The primary objective of this research is to develop an advanced automated method for configuring and managing public cloud accounts and subscriptions on prominent platforms such as AWS, GCP, and Azure. This method involves the application of standardized configurations to ensure optimal performance and security compliance. A significant component of this methodology is the intermittent scanning of the infrastructure of these cloud accounts and subscriptions. This scanning is meticulously designed to identify and address any deviations or non-compliance issues with globally recognized security standards, including NIST 800-53, ISO 27001, HIPAA, and PCIDSS.
The approach leverages cutting-edge automation technologies to streamline the deployment and management of cloud resources. By automating the application of configurations, the method aims to reduce manual effort, minimize the likelihood of human error, and enhance operational efficiency. This automation extends to the continuous monitoring and auditing processes, enabling real-time detection of configuration drifts or security vulnerabilities. Furthermore, the research delves into the development of a dynamic, responsive system capable of adapting to the evolving requirements of cloud security. The automated scanning component plays a pivotal role in this aspect, providing ongoing assurance that the cloud environments adhere to the strictest security protocols and standards.
Continuous compliance monitoring is critical in today’s ever-changing digital landscape, where threats to data security and privacy are increasingly sophisticated. By integrating these automated processes, the proposed method promises not only to bolster the security posture of cloud environments but also to offer a scalable, efficient solution for cloud infrastructure management. This automated approach is poised to set a new standard in cloud management, aligning with best practices in IT security and compliance, and paving the way for more secure, manageable, and efficient cloud computing practices.
- Hashmi Ahtisham & Ranjan Aarushi & Anan Abhineet. (2018). Security and Compliance Management in Cloud Computing. International Journal of Advanced Studies in Computer Science and Engineering (2278-7917). 7. 47–54. Available at: https://www.researchgate.net/publication/323081755_Security_and_Compliance_Management_in_ Cloud_Computing
- Lakhno V., Kozlovskii V., Boiko Y., Mishchenko A., & Opirskyy I. (2017). Management of information protection based on the integrated implementation of decision support systems. Eastern-European Journal of Enterprise Technologies, 5(9 (89), 36–42. DOI: 10.15587/1729-4061.2017.111081
- Susukailo V., Opirskyy I. and Vasylyshyn S. Analysis of the attack vectors used by threat actors during the pandemic (2020) IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), Zbarazh, Ukraine, 2020, pp. 261–264. DOI: 10.1109/CSIT49958.2020.9321897
- What is cloud security? Available at: https://www.microsoft.com/uk-ua/security/business/security-101/what-is- cloud-security
- Vakhula O., Opirskyy I., Mykhaylova O. Research on Security Challenges in Cloud Environments and Solutions based on the security-as-Code Approach, Workshop on Cybersecurity Providing in Information and Telecommunication Systems II, vol. 3550, (2023) 55–69. Available at: https://ceur-ws.org/Vol-3550/
- Kalra Sanchi & Atal Kunal & Jain Rachna. (2017). Security Issues in Cloud Computing. International Journal of Computer Applications. 167. 37–41. DOI: 10.5120/ijca2017914190
- Sreedharan Sherin (2013). Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework. IOSR Journal of Computer Engineering. 10. 33–37. DOI: 10.9790/0661-01043337
- Sharma Deepak & Dhote Chandrashekhar & Potey Manish. (2013). Security-as-a-Service from Clouds: A Comprehensive Analysis. International Journal of Computer Applications. 67. 15–18. DOI: 10.5120/11374-6642
- Shevchuk D., Harasymchuk O., Partyka A., Korshun N. Designing Secured Services for Authentication, Authorization, and Accounting of Users, Workshop on Cybersecurity Providing in Information and Telecommunication Systems II, vol. 3550, (2023) 217–225. Available at: https://ceur-ws.org/Vol-3550/
- Chirra Prudhvi & Kumar Vineeth. (2023). Multi-cloud networking: investigating strategies and tools for networking in multi-cloud environments. DOI: 10.13140/RG.2.2.11542.93768
- Inap. (2020, December 15). What are the Differences Between IaaS, PaaS and SaaS? INAP. Available at: https://www.inap.com/blog/iaas-paas-saas-differences/
- Choi Brendan & Medina Erwin. (2023). Setting Up an Ansible Learning Environment. DOI: 10.1007/978-1- 4842-9624-0_4
- Choi Brendan. (2021). Introduction to Python Network Automation: The First Journey. DOI: 10.1007/978-1- 4842-6806-3
- Sabharwal Navin & Pandey Sarvesh & Pandey Piyush. (2021). Infrastructure-as-Code Automation Using Terraform, Packer, Vault, Nomad and Consul: Hands-on Deployment, Configuration, and Best Practices. DOI: 10.1007/978-1-4842-7129-2
- National Institute of Standards and Technology (NIST). (Latest Update Year). “NIST Special Publication 800- 53: Security and Privacy Controls for Federal Information Systems and Organizations.” [Online]. Available at: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
- Edwards K., & Riis J. (2004). Expected and Realized Costs and Benefits from Implementing Product Configuration Systems., 216–231. DOI: 10.4018/978-1-60566-260-2.CH012
- Dawson John & Twum Frimpong & Acquah James & Missah Yaw. (2023). PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud. Security and Communication Networks. 2023. 1–17. DOI: 10.1155/2023/9210803
- Catescu Georgeta. (2018). Detecting insider threats using Security Information and Event Management (SIEM). DOI: 10.13140/RG.2.2.11716.99200
- Spinellis Diomidis. (2014). Service Orchestration with Rundeck. Software, IEEE. 31. 16–18. DOI: 10.1109/MS.2014.92
- Rajavaram Harika & Rajula Vineet & BalasubramanianThangaraju. (2019). Automation of Microservices Application Deployment Made Easy By Rundeck and Kubernetes. 1–3. DOI: 10.1109/CONECCT47791.2019.9012811
- HashiCorp. (Latest Update Year). Vault by HashiCorp. [Online]. Available at: https://www.vaultproject.io/
- Maksymovych V., Shabatura M.; Harasymchuk O., Shevchuk R., Sawicki P., Zajac T. Combined Pseudo- Random Sequence Generator for Cybersecurity. Sensors 2022, 22, 9700. DOI: 10.3390/s22249700
- Maksymovych V., Nyemkova E., Justice C., Shabatura M., Harasymchuk O., Lakh Y., Rusynko M. Simulation of Authentication in Information-Processing Electronic Devices Based on Poisson Pulse Sequence Generators. Electronics. (2022); 11(13):2039. DOI: 10.3390/electronics11132039
- Maksymovych V., Shabatura M., Harasymchuk O., Karpinski M., Jancarczyk D., Sawicki P. Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs. Appl. Sci. (2022), 12(3), 1519. DOI: 10.3390/app12031519
- Riti Pierluigi & Flynn David. (2021). Vault HCL. DOI: 10.1007/978-1-4842-6634-2_7
- ITSM – IT Service Management Solution of your business. Available at: https://www.creatio.com/page/itsm-system
- Maes Stephane & team, IFS. (2023). ITSM beyond IT. Take the service experience to new heights. IFS. Available at:https://www.researchgate.net/publication/372217278_ITSM_beyond_IT_Take_the_service_experience_to_new_heights
- What is a REST API? Available at: https://www.redhat.com/en/topics/api/what-is-a-rest-api
- Williams Brad & Tadlock Justin & Jacoby John. (2020). REST API. DOI: 10.1002/9781119666981.ch12