Automated Conformity Verification Concept for Cloud Security

Martseniuk, Y. and Partyka, A. and Harasymchuk, O. and Korshun, Natalia (2024) Automated Conformity Verification Concept for Cloud Security Cybersecurity Providing in Information and Telecommunication Systems 2024, 3654. pp. 25-37. ISSN 1613-0073

[thumbnail of Y_Martseniuk_A_Partyka__Harasymchuk_N_Korshun_CPITS_3654_2024.pdf] Text

Download (637kB)


The primary objective of this research is to develop an advanced automated method for configuring and managing public cloud accounts and subscriptions on prominent platforms such as AWS, GCP, and Azure. This method involves the application of standardized configurations to ensure optimal performance and security compliance. A significant component of this methodology is the intermittent scanning of the infrastructure of these cloud accounts and subscriptions. This scanning is meticulously designed to identify and address any deviations or non-compliance issues with globally recognized security standards, including NIST 800-53, ISO 27001, HIPAA, and PCI DSS. The approach leverages cutting-edge automation technologies to streamline the deployment and management of cloud resources. By automating the application of configurations, the method aims to reduce manual effort, minimize the likelihood of human error, and enhance operational efficiency. This automation extends to the continuous monitoring and auditing processes, enabling real-time detection of configuration drifts or security vulnerabilities. Furthermore, the research delves into the development of a dynamic, responsive system capable of adapting to the evolving requirements of cloud security. The automated scanning component plays a pivotal role in this aspect, providing ongoing assurance that the cloud environments adhere to the strictest security protocols and standards. Continuous compliance monitoring is critical in today’s ever-changing digital landscape, where threats to data security and privacy are increasingly sophisticated. By integrating these automated processes, the proposed method promises not only to bolster the security posture of cloud environments but also to offer a scalable, efficient solution for cloud infrastructure management. This automated approach is poised to set a new standard in cloud management, aligning with best practices in IT security and compliance, and paving the way for more secure, manageable, and efficient cloud computing practices.

Item Type: Article
Uncontrolled Keywords: Hosting; security standards; automation; cloud technologies; cloud service models
Subjects: Статті у базах даних > Scopus
Divisions: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Depositing User: Павло Миколайович Складанний
Date Deposited: 09 Apr 2024 07:11
Last Modified: 09 Apr 2024 07:11

Actions (login required)

View Item View Item