That's not necessarily true if you use the appropriate tools and controls to safeguard data. Further, "any cloud" is a sweeping generalization and not all clouds are created equal. You raise valid concerns about trusting third-party hardware BUT.. come on, ease up on the alarmism.
To elaborate: robust encryption, dedicated hardware security modules (HSMs), and sophisticated key management safeguards data even if it resides on someone elses hardware.
If you design your system properly, even if the cloud provider manages the underlying hardware, your secrets remain secure because the keys and sensitive data are protected in a controlled, isolated environment.
To elaborate: robust encryption, dedicated hardware security modules (HSMs), and sophisticated key management safeguards data even if it resides on someone elses hardware.
If you design your system properly, even if the cloud provider manages the underlying hardware, your secrets remain secure because the keys and sensitive data are protected in a controlled, isolated environment.