
What We Prevent: The Four Layers
What We Prevent: The Four Layers
Prevention-first cloud security uses four layers of preventive controls to stop misconfigurations before they create risk. Each layer operates differently, prevents different categories of issues, and has distinct strengths. Understanding what each layer prevents and how they complement each other is essential for building comprehensive prevention coverage.
Most organizations already have some preventive controls deployed. IaC scanning in a few repositories. Organization policies blocking the most critical risks. Account-level encryption defaults. Runtime auto-remediation for specific issues. These scattered controls provide value, but they leave gaps. Comprehensive prevention requires intentional coverage across all four layers.
These are the four layers of preventive controls: Build controls catch issues in code, Access controls block risky actions, Config controls make resources secure by default, and Runtime controls auto-fix drift. Together, they create overlapping prevention coverage where issues that bypass one layer get caught by others.
1. Build Controls: Prevention in Code
Build controls catch misconfigurations in Infrastructure-as-Code templates before deployment. This is prevention at the earliest possible stage. Issues found during code review never reach cloud environments, never create risk, and never require coordination across teams to fix.
Infrastructure-as-Code scanning analyzes templates for security issues. Terraform, CloudFormation, Azure Resource Manager templates, Google Cloud Deployment Manager, Pulumi, and Kubernetes manifests all get scanned. Scanning tools like Checkov, tfsec, Trivy, Terrascan, and cloud-native offerings identify misconfigurations in templates: unencrypted storage, overly permissive s
2. Access Controls: Organization-Wide Policy Enforcement
Access controls prevent issues through organization-level policies that block risky actions at the API level. These policies enforce across all cloud accounts, regions, and users. They create boundaries on what's possible regardless of how resources get created-whether through IaC, console, CLI, SDK, or third-party tools.
AWS Service Control Policies, Azure Policy, and GCP Organization Policies are the primary access control mechanisms. These policies attach to organizational units, subscriptions, or folders and enforce on all child accounts. A policy preventing public S3 bucket creation applies to every account in the organizatio
3. Config Controls: Secure Defaults
Config controls prevent issues by making resources secure by default through account and service settings. When properly configured, security becomes automatic. Developers don't need to remember to enable encryption or block public access. The account or service configuration does it automatically for all new resources.
AWS account-level settings like S3 Public Access Block and EBS encryption by default are archetypal config controls. Enable S3 Public Access Block at the account level and all new buckets in that account are private by default. Enable EBS encryption by default and all new volumes get encrypted automatically. Developers create resources
4. Runtime Controls: Continuous Monitoring and Auto-Remediation
Runtime controls prevent issues from persisting by continuously monitoring for drift and automatically remediating misconfigurations. Even if issues bypass build controls, access controls, and config defaults, runtime controls detect and correct them within minutes. Resources stay compliant continuously rather than drifting until the next manual scan.
Runtime monitoring evaluates resources against security policies continuously. Tools like Turbot Guardrails, AWS Config with auto-remediation, Azure Policy with remediation tasks, Cloud Custodian, or custom automation monitor resource configurations. When a resource drifts fro
Defense in Depth: How the Four Layers Work Together
The four layers of preventive controls create overlapping defense. Issues that bypass one layer get caught by others. This defense in depth means no single control failure creates exposure. Multiple layers must all fail simultaneously for a misconfiguration to reach production and persist.
Consider how the four layers prevent a public S3 bucket:
Build controls scan the IaC template during pull request. If the template specifies public access, scanning tools flag the issue. Developer fixes the template before merging. Issue prevented at the earliest stage.
Access controls block the bucket creation API call if it specifies
Coverage Patterns and Strategic Deployment
Organizations typically deploy the four layers in different orders based on their starting point and constraints:
Access-first pattern: Organizations with mature cloud architecture teams often start with access controls. Organization policies can be deployed centrally without requiring changes to development workflows. They enforce universally across all accounts immediately. Quick wins demonstrate prevention value before expanding to other layers.
Build-first pattern: Organizations with strong DevOps practices and high IaC coverage often start with build controls. They already use CI/CD pipelines where scanning integrates naturally
Key Takeaways
- The four layers of preventive controls define what we prevent: Build controls catch issues in code, Access controls block risky actions, Config controls make resources secure by default, and Runtime controls auto-fix drift.
- Each layer has distinct strengths and limitations. Comprehensive prevention requires coverage across all four layers rather than perfect coverage in one layer.
- Defense in depth emerges from overlapping controls. Issues that bypass one layer get caught by others. Multiple control failures must align simultaneously for misconfigurations to reach production and persist.
- Organizations deploy the four layers in different orders ba
What's Next
These four layers of preventive controls form the what behind prevention-first security: the specific mechanisms that stop misconfigurations before they create risk.
For a complete overview of the prevention-first framework, see Prevention 101.
To understand the other components:
- The Prevention-First Manifesto: Core values and principles
- Why We Prevent: The six benefits of prevention
- How We Prevent: The five practices for implementing prevention
- **[What is PSPM?](/preven