THE PERILS AND DEFENSES OF ENTERPRISE CLOUD COMPUTING: A COMPREHENSIVE REVIEW

  • Arjun Reddy Kunduru Independent Researcher, Orlando, FL, USA
Keywords: Cloud Computing, Security, ERP, Risk Management, Security Matrix

Abstract

Cloud computing enables convenient, on-demand access to computing resources over the internet. While providing agility and cost savings, migrating to the cloud also introduces major security concerns that must be evaluated and mitigated appropriately. This extensive article examines the concept of enterprise cloud security, surveys key threats and vulnerabilities in depth, summarizes solutions and best practices, and weighs the tradeoffs of cloud security compared to on-premises models. It provides a comprehensive reference for securing the enterprise cloud.

References

Markets and Markets, "Cloud Computing Market," 2021.

T. Hunt, "Threats to cloud computing: The top 8 according to ENISA," Business Insights, 2021.

K. Nichols, "Enterprise Cloud Security: Best Practices and Tools," Business News Daily, 2022.

S. Perozzi, "Why cloud security is critical for business protection," Varonis, 2021.

K. Grant, "Top cloud computing compliance standards and how to achieve them," Inside Out Security, 2022.

Q. Zhang et al., "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, 2010.

K. Rigolini, "The Worst Data Breaches of 2021 So Far," Security Intelligence, 2021.

K. Rigolini, "The Biggest Ransomware Attacks of 2021 So Far," Security Intelligence, 2021.

R. Mogull, T. Witt, "Gartner Market Guide for Cloud Workload Protection Platforms," Gartner, 2021.

D. Kennedy, "Lapsus Goes on Rampage Against the Tech Industry," Threat post, 2022.

A. Kovacs, "Record-Breaking DDoS Attack Hits 1580 Mpbs," Security Week, 2022.

L. Columbus, "10 Ways to Protect Your Cloud Environment From A Denial of Service Attack," Forbes, 2022.

J. Cappos, "Small vulns in Microsoft cloud services enabled the SolarWinds hack: US Senate," The Record, 2021.

A. Baliga et al., "Amazon S3 bucket exploitation via cloud metadata APIs," High Cloud Security, 2020.

OWASP, "API Security Top 10", OWASP Foundation, 2019.

Microsoft, "Microsoft Digital Defense Report," Microsoft, 2020.

S. Morgan, "Cybercrime To Cost The World $10.5 Trillion Annually By 2025," Cybercrime Magazine

Beekman et al., "Identity security threats and trends 2020–2021," Microsoft, 2021.

K. Zetter, "An Unprecedented Look at Stuxnet, the World's First Digital Weapon," Wired, 2014.

DHS CISA, "Joint CSA/FBI Cybersecurity Advisory on MFA to Prevent Ransomware Attacks," CISA, 2022.

P. Ducklin, "Serious Security: Brute Force Crypto Mining, Password Reuse, and Abuse of Cloud Services," Sophos Naked Security, 2018.

R. Ent, "Security risks inherent with cloud computing approaches," Microsoft, 2017.

Palo Alto Networks, "Cloud Security Best Practices," Palo Alto Networks, 2022.

E. Cole, "Forrester Wave Enterprise Cloud Identity and Access Management Q4 2020," Forrester, 2020.

K. Kavis, "With CIEM, CIOs Have A New Ally In The Cloud Security Battle," Forrester, 2022.

J. Cappos, D. Polukarov, "Cloud Security Posture Management Services Market: Global Forecast to 2026," Markets and Markets, 2021.

K. Nichols, "Enterprise Cloud Security: Best Practices and Tools," Business News Daily, 2022.

AWS, "AWS Shared Responsibility Model," Amazon Web Services, 2022.

Netskope, "2021 Cloud and Threat Report," Netskope Threat Labs, 2021.

Published
2023-09-20
How to Cite
Arjun Reddy Kunduru. (2023). THE PERILS AND DEFENSES OF ENTERPRISE CLOUD COMPUTING: A COMPREHENSIVE REVIEW. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 4(9), 29-41. Retrieved from https://cajmtcs.centralasianstudies.org/index.php/CAJMTCS/article/view/515
Section
Articles