Cloudanix Joins AWS ISV Accelerate Program

Trust as the Invisible Perimeter: Building a Culture of Security at Scale

Discover why culture beats tools in modern cybersecurity. Learn to move from the 'Department of No' to the 'Path to Yes' using trust, real-time audits, and empathy.

In the early 2000s, cybersecurity was often a small team tucked away inside an IT department. Today, it is a multi-billion-dollar industry and a mandatory topic for board-level discussions. However, as the technical landscape becomes more complex with cloud, mobile, and IoT technologies, the most critical factor for a successful security program is often the most underrated: Trust.

We sat down with Sandeep Agarwal, a security specialist at Google Cloud with two decades of experience across audit, compliance, and risk management. Sandeep shared his insights on why culture beats tools, how to move from being the “Department of No,” and why the cloud requires a shift from periodic audits to real-time awareness.

You can read the complete transcript of the epiosde here >

Defining Trust: Consistency and Control

Many security leaders are fixated on the latest, “fanciest” tools, but Sandeep argues that a good security culture is the true foundation of safety. He defines trust as being gained through two primary avenues:

  • Consistency: Trust is established when teams observe a long-term alignment between what a security team says and what they actually do.
  • Relinquishing Control: Security teams often fall into the trap of over-imposing restrictions (such as blocking news or social media), which breeds resentment. True trust is built by giving control back to teams and relying on their good judgment.

As the saying goes, it can take 20 years to build a reputation and only five minutes to ruin it.

Bridging the Gap: Moving to the “Path to Yes”

A common structural failure in organizations is the “isolation of objectives”. While CEOs generally care about increasing revenue, decreasing costs, and reducing risk, individual teams often work at cross-purposes :

  • Business units focus solely on revenue.
  • Operations focus on cost reduction.
  • Security and risk teams focus exclusively on eliminating risk.

This mindset creates a culture where teams feel they can only succeed at the expense of others. To solve this, Sandeep recommends adopting a partner mindset. Security should not be a “Department of No”. Instead, security professionals should provide a “Path to Yes,” outlining the specific conditions or guardrails required to make a business initiative safe. The ultimate goal of any program should be to maximize business value at a minimum risk and minimum cost.

The Virtuous Cycle: Blameless Postmortems

Security is a field that is often only “felt” when it fails. How an organization handles an incident defines its culture.

  • Avoid the Blame Game: If you look for a “proverbial neck to hang” when an employee makes a mistake, people will stop reporting incidents.
  • Celebrate the Messenger: Organizations should make it extremely easy to raise an alarm and celebrate those who do, even if the alarm turns out to be false.
  • Blameless Postmortems: Focus on why something happened rather than who did it. This fosters a “virtuous cycle” where transparency improves the collective security posture.

Modernizing Awareness: Tech Over Training

Sandeep is notably critical of traditional, hour-long security awareness training, which most users find miserable. He suggests that modern technology can “minimize the cognitive load” on users, effectively solving the problems that training aims to address:

  • Phishing: Implementing FIDO-compliant hardware security keys provides phishing-resistant MFA, potentially eliminating the need for traditional phishing training.
  • Passwords: Passkeys and passwordless authentication remove the burden of creating and rotating complex passwords.
  • Data Leakage: Using cloud-native document sharing (sending links instead of attachments) ensures that even if an email is sent to the wrong person, no data is leaked unless they are explicitly granted access.

Security Boundaries and Real-Time Audits

Implementing the Principle of Least Privilege is essential but difficult. For technical resources, Infrastructure as Code (IaC) is the best tool because it allows an organization to define exactly what is allowed and disallowed in an environment.

For human users, Sandeep recommends a data-driven approach:

  • Start Broad, then Narrow: Give wider permissions initially, then use policy intelligence tools to analyze historical activity. If a user only uses 70 out of 4,000 granted permissions, the policy can be intelligently narrowed down.
  • Environment Specificity: Production environments should be highly risk-averse, while innovation sandboxes and dev-test environments should be liberal to encourage productivity.

Crucially, the cloud requires real-time auditing. Traditional periodic audits (every 6–12 months) are ineffective because the cloud is a “living, breathing animal”. By the time an offline spreadsheet checklist is remediated, the cloud environment has likely changed by 50-60%.

Compliance is a Milestone, Not a Destination

There is a common debate regarding compliance vs. security. Sandeep views certifications (like SOC 2 or HIPAA) as milestones and “checkpoints to benchmark yourself against the industry”. While they provide a necessary structure to otherwise nebulous risk management and build trust with external stakeholders, they do not equal 100% security. You can be compliant while still being “horrible in security”. Ultimately, the goal is risk management, not a “bunch of paper”.

Related Reads

Comprehensive cloud security platform covering code to cloud protection

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Feb 10, 2026

The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity

Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app

Read More

Thursday, Feb 05, 2026

CSPM vs. CNAPP: Navigating Cloud Security Evolution for Modern Enterprises

The shift to cloud-native architectures represents a fundamental change in how applications are designed, built, and dep

Read More

Thursday, Jan 22, 2026

Top 10 Identity and Access Management Solutions

Identity and Access Management (IAM) has traditionally been considered one of the boring parts of security. But with the

Read More