en
  • de
Baggenstos Firmen Logo
  • Services
    • Managed Services
      • Azure Backup
      • Azure Site Recovery
      • Azure Billing
      • Managed Azure Workplace
      • Operation Care
    • Consulting Services
      • Azure Landingzone
      • Coding-as-a-Service
      • Cloud Readiness Workshop
      • Security Workshop
      • Lift and Shift
      • Azure AVD Assessment
      • Modern Workplace
      • Azure Migration & Modernization
  • Technology
    • Azure
    • Microsoft 365 & Co
    • Videos: briefly explained
    • Cloud-PC
    • Microsoft Copilot
    • Security: Overview
  • References
  • Company
    • About
    • 100 years Baggenstos
      • Videos: briefly explained
      • 100 Jahre in Bildern
      • 100 years Baggenstos
    • Team
    • Why Baggenstos
    • Certifications
      • Certifications
    • Baggiwood
  • News
    • Events
    • News
    • Webinars
    • Videos: briefly explained
  • Career
  • Contact
Baggenstos Firmen Logo
  • Services
    • Managed Services
      • Azure Backup
      • Azure Site Recovery
      • Azure Billing
      • Managed Azure Workplace
      • Operation Care
    • Consulting Services
      • Azure Landingzone
      • Coding-as-a-Service
      • Cloud Readiness Workshop
      • Security Workshop
      • Lift and Shift
      • Azure AVD Assessment
      • Modern Workplace
      • Azure Migration & Modernization
  • Technology
    • Azure
    • Microsoft 365 & Co
    • Videos: briefly explained
    • Cloud-PC
    • Microsoft Copilot
    • Security: Overview
  • References
  • Company
    • About
    • 100 years Baggenstos
      • Videos: briefly explained
      • 100 Jahre in Bildern
      • 100 years Baggenstos
    • Team
    • Why Baggenstos
    • Certifications
      • Certifications
    • Baggiwood
  • News
    • Events
    • News
    • Webinars
    • Videos: briefly explained
  • Career
  • Contact
en
  • de
Is your cloud securely configured?
04.02.2026

Mission Cloud: Fully Secure

Ever watched Tom Cruise in Mission: Impossible? Villains and secret agents wear masks, impersonate others and blend in seamlessly. For Baggenstos, a very real mission is securing cloud infrastructures — provided configurations are reviewed on a regular basis.

Ever watched Tom Cruise in Mission: Impossible? Villains and secret agents wear masks, impersonate others and blend in seamlessly. For Baggenstos, a very real mission is securing cloud infrastructures — provided configurations are reviewed on a regular basis.

You don’t need to be a secret agent. At Baggenstos, alarm bells start ringing figuratively speaking when a customer’s database suddenly becomes publicly accessible on the internet. What may seem practical from a developer’s home-office perspective quickly turns into a nightmare for cybersecurity teams — and an open attack surface for digital crime.

Dormant Attack Surface

One incorrect tick here, one faulty entry there: according to Microsoft, over 80 per cent of all attacks are caused by cloud infrastructure misconfigurations. A silent epidemic, so to speak. Security misconfigurations rank second in the OWASP Top Ten 2025. The figures are alarming: 23% of all cloud security incidents result from misconfigurations, with human error being the root cause in 82% of cases.

Hackers are logging in — increasingly targeting Identity and Access Management (IAM) to take over legitimate accounts. According to Microsoft’s own Digital Defense Report, weak or missing identity controls are now the leading cause of compromises.

Depending on the service provider agreement, customers often retain partial responsibility for secure operations. In day-to-day practice, however, security concerns are frequently sacrificed for convenience, resulting in configurations that should never be permitted from a security standpoint. In his daily work, Baggenstos CTO Eckhard Neuhaus repeatedly encounters the same issues: publicly exposed endpoints, over-privileged roles and incorrect permission assignments.

Close to the Customer, Precise in Analysis

«A problem that must be addressed consistently through clear processes», says the CTO. Baggenstos’ strategy is built on two pillars «secure configuration» and continuous monitoring. Automation and clear policies reduce the risk of human error. Permissions, for example, should be granted and revoked dynamically rather than assigned permanently. Highly privileged access requires an approval workflow.

Baselines or reference values based on established frameworks define the target state, while deviations are continuously monitored. Baggenstos uses several tools for this purpose, including the Microsoft Defender Suite with Secure Score as a core component, as well as Darktrace / Cloud for real-time alerts in case of policy violations. «Cloud misconfigurations are not purely a technical issue», Eckhard Neuhaus emphasises. This is where the Baggenstos team’s close relationship with customers proves invaluable.

Through in-depth workshops, organisations are assessed for weaknesses across their IT infrastructure and underlying processes. Understanding how people work and how processes function enables the right decisions when designing a cloud security architecture. «Security has to be lived», says Eckhard Neuhaus. «It can be uncomfortable at times — but with the wrong configuration, a seemingly productive solution can quickly turn into a cybersecurity nightmare.»

Is your IT running in ‘Security Mode’?

Not sure? We’d be happy to show you the pillars of our cloud security approach

Register now b.Secure Workshop
Previous article

b.Secure Login Security: Goodb...

Next article

Master the risks of your IT sl...

Newsletter

Support

  • Services
    • Consulting Services
      • Lift and Shift
      • Security Workshop
      • Azure AVD Assessment
      • Azure Landingzone
      • Modern Workplace
      • Azure Migration & Modernization
      • Coding-as-a-Service
      • Cloud Readiness Workshop
    • Managed Services
      • Azure Billing
      • Azure Backup
      • Azure Site Recovery
      • Operation Care
      • Managed Azure Workplace
  • Technology
    • Microsoft 365 & Co
    • Azure
    • Videos: briefly explained
    • Cloud-PC
    • Microsoft Copilot
    • Security: Overview
  • References
  • Company
    • About
    • 100 years Baggenstos
      • 100 years Baggenstos
      • 100 Jahre in Bildern
      • Videos: briefly explained
    • Team
    • Why Baggenstos
    • Certifications
      • Certifications
    • Baggiwood
  • News
    • Videos: briefly explained
    • Webinars
  • Career
    • Data Protection
    • Impressum
    • Terms

Folgen Sie uns auf: LinkedIn / Youtube / Instagram / Facebook / X

 
© 2026

A. Baggenstos & Co. AG