> If cloud service providers are the only ones who can get security right
I don't understand. First of all, it seems to me that if you're using cloud services, you have already taken some steps away from security. For one thing, you have your service and/or data on a system that is accessible remotely...over the public Internet. For another, the service/data is on machines controlled by some other organization. I'm not saying this isn't acceptable ever, but I am saying that this isn't obviously getting security right.
But maybe it's not really "getting security right", but only "getting zero trust right". That leads me to my second point: If the cloud providers can do it, why couldn't it be done by others?
The article makes the point that it's all very complex and everything needs to be tracked and authenticated. I'm sure this isn't already universally done, but is it really that hard? Every organization I've ever worked at already authenticated users. Only authenticated users have access to most resources. Source code, documentation, and, in many cases, configuration parameters can only be altered by authenticated users, and a log is kept of what was changed when and by whom. A lot of what I understand the article to be asking for seems to already be in place.
Then we get to:
> The hardware stack is controlled by the cloud service providers. For the most part the CSPs build their own hardware and theyâ(TM)ve even been building their own CPUs. They build their own network devices, NVMe SSDs and motherboards.
I don't think this is quite true. As far as I know, cloud providers generally use commercially available CPUs (with some widely publicized security vulnerabilities, no less) and use commercially available SSDs.
> There is a single software stack that they control and, for the most part, they write themselves
I would be shocked if this were true. As far as I know, these software stacks are largely built from open source software (hi, Linux!). To the extent that the stack is open source, nothing prevents a not-cloud-provider from using the very same software. To the extent that the stack is not open source, I'm not sure that should inspire more confidence in its security. Besides, "software stack that they control" sounds nice, but I guarantee you that the software stack is too complex for anyone to really vouch for its security.
> They do not have to have network monitoring, multi-factor monitoring, OS monitoring, etc.
I am not sure why the author thinks this is true.
All in all, I understand the idea that not every organization has the budget and competence to make sure everything they do is subject to all the authentication, audits, updates, monitoring, and logging you might wish for. But the problem with using a cloud service provider to handle this for you is that they really can't; you need to access the cloud somehow, which means you will have some hardware that runs software, and users that need to be authenticated, have their authorization revoked when appropriate, etc. At best, you can outsource part of it all to the cloud service provider...but it does require that you trust the cloud service provider to do their part of the job. At that point, is it really zero trust anymore?