, and infrastructure hosted on the AWS cloud. It includes a variety of tools, controls, and services designed to ensure the confidentiality, integrity, and availability of cloud resources.
At the heart of AWS Security lies the shared responsibility model, which defines clear roles for both AWS and its customers:
- AWS’s responsibility: Protecting the cloud infrastructure itself, including hardware, software, networking, and physical facilities that support AWS services.
While AWS secures the infrastructure, SMBs are responsible for securing data access, implementing strong security settings, and maintaining compliance within their cloud environment. For instance, an SMB in retail needs to ensure that customer payment data is encrypted, and access is limited to authorized personnel only.
- Customer's responsibility: Securing the resources within the cloud, such as configuring security settings, managing access controls, encrypting data, and maintaining compliance.
This model allows organizations to utilize AWS's strong security capabilities while tailoring controls to their specific needs. AWS Security covers:
- Network protection through firewalls and traffic monitoring
- Identity and access management to control user permissions
- Data encryption to safeguard sensitive information
- Continuous monitoring and automated threat detection
- Tools for regulatory compliance and audit readiness
This multi-layered approach helps businesses stay protected against evolving threats while enabling scalability and operational flexibility.
Why SMBs must address cloud-based security issues in 2025
The cloud has become essential for growth, innovation, and cost-efficiency for small and medium businesses. However, relying on cloud platforms like AWS also introduces risks that must be managed proactively:
- Increasing threat sophistication: Cyberattacks are becoming more frequent and complex, making traditional security solutions less effective against emerging cloud threats. AWS provides services like AWS Shield to defend against DDoS attacks.
- Data protection and privacy: With sensitive data stored in the cloud, securing it is important to prevent breaches. AWS offers comprehensive encryption and data protection tools.
- Regulatory compliance: SMBs face multiple compliance requirements across industries and regions. AWS supports compliance frameworks globally, as detailed on AWS Compliance pages.
- Business continuity: Cloud security incidents can cause costly downtime. AWS services like AWS Config and AWS CloudTrail help monitor configurations and log activity for quick incident response.
- Scalability needs: As SMBs grow, AWS's security features scale accordingly without compromising protection or performance. For SMBs with limited IT teams, AWS simplifies security management by automating key tasks, ensuring businesses can scale their security infrastructure without additional overhead.
By prioritizing cloud-based security issues in 2025, SMBs can protect their business assets, stay compliant, and maintain customer trust using AWS's trusted security capabilities.
Secure your cloud environment with Cloudtech's expert solutions tailored for SMBs. Cloudtech ensures your business stays protected and efficient from infrastructure modernization to application optimization.
Major cloud security issues SMBs face
As small and medium businesses increasingly rely on cloud technologies, understanding the top cloud-based security issues becomes crucial. SMBs often face challenges due to limited IT resources and expertise, which makes them attractive targets for cybercriminals. Below are the key security threats SMBs should watch closely in 2025.
1. Data breaches and misconfigured cloud storage
Data breaches continue to be one of the top security threats for SMBs. These breaches occur when sensitive data is accessed without authorization, often due to misconfigurations in cloud storage.
Common causes of breaches:
- Unintended public access: Cloud storage that is mistakenly configured as publicly accessible.
- Over-permissive permissions: Giving excessive access rights to users or services.
- Infrequent configuration audits: Failure to regularly review and update security settings.
How SMBs can prevent data breaches:
- Configure Amazon S3 bucket policies: Use S3's built-in access controls to define who can read, write, and manage the data.
- Enable AWS CloudTrail: Track all actions made to your S3 buckets to identify unauthorized access attempts.
- Enable Amazon S3 Block Public Access: Ensure that no one can unintentionally expose data to the public by blocking public access at the bucket and account level.
- Use Amazon Macie: It helps automatically discover and classify sensitive data stored in AWS, such as PII (Personally Identifiable Information), and helps set up compliance and access monitoring.
SMBs can reduce the risk of data breaches by regularly reviewing access settings and using automated tools to manage permissions.
2. Insecure APIs and third-party integrations
APIs are essential for cloud services, but they can also introduce vulnerabilities. Insecure APIs may allow unauthorized data access, data manipulation, or exposure of sensitive information.
How to secure APIs using AWS:
- AWS API Gateway: This is used to manage APIs securely by setting rate limiting, authentication, and authorization rules.
- Rate limiting: Prevent DDoS attacks by controlling request rates.
- Authentication: Integrate with AWS IAM and use MFA for stronger access controls.
- Custom authorizers: Add additional logic for finer control over who can access APIs.
- AWS IAM (Identity and Access Management):
- Fine-grained permissions: Control who can access which API resources.
- Least privilege principle: Only grant the minimum permissions needed.
- MFA: Adds an extra layer of security by requiring a second form of verification.
- AWS WAF (Web Application Firewall): Protect APIs from SQL injections, XSS, and other exploits by integrating AWS WAF with API Gateway.
Example: An SMB that provides online ordering via a mobile app can secure its APIs by using AWS API Gateway, IAM policies, and AWS WAF to ensure secure and authorized access, protecting sensitive customer data from potential attacks.
3. Insider threats and human error
Insider threats are often overlooked but can be just as damaging as external attacks. SMBs face a range of risks, including employees misusing their access or making mistakes that expose critical data.
Types of insider threats:
- Malicious insiders: Employees or contractors intentionally misusing their access privileges to cause harm.
- Accidental errors: Employees unknowingly expose data due to phishing or careless handling of credentials.
Preventive actions SMBs can take:
- Implement least-privilege access: Use AWS IAM to restrict user permissions based on job roles, ensuring employees only have access to the data and systems they need.
- Enable multi-factor authentication (MFA): For all users, especially admins, enforce MFA to add an extra layer of security.
- Regular employee training: Conduct frequent security awareness programs to educate staff on recognizing phishing attempts, maintaining strong passwords, and following security protocols.
- Monitor user activity: Use AWS CloudTrail to track and log all user actions, enabling real-time monitoring of suspicious activity and providing an audit trail for forensic analysis.
By enforcing least-privilege access, monitoring activities, and training staff, SMBs can reduce the likelihood of insider threats, whether malicious or accidental.
4. Ransomware attacks on cloud resources
Ransomware is increasingly targeting cloud data, with cybercriminals locking data and demanding a ransom for its release. For SMBs, these attacks can halt operations and cause significant financial losses.
Preparation steps for SMBs:
- Backup critical data: Use AWS Backup to regularly back up cloud-based data and ensure that it is stored in multiple locations, making recovery easier in case of an attack.
- Test recovery procedures: Regularly simulate recovery scenarios to ensure that the business can restore its data quickly. With AWS Elastic Disaster Recovery, SMBs can test failover procedures and validate the RTO and RPO.
- Endpoint detection and response (EDR): Use AWS GuardDuty to continuously monitor for suspicious activity and potential ransomware threats, ensuring rapid detection and response.
Ransomware can be devastating, but by maintaining strong backups and proactive monitoring, SMBs can mitigate its impact and minimize recovery time.
5. Lack of cloud visibility and monitoring
SMBs often face challenges with monitoring their cloud environments, which can leave security gaps and increase the risk of security breaches.
Why visibility is crucial:
- Cloud resources are decentralized, making it harder to monitor in traditional ways.
- Without adequate visibility, unauthorized access or misconfigurations can go undetected, leading to breaches or compliance violations.
How SMBs can improve cloud visibility:
- Use AWS CloudTrail: AWS CloudTrail provides detailed logs of API calls and user activity within the AWS environment, allowing SMBs to track changes and identify potential security issues.
- Set up monitoring with Amazon CloudWatch: Amazon CloudWatch provides real-time monitoring of AWS resources, allowing SMBs to set alarms and receive notifications if something goes wrong.
- Use AWS Config: AWS Config helps track configuration changes to cloud resources, providing visibility into any deviations from established security baselines.
By implementing continuous monitoring and utilizing AWS’s security tools, SMBs can gain the visibility they need to maintain a strong security posture and quickly respond to any incidents.
6. Shadow IT and unauthorized cloud usage
Shadow IT occurs when employees or departments use unsanctioned cloud applications, creating security vulnerabilities.
Risks of shadow IT:
- Unsecured Data Storage: Data may be stored in unsecured cloud applications outside the organization's control.
- Exposure to Cyberattacks: Unmonitored applications may expose the organization to cyberattacks or compliance violations.
How SMBs can manage shadow IT:
- Create clear cloud application policies: Develop and enforce policies regarding which cloud applications employees are allowed to use.
- Use discovery tools: AWS offers services like AWS Config and AWS Macie to detect unauthorized cloud resources and monitor sensitive data.
- Foster communication: Encourage collaboration between IT and business units to understand cloud needs and ensure proper security measures are in place for new applications.
By taking a proactive approach to managing shadow IT, SMBs can reduce security risks and ensure that their cloud infrastructure remains compliant and secure.
Practical steps for SMBs to strengthen cloud security

Cloud-based security issues pose significant risks for SMBs, but effective protection is achievable with focused actions. Below are practical steps SMBs can implement to safeguard their cloud environments while managing costs and complexity.
1. Cost-effective security tools for SMBs
SMBs often face tight budgets but can still access strong security tools for smaller operations. Essential solutions include:
- Endpoint protection software.
- Firewalls integrated with cloud platforms.
- Multi-factor authentication (MFA) to secure access.
Many cloud providers bundle these features, allowing SMBs to activate them without additional expenses. Choosing the right tools that fit the business size avoids unnecessary spending while improving defenses.
2. Employee training and awareness programs
Human error remains a leading cause of cloud security breaches. Regular training empowers employees to:
- Recognize phishing attempts.
- Maintain strong password practices.
- Handle sensitive data responsibly.
Creating a security-aware culture reduces vulnerabilities related to social engineering and careless mistakes. This step complements technical controls by strengthening the human element.
3. Managed security services personalized for SMBs
For SMBs lacking in-house security expertise, managed security service providers (MSSPs) offer a cost-effective alternative. These services typically provide:
- Continuous monitoring of cloud environments using tools like Amazon CloudWatch and AWS GuardDuty.
- Rapid threat detection and response with services such as AWS Security Hub, Amazon Detective, and AWS Shield.
- Customized security management aligned with SMB needs through AWS Identity and Access Management (IAM) and AWS Config.
Outsourcing security functions ensures expert oversight and reduces the operational burden on internal teams.
4. Implementing zero-trust access control
Zero-trust security requires verifying every access request, regardless of user location or device. SMBs can adopt zero-trust principles by:
- Enforce strict identity verification for all users.
- Granting least-privilege access based on roles.
- Regularly reviewing access permissions.
This approach limits attack surfaces and helps prevent unauthorized access, especially from compromised credentials or insider threats.
5. Routine cloud security audits and risk assessments
Ongoing evaluations help SMBs stay ahead of cloud-based security issues by:
- Identifying vulnerabilities and misconfigurations.
- Ensuring compliance with relevant regulations.
- Updating security policies to address emerging threats.
Regular audits and risk assessments promote a proactive security posture and enable timely adjustments to defenses.
By combining affordable tools, informed employees, expert-managed services, and disciplined security practices, SMBs can build a resilient cloud security framework. This strategy reduces risks and supports sustainable business growth in the face of evolving cloud threats.
Emerging cloud security trends SMBs should monitor

As SMBs increasingly rely on cloud technologies, staying aware of key security trends helps manage cloud-based security issues effectively and protect valuable data.
1. Use of AI and automation in threat detection
AI-powered tools are transforming threat detection by providing continuous, automated monitoring. For SMBs with limited resources, this means:
- Faster identification of suspicious activity.
- Reduced response times to incidents.
- Lower false alarm rates through intelligent analysis.
Automation allows security teams to focus on important issues, improving overall defense against evolving threats.
2. Security challenges in multi-cloud and hybrid environments
Deploying services across multiple clouds or combining public and private clouds offers flexibility but also complicates security. SMBs face challenges such as:
- Ensuring consistent security policies across platforms.
- Preventing misconfigurations that create vulnerabilities.
- Managing an expanded attack surface.
Addressing these challenges requires standardized controls and dedicated monitoring tailored to each environment to reduce cloud-based security risks.
3. Increasing emphasis on identity and access management (IAM)
Securing user access remains a priority. SMBs are strengthening IAM by:
- Implementing multi-factor authentication (MFA).
- Defining precise role-based access controls (RBAC).
- Regularly reviewing access permissions.
These steps help prevent unauthorized access and limit damage from compromised accounts.
Conclusion
Small and medium businesses face increasing challenges with cloud-based security issues as they expand their digital infrastructure. Understanding these threats is essential to protect sensitive data and maintain business continuity. By recognizing common vulnerabilities, SMBs can take informed steps to strengthen their cloud security posture.
Investing in cost-effective cloud solutions that prioritize security helps businesses avoid costly breaches and downtime. Modernizing infrastructure and optimizing applications are key to balancing performance with protection. With the right approach, cloud computing supports current operations and scales to meet future demands without compromising security or budget.
Cloudtech provides tailored cloud services designed to help SMBs improve security while maximizing their cloud investment. From data modernization to application optimization, Cloudtech's experts ensure efficient, secure, and scalable cloud environments for growing businesses.
Explore Cloudtech’s services to address your cloud security challenges and drive sustainable growth with solutions built for SMBs.
FAQs
- How can SMBs balance cloud security needs with limited IT staff?
SMBs can adopt managed security services to extend their IT capabilities. These services provide continuous monitoring, expert threat response, and tailored security management without needing a large internal team.
- What role does encryption play beyond data storage in cloud security?
Encryption protects data not only at rest but also during transmission and processing in the cloud. This multi-layered approach reduces exposure risks from interception or unauthorized access across all cloud interactions.
- How does compliance with industry standards reduce cloud-based security issues?
Following recognized compliance frameworks helps SMBs implement proven security controls and processes. This structured approach minimizes vulnerabilities and ensures regulatory requirements are met, lowering the risk of penalties and breaches.
- What should SMBs consider when selecting a cloud provider to improve security?
SMBs should evaluate providers on their security certifications, transparency around shared responsibility, available security tools, and support for compliance needs. Choosing a provider aligned with business goals strengthens overall cloud security posture.
Get started on your cloud modernization journey today!
Let Cloudtech build a modern AWS infrastructure that’s right for your business.