Automated Conformity Verification Concept for Cloud Security

Martseniuk, Y. та Partyka, A. та Harasymchuk, O. та Korshun, Natalia (2024) Automated Conformity Verification Concept for Cloud Security Cybersecurity Providing in Information and Telecommunication Systems 2024, 3654. с. 25-37. ISSN 1613-0073

[thumbnail of Y_Martseniuk_A_Partyka__Harasymchuk_N_Korshun_CPITS_3654_2024.pdf] Текст
Y_Martseniuk_A_Partyka__Harasymchuk_N_Korshun_CPITS_3654_2024.pdf

Download (637kB)
Офіційне посилання: https://ceur-ws.org/Vol-3654/

Анотація

The primary objective of this research is to develop an advanced automated method for configuring and managing public cloud accounts and subscriptions on prominent platforms such as AWS, GCP, and Azure. This method involves the application of standardized configurations to ensure optimal performance and security compliance. A significant component of this methodology is the intermittent scanning of the infrastructure of these cloud accounts and subscriptions. This scanning is meticulously designed to identify and address any deviations or non-compliance issues with globally recognized security standards, including NIST 800-53, ISO 27001, HIPAA, and PCI DSS. The approach leverages cutting-edge automation technologies to streamline the deployment and management of cloud resources. By automating the application of configurations, the method aims to reduce manual effort, minimize the likelihood of human error, and enhance operational efficiency. This automation extends to the continuous monitoring and auditing processes, enabling real-time detection of configuration drifts or security vulnerabilities. Furthermore, the research delves into the development of a dynamic, responsive system capable of adapting to the evolving requirements of cloud security. The automated scanning component plays a pivotal role in this aspect, providing ongoing assurance that the cloud environments adhere to the strictest security protocols and standards. Continuous compliance monitoring is critical in today’s ever-changing digital landscape, where threats to data security and privacy are increasingly sophisticated. By integrating these automated processes, the proposed method promises not only to bolster the security posture of cloud environments but also to offer a scalable, efficient solution for cloud infrastructure management. This automated approach is poised to set a new standard in cloud management, aligning with best practices in IT security and compliance, and paving the way for more secure, manageable, and efficient cloud computing practices.

Тип елементу : Стаття
Ключові слова: Hosting; security standards; automation; cloud technologies; cloud service models
Типологія: Статті у базах даних > Scopus
Підрозділи: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Користувач, що депонує: Павло Миколайович Складанний
Дата внесення: 09 Квіт 2024 07:11
Останні зміни: 09 Квіт 2024 07:11
URI: https://elibrary.kubg.edu.ua/id/eprint/48589

Actions (login required)

Перегляд елементу Перегляд елементу