May 20 – 22, 2025 | New York University in New York, NY

Cloud Security Maturity Models: It’s Not Just for Data Lakes and Research Data

— Back to the Cloud Forum Schedule

By James Monek – Director of Technology Infrastructure & Operations at Lehigh University

Estimated reading time: 3 minutes

There is a misconception that we don’t handle sensitive data, so we don’t need a security framework. As with security in general, cloud security is everyone’s responsibility, even if you do not handle protected data or store institutional data in the cloud. You are leveraging the cloud for some services and if you misconfigure those services or forget to patch for vulnerabilities, threat actors will leverage those services for their malicious behavior, including coming back to your network where they can move laterally. 

Cloud Security Maturity Models (CSMMs) offer a structured, strategic way to assess where you are today and plan where you need to go next. As institutions expand their cloud footprints, build dedicated teams, and adopt new tooling, maturity models can guide that growth securely and intentionally.

What Do These Maturity Models Typically Look Like?

While different frameworks use different terminology, they generally align along five levels of increasing maturity:

Depending on which cloud provider(s) you are using, there are several models to consider below, including an open model.

Take some time to explore these models before the workshop.

Reflect on the following:

You don’t have to be operating in a highly regulated environment to take cloud security seriously. Maturity models aren’t just for checking compliance boxes, they’re about building trust, reducing risk, and scaling your cloud efforts with confidence.