Academic literature on the topic 'Cloud Security Posture Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud Security Posture Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud Security Posture Management"

1

Journal, of Global Research in Electronics and Communications. "Cloud Security Posture Management: Tools and Techniques." Journal of Global Research in Electronics and Communications 1, no. 4 (2025): 1–6. https://doi.org/10.5281/zenodo.15115056.

Full text
Abstract:
Cloud Security Posture Management (CSPM) is important for the maintenance of secured cloud infrastructure; CSPM has two main areas of focus: the assessment of cloud security setup and making improvements during the delivery of services. With the exponential growth in cloud's widespread adoption across sectors, proactive data protection against breaches and misconfigurations, as well as compliance violations, has become critical. CSPM tools help organizations identify security vulnerabilities and bridge compliance lines, as well as enable automated remediation strategies. Research provides perspective on major CSPM development within present-day computing through analysis on core protections technologies applicable to cloud systems. The research focuses on challenges in CSPM implementation followed by problem-solving, particularly with regard to complex policy management within a landscape of limited standards and interoperability issues. The research is conducted to gain insights regarding assessment to CSPM measures, as well as the potential upside to cloud infrastructure security, as well improvements to cloud practices from an organizational level. The research examines practical applications of automated remediation disciplines and areas of continuous security monitoring related to their use in CSPM deployments.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Ashish Kumar. "Cloud Security Posture Management in Server-less Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1248–53. https://doi.org/10.22214/ijraset.2025.72290.

Full text
Abstract:
The widespread adoption of server-less computing models, characterized by their event-driven architectures and finegrained resource abstraction, has introduced novel security challenges that traditional Cloud Security Posture Management (CSPM) solutions are ill-equipped to address. In server-less environments, the ephemeral nature of functions, coupled with complex inter-dependencies and rapid deployment cycles, exacerbates risks associated with misconfigurations, privilege escalation, insecure APIs, and insufficient monitoring. This paper examines the evolution of CSPM methodologies in response to the distinct operational paradigms of server-less computing. It highlights the necessity for continuous, function-level security assessments, automated detection of policy violations, and the integration of CSPM with Infrastructure-as-Code pipelines to enforce security best practices at deployment time. Furthermore, the study explores the incorporation of machine learningdriven anomaly detection to identify deviations in server-less function behavior indicative of potential threats. Through a comprehensive analysis of current CSPM tools and frameworks, this paper identifies critical gaps in existing approaches and proposes architectural considerations for CSPM systems optimized for server-less workloads. The findings underscore the imperative for dynamic, context-aware CSPM strategies that can adapt to the transient and distributed nature of server-less applications, while maintaining compliance with established security standards such as CIS Benchmarks, NIST guidelines, and GDPR regulations. As organizations increasingly migrate to multi-cloud and hybrid infrastructures, an evolved CSPM framework becomes central to preserving security, governance, and operational resilience. This research contributes to the growing discourse on securing next-generation cloud-native applications through proactive posture management tailored to the unique characteristics of server-less environments.
APA, Harvard, Vancouver, ISO, and other styles
3

G Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.

Full text
Abstract:
As organizations increasingly adopt multi-cloud environments and containerized applications to improve scalability and operational efficiency, managing security across these diverse platforms has become a critical challenge. Traditional security tools and manual processes are insufficient to handle the complexity and dynamic nature of modern cloud infrastructures. This research introduces Cloud Guardian, a cloud security posture management (CSPM) platform that automates security assessments, policy enforcement, and threat detection across multi-cloud platforms and containerized environments. Cloud Guardian addresses the key security challenges associated with multi-cloud and container environments, including misconfigurations, unpatched vulnerabilities, and inconsistent security policies. By integrating real-time threat intelligence and automated remediation capabilities, Cloud Guardian provides continuous protection, ensuring compliance with industry standards such as CIS and NIST. Additionally, the platform’s self-healing mechanisms and rollback capabilities allow for secure and uninterrupted operations by automatically fixing security issues and reverting changes if necessary. This study evaluates Cloud Guardian's effectiveness in securing complex cloud infrastructures through real-world case studies. The findings demonstrate significant improvements in operational efficiency, compliance, and security posture, reducing the risk of breaches and operational disruptions. Cloud Guardian offers a scalable and automated solution for organizations seeking to safeguard their cloud and container environments while minimizing manual intervention and ensuring continuous security and compliance.
APA, Harvard, Vancouver, ISO, and other styles
4

Rahman, Anisur, Md Ashrafuzzaman, Md Majadul Islam Jim, and Rebeka Sultana. "CLOUD SECURITY POSTURE MANAGEMENT AUTOMATING RISK IDENTIFICATION AND RESPONSE IN CLOUD INFRASTRUCTURES." ACADEMIC JOURNAL ON SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS EDUCATION 4, no. 3 (2024): 151–62. http://dx.doi.org/10.69593/ajsteme.v4i03.103.

Full text
Abstract:
Cloud Security Posture Management (CSPM) tools have become essential in addressing the growing security challenges faced by organizations as they migrate to cloud environments. This study explores the effectiveness of CSPM tools in automating the identification and response to security risks within cloud infrastructures, highlighting their role in reducing misconfigurations, improving compliance, and enhancing overall security posture. Through a mixed-method approach, combining a comprehensive literature review, a survey of IT security professionals, and detailed case study analyses, this research provides a robust evaluation of CSPM tools' capabilities and the challenges associated with their implementation. The findings reveal that organizations utilizing CSPM tools experience significant reductions in security incidents and operational inefficiencies, with automation playing a crucial role in enabling real-time threat detection and response. However, the study also identifies critical barriers to CSPM adoption, including integration complexities, cost concerns, and organizational resistance to automated security solutions. These challenges suggest that while CSPM tools offer substantial benefits, their successful deployment requires careful planning, adequate resource allocation, and strategic change management to address both technical and human factors. This study contributes to the existing literature by providing detailed insights into the practical applications and limitations of CSPM tools, offering valuable guidance for organizations seeking to enhance their cloud security strategies through automation.
APA, Harvard, Vancouver, ISO, and other styles
5

Santosh Datta Bompally. "Comprehensive approach to cloud security posture management: From infrastructure as code to AI-driven monitoring." Open Access Research Journal of Engineering and Technology 8, no. 2 (2025): 081–87. https://doi.org/10.53022/oarjet.2025.8.2.0046.

Full text
Abstract:
Cloud Security Posture Management (CSPM) has emerged as a critical framework for safeguarding multi-cloud environments against growing threats while maintaining operational efficiency. This article comprehensively examines CSPM evolution from fundamental principles to advanced capabilities leveraging artificial intelligence. The discussion encompasses four essential components: Infrastructure as Code scanning, Cloud Native Security, Reactive Security, and Security Monitoring, detailing how each contributes to a robust security framework. Integrating these components across the cloud lifecycle significantly reduces misconfigurations, improves compliance, and enhances threat detection capabilities. Exception management processes with appropriate governance structures ensure security policies remain practical and enforceable while maintaining appropriate risk levels. Incorporating AI-driven insights represents a paradigm shift, transforming reactive security approaches into predictive models capable of identifying complex attack paths and reducing alert fatigue. This integrated approach to cloud security posture management demonstrates substantial benefits in risk reduction, operational efficiency, and cost savings across various organizational contexts, making it an essential consideration for enterprises navigating complex cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
6

Srinivas Reddy Cheruku. "AI-Driven Security Posture Management: A Revolutionary Approach to Multi-Cloud Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 497–509. https://doi.org/10.32628/cseit25111237.

Full text
Abstract:
The landscape of cloud security has undergone a transformative evolution, driven by the complexity of modern digital infrastructures and the escalating sophistication of cyber threats. This comprehensive article explores an innovative AI-driven Cloud Security Posture Management (CSPM) framework that transcends traditional security methodologies. By leveraging advanced machine learning algorithms, neural network architectures, and intelligent automation, the framework offers a proactive, adaptive approach to cybersecurity that addresses the multifaceted challenges of multi-cloud environments. The article demonstrates how intelligent systems can dynamically analyze network interactions, predict potential vulnerabilities, and implement rapid, context-aware response mechanisms, fundamentally reshaping how organizations conceptualize and implement security strategies.
APA, Harvard, Vancouver, ISO, and other styles
7

Veeraballi, Vishnuvardhana Reddy. "UNDERSTANDING CLOUD SECURITY POSTURE MANAGEMENT (CSPM): A COMPREHENSIVE GUIDE." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 3168–79. https://doi.org/10.34218/ijrcait_08_01_228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goyal, Bhaskar. "Augmented Intelligence for Cloud Architects: AI-Powered Tools for Design and Management." European Journal of Computer Science and Information Technology 13, no. 6 (2025): 54–62. https://doi.org/10.37745/ejcsit.2013/vol13n65462.

Full text
Abstract:
Augmented intelligence represents a transformative paradigm for cloud architects, enhancing their capabilities through AI-powered tools across the entire cloud lifecycle. The integration of these technologies addresses the growing complexity of modern cloud environments, where performance isolation issues, multi-cloud deployments, and dynamic workloads create significant challenges. Through strategic implementation of machine learning algorithms, cloud architects gain substantial advantages in architecture design, cost management, security posture, and operational monitoring. The augmented intelligence approach maintains human judgment as the central decision-making authority while leveraging computational capabilities to process vast quantities of telemetry data, identify optimization opportunities, predict resource requirements, detect security vulnerabilities, and troubleshoot complex issues. This synergistic relationship between human expertise and artificial intelligence creates measurable improvements in resource utilization, cost efficiency, security posture, and operational stability. The transformative impact extends beyond mere efficiency gains to enable fundamentally more resilient and adaptive cloud architectures that respond dynamically to changing conditions while maintaining consistent performance under variable loads. By embracing these AI-powered tools, cloud architects can navigate increasingly complex environments with greater confidence while delivering enhanced business value through optimized cloud investments.
APA, Harvard, Vancouver, ISO, and other styles
9

Xing, Jingyu, and Zheng Zhang. "Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments." Security and Communication Networks 2022 (March 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/6783223.

Full text
Abstract:
This paper presents an in-depth study and analysis of hierarchical network security measurement and optimal active defense in the cloud computing environment. All the cloud platform security-related data collected through cloud platform monitoring is collected, and then the relevant security data is summarized and analyzed, so that the specific security posture index of the cloud platform can be derived, thus providing a reference for cloud platform managers to judge the security risks of the cloud platform. It provides a reference for cloud platform managers to judge the security risks of cloud platforms. Through the cloud platform security situation awareness system, we mainly study the construction of cloud platform, the construction of security situation awareness system, and the calculation of security situation value and use, thus greatly improving the stability, security, and reliability of the cloud platform. The application of the method avoids the drawbacks of traditional network security management, which relies entirely on past data and cannot sense changes in the security state of the system in real time. At the same time, the predicted results are added to the input of the fuzzy decision-making system, improving the accuracy of the assessment. The method improves the real-time and effectiveness of network security posture prediction, increases the convergence speed and prediction accuracy of the algorithm, and avoids the occurrence of overfitting. Simulation experiments based on the internet network security posture dataset show that this research method has less prediction error than the traditional machine learning methods and other deep learning methods, has higher learning efficiency, and is more rapid, accurate, and effective in predicting the trend of network security posture in the big data environment in the future period.
APA, Harvard, Vancouver, ISO, and other styles
10

Researcher. "EVALUATING THE EFFECTIVENESS OF CSPM TOOLS IN MULTI-CLOUD ENVIRONMENTS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 2074–85. https://doi.org/10.5281/zenodo.14333702.

Full text
Abstract:
This article examines the capabilities, difficulties, and potential of Cloud Security Posture Management (CSPM) solutions in multi-cloud systems to assess their efficacy. It examines how businesses use CSPM solutions from key cloud providers like AWS, Azure, and GCP, emphasizing important features like compliance management, policy standardization, and detection and response systems. The article highlights the role that CSPM technologies play in tackling the increasing complexity of multi-cloud security by examining their development from simple configuration checkers to comprehensive security platforms. Through a thorough examination of industry publications and market research, it also offers insights into existing implementation issues and suggests ways to increase the efficacy of CSPM tools in a variety of cloud contexts.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud Security Posture Management"

1

Parikh, Apoorva. "Cloud security and platform thinking : an analysis of Cisco Umbrella, a cloud-delivered enterprise security." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121796.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 101-114).<br>Cisco's security business segment with over $2 billion in revenue in fiscal 2018, makes Cisco one of the largest enterprise security players in the market. It is also one of the fastest growing business segments for Cisco, with last five years' CAGR at 12%. While this growth rate is in line with the estimated CAGR for cybersecurity market growth between 2018 - 2022, another leading incumbent's growth rate shows there is an opportunity to grow even faster. What can Cisco do to accelerate its security business group's growth and, more broadly, how can Cisco maintain its leadership position in a rapidly evolving and highly fragmented cybersecurity market? The goal of this thesis is two folds: first, is to discover the emerging cybersecurity needs for enterprises under the dynamic threat landscape in mobile, cloud-era, and the resultant growth opportunities and challenges these present to Cisco's security business group. Second, is to discover the main elements of Cisco security business group's current growth strategies and to evaluate platform thinking as a potential growth strategy for Cisco's Cloud Security business. We find Cisco Umbrella, a recently launched cloud security offering exhibits potential to become a foundation for Cisco Cloud Security as an open platform ecosystem. We conclude by discussing a potential future platform direction for Cisco Umbrella and raise follow-on questions for further consideration.<br>by Apoorva Parikh.<br>S.M. in Engineering and Management<br>S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
APA, Harvard, Vancouver, ISO, and other styles
2

Penjala, J. (Joni). "Information security management in cloud computing:a case study." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906052441.

Full text
Abstract:
Abstract. Organizations are quickly adopting cloud computing in their daily operations. As a result, spending’s on cloud security solutions are increasing in conjunction with security threats redirecting to the cloud. Information security is a constant race against evolving security threats and it also needs to advance in order to accommodate the cloud computing adaptation. The aim of this thesis is to investigate the topics and issues that are related to information security management in cloud computing environments. Related information security management issues include risk management, security technology selection, security investment decision-making, employees’ security policy compliance, security policy development, and security training. By interviewing three different types of actors (normal employees, IT security specialists, and security managers) in a large ICT-oriented company, this study attempts to get different viewpoints related with the introduced issues and provide suggestions on how to improve information security management in cloud computing environments. This study contributes to the community by attempting to give a holistic perspective on information security management in the specific setting of cloud computing. Results of the research illustrate how investment decisions directly affect all other covered topics that in turn have an effect on one another, forming effective information security.
APA, Harvard, Vancouver, ISO, and other styles
3

Runsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.

Full text
Abstract:
Cloud Computing has changed how computing is done as applications and services are being consumed from the cloud. It has attracted a lot of attention in recent times due to the opportunities it offers. While Cloud Computing is economical, the security challenges it poses are quite significant and this has affected the adoption rate of the technology. With the potential vulnerabilities being introduced by moving data to the cloud, it has become imperative for cloud service providers to guarantee the security of information, leaving cloud service consumers (e.g., enterprises) with the task of negotiating the terms and conditions of services provided by the cloud service providers as well as trusting them with their data. Although various security solutions used for addressing the security of data within the enterprises are now being applied to the cloud, these security solutions are challenged due to the dynamic, distributed and complex nature of the cloud technology. This thesis proposes a novel Policy-Based Management (PBM) framework capable of achieving cross-tenant authorization, handling dynamic and anonymous users while reducing the security management task to address cloud security. The framework includes an access control model adapted to the cloud environment that adopts features from role-based, task-based and attribute-based access control frameworks for a fine-grained access control. We demonstrate how this framework can be applied to develop an access control system for an enterprise using cloud services. The framework verifies the correctness of access control policies for cloud security through reasoning technique.
APA, Harvard, Vancouver, ISO, and other styles
4

Østdahl, Thomas. "Security Issues with Content Management Systems (CMSs) on the Cloud." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13813.

Full text
Abstract:
Although cloud computing is the major hype nowadays, it is actually a relatively &#147;old&#148; concept which can be dated back to the 1950s. Then, AT&amp;T was developing a centralized infrastructure and storage space, where their customers could connect to using advanced telephones. Cloud computing works in a similar fashion, where customers subscribe to centralized service models. The models are separated in three main categories; Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). The cloud is a multi-tenant environment, i.e., several customers are able to use the same service simultaneously. More- over, the cloud is highly scalable, which means that resources can be allocated on demand. Cloud computing follows a pay-per-use payment model. Customers could reduce their operational and maintenance costs significantly, because they subscribe to a Cloud Service Provider (CSP) which is responsible for these tasks. Moreover, an organization is no longer dependent on costly upfront investments.Most of the industry-leading technology organizations (e.g., Amazon, Apple, Google, Microsoft) have their own cloud services. Thus, the barrier to adopt the cloud for customers has lowered. Organizations have hasted to move their services to the cloud, without questioning the cloud&#146;s maturity. Even though cloud security has been a priority from the beginning, numerous attacks have been reported. The CSP&#146;s data-centers provide both physical and infrastructure security. However, traditional security threats to IT systems, is still applicable to cloud applications. Furthermore, new cloud-specific security risks emerge. Confidentiality, integrity and availability of data are always of importance, however, becomes challenging in the cloud due to its dynamic environment. Ensuring integrity of data, with- out knowing the whole data set, is one of several challenges. Moreover, due to the increasing incidents of Denial-of-Service (DoS) attacks, availability of data has become problematic. Although the cloud is able to scale well with such attacks, disruptions of services still occur. The scalability of clouds could also potentially be a threat, if malicious users are able to create bot-nets of multiple clouds.The Internet is a hostile environment, likewise is the cloud. However, this does not stop people from rapidly adopting it. Organizations have hasted to offer their services on the cloud, to benefit from its advantages. Content Management Sys- tems (CMSs) are examples of such services. They are widely popular, and used to create professional websites without requiring technical skills. CMSs provides a user-friendly platform to manage the contents (e.g., text, pictures, music), then customize it with templates and extensions. Open source CMSs benefit from their communities of developers, which contribute to keep their systems up to date and safe, with the current technologies. Since many CMS have non-technical users, they tend to be attractive targets for adversaries. Especially, third-party exten- sions have been considered a major threat. The &#147;core&#148; of the systems are often secure. However, web application vulnerabilities apply to these systems.Joomla! is a widely popular open source CMS, due to its simplicity and remark- able community. The latest version (Joomla! 1.6) has made it suitable for both new unexperienced users, as well as professional users. Joomla! can be used as a PaaS, to benefit from the cloud&#146;s advantages. Anyhow, Joomla! is an attractive target, due to its non-technical audience. It is considered secure by default. How- ever, with simple open source tools, it is possible to obtain valuable information about the system, e.g., server spesifications, OS, CMS version. Moreover, the se- curity of the back-end have potential for improvements. Since many customers use weak passwords, and the back-end is always located in the same folder, adversaries could brute-force their way through. Many CMSs have static files and resources, which finger-printers utilize to determine the system specifications. Furthermore, poorly coded extensions are gateways for attackers. If an exploit is found in a com- ponent, adversaries could automate attacks against websites with this vulnerable component installed. Hence, it is critical for users to always keep up to date.The emerging future would introduce numerous new ways of cloud usage. Many companies invest in enormous data-centers, which is the size of small villages. More and more services would move to the cloud, and software licenses would start to be excess. The threats to the cloud are not significantly increased in numbers, compared to traditional IT systems. However, the multi-tenancy could be exploited by malicious users. Moreover, distributed attacks originating from several clouds, could force CSPs to evolve cloud security.
APA, Harvard, Vancouver, ISO, and other styles
5

Young, Randall Frederick. "Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9006/.

Full text
Abstract:
The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in the information security domain. An additional aim of this dissertation is to empirically examine the influence of management practices and decisions on effective use of information security strategies within the organization. The issues of centralization versus decentralization of information security activities will be evaluated along with its impact on information security posture of organizations and the effectiveness of the organization's information security strategies. Data was collected from 119 IT and information security executives. Results show that how the organization structures information security activities is not correlated with more effective utilization of information security strategies. Meanwhile, the organization's information security posture is significantly correlated with more effective utilization of information security strategies. The implications of this research is discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Mahmoud, Suzan. "On Information Security Processes in Cloud Computing." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20462.

Full text
Abstract:
Cloud computing allows user access to virtual services (applications, servers and devices, digital storage and service packages sources) through a network using a web browser. Cloud computing is rapidly growing and has become an attractive and affordable service model among organizations. It has many benefits but is also associated with many risks and security challenges. In cloud computing users can connect with any device and use virtual computing services at any time and from anywhere, which has brought new challenges for enterprise security. The problem of securing data in the cloud and building trust in the cloud computing environment has become a widely discussed and important issue.This research aims to investigate how enterprises deal with security problems and protect their data in the cloud through security measures and processes. It also investigates what processes could be adapted to the security environment. To achieve this, an empirical study was performed. The empirical study consisted of interviews with a number of enterprises that use cloud computing in their business, with the purpose to give a deep picture of how they handle security issues related to their cloud services.During the empirical study it could be found differences and similarities in the security measures used by the different organizations, depending on the size of the organization and the type of services used or provided by the organizations. Information security should be managed in a series of processes or procedures, linked together in an environment such as the Information security management system (ISMS). On the basis of the evaluation of the interviews and literature, a cloud environment with different security processes is defined.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Gunasekar, and Anirudh Chelikani. "Analysis of security issues in cloud based e-learning." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20868.

Full text
Abstract:
Cloud based E-Learning is one of the booming technologies in IT field which brings powerful e-learning products with the help of cloud power. Cloud technology has numerous advantages over the existing traditional E-Learning systems but at the same time, security is a major concern in cloud based e-learning. So security measures are unavoidable to prevent the loss of users’ valuable data from the security vulnerabilities. Cloud based e-learning products also need to satisfy the security needs of customers and overcome various security threats which attack valuable data stored in cloud servers.So the study investigates various security issues involved in cloud based e-learning technology with an aim to suggest solutions in the form of security measures and security management standards. These will help to overcome the security threats in cloud based e-learning technology. To achieve our thesis aim, we used theoretical and empirical studies. Empirical study is made through the information gathered through various cloud based e-learning solution vendors websites. And the theoretical study is made through the text analysis on various research articles related to our subject areas. And finally the constant comparative method is used to compare the empirical findings with the facts discovered from our theoretical findings. These analysis and research studies are leads to find various security issues in cloud based e-learning technology.<br>Program: Magisterutbildning i informatik
APA, Harvard, Vancouver, ISO, and other styles
8

Young, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kannan, Anand. "Performance evaluation of security mechanisms in Cloud Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99464.

Full text
Abstract:
Infrastructure as a Service (IaaS) is a cloud service provisioning model which largely focuses on data centre provisioning of computing and storage facilities. The networking aspects of IaaS beyond the data centre are a limiting factor preventing communication services that are sensitive to network characteristics from adopting this approach. Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models thereby completing the cloud computing picture by addressing the networking aspects. In cloud networking, shared network resources are virtualized, and provisioned to customers and end-users on-demand in an elastic fashion. This technology allows various kinds of optimization, e.g., reducing latency and network load. Further, this allows service providers to provision network performance guarantees as a part of their service offering. However, this new approach introduces new security challenges. Many of these security challenges are addressed in the CloNe security architecture. This thesis presents a set of potential techniques for securing different resource in a cloud network environment which are not addressed in the existing CloNe security architecture. The thesis begins with a holistic view of the Cloud networking, as described in the Scalable and Adaptive Internet Solutions (SAIL) project, along with its proposed architecture and security goals. This is followed by an overview of the problems that need to be solved and some of the different methods that can be applied to solve parts of the overall problem, specifically a comprehensive, tightly integrated, and multi-level security architecture, a key management algorithm to support the access control mechanism, and an intrusion detection mechanism. For each method or set of methods, the respective state of the art is presented. Additionally, experiments to understand the performance of these mechanisms are evaluated on a simple cloud network test bed. The proposed key management scheme uses a hierarchical key management approach that provides fast and secure key update when member join and member leave operations are carried out. Experiments show that the proposed key management scheme enhances the security and increases the availability and integrity. A newly proposed genetic algorithm based feature selection technique has been employed for effective feature selection. Fuzzy SVM has been used on the data set for effective classification. Experiments have shown that the proposed genetic based feature selection algorithm reduces the number of features and hence decreases the classification time, while improving detection accuracy of the fuzzy SVM classifier by minimizing the conflicting rules that may confuse the classifier. The main advantages of this intrusion detection system are the reduction in false positives and increased security.<br>Infrastructure as a Service (IaaS) är en Cloudtjänstmodell som huvudsakligen är inriktat på att tillhandahålla ett datacenter för behandling och lagring av data. Nätverksaspekterna av en cloudbaserad infrastruktur som en tjänst utanför datacentret utgör en begränsande faktor som förhindrar känsliga kommunikationstjänster från att anamma denna teknik. Cloudnätverk är en ny teknik som integrerar nätverkstillgång med befintliga cloudtjänstmodeller och därmed fullbordar föreställningen av cloud data genom att ta itu med nätverkaspekten.  I cloudnätverk virtualiseras delade nätverksresurser, de avsätts till kunder och slutanvändare vid efterfrågan på ett flexibelt sätt. Denna teknik tillåter olika typer av möjligheter, t.ex. att minska latens och belastningen på nätet. Vidare ger detta tjänsteleverantörer ett sätt att tillhandahålla garantier för nätverksprestandan som en del av deras tjänsteutbud. Men denna nya strategi introducerar nya säkerhetsutmaningar, exempelvis VM migration genom offentligt nätverk. Många av dessa säkerhetsutmaningar behandlas i CloNe’s Security Architecture. Denna rapport presenterar en rad av potentiella tekniker för att säkra olika resurser i en cloudbaserad nätverksmiljö som inte behandlas i den redan existerande CloNe Security Architecture. Rapporten inleds med en helhetssyn på cloudbaserad nätverk som beskrivs i Scalable and Adaptive Internet Solutions (SAIL)-projektet, tillsammans med dess föreslagna arkitektur och säkerhetsmål. Detta följs av en översikt över de problem som måste lösas och några av de olika metoder som kan tillämpas för att lösa delar av det övergripande problemet. Speciellt behandlas en omfattande och tätt integrerad multi-säkerhetsarkitektur, en nyckelhanteringsalgoritm som stödjer mekanismens åtkomstkontroll och en mekanism för intrångsdetektering. För varje metod eller för varje uppsättning av metoder, presenteras ståndpunkten för respektive teknik. Dessutom har experimenten för att förstå prestandan av dessa mekanismer utvärderats på testbädd av ett enkelt cloudnätverk. Den föreslagna nyckelhantering system använder en hierarkisk nyckelhantering strategi som ger snabb och säker viktig uppdatering när medlemmar ansluta sig till och medlemmarna lämnar utförs. Försöksresultat visar att den föreslagna nyckelhantering system ökar säkerheten och ökar tillgänglighet och integritet. En nyligen föreslagna genetisk algoritm baserad funktion valet teknik har använts för effektiv funktion val. Fuzzy SVM har använts på de uppgifter som för effektiv klassificering. Försök har visat att den föreslagna genetiska baserad funktion selekteringsalgoritmen minskar antalet funktioner och därmed minskar klassificering tiden, och samtidigt förbättra upptäckt noggrannhet fuzzy SVM klassificeraren genom att minimera de motstående regler som kan förvirra klassificeraren. De främsta fördelarna med detta intrångsdetekteringssystem är den minskning av falska positiva och ökad säkerhet.
APA, Harvard, Vancouver, ISO, and other styles
10

Jhawar, R. "DEPENDABILITY IN CLOUD COMPUTING." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233330.

Full text
Abstract:
The technological advances and success of Service-Oriented Architectures and the Cloud computing paradigm have produced a revolution in the Information and Communications Technology (ICT). Today, a wide range of services are provisioned to the users in a flexible and cost-effective manner, thanks to the encapsulation of several technologies with modern business models. These services not only offer high-level software functionalities such as social networks or e-commerce but also middleware tools that simplify application development and low-level data storage, processing, and networking resources. Hence, with the advent of the Cloud computing paradigm, today's ICT allows users to completely outsource their IT infrastructure and benefit significantly from the economies of scale. At the same time, with the widespread use of ICT, the amount of data being generated, stored and processed by private companies, public organizations and individuals is rapidly increasing. The in-house management of data and applications is proving to be highly cost intensive and Cloud computing is becoming the destination of choice for increasing number of users. As a consequence, Cloud computing services are being used to realize a wide range of applications, each having unique dependability and Quality-of-Service (Qos) requirements. For example, a small enterprise may use a Cloud storage service as a simple backup solution, requiring high data availability, while a large government organization may execute a real-time mission-critical application using the Cloud compute service, requiring high levels of dependability (e.g., reliability, availability, security) and performance. Service providers are presently able to offer sufficient resource heterogeneity, but are failing to satisfy users' dependability requirements mainly because the failures and vulnerabilities in Cloud infrastructures are a norm rather than an exception. This thesis provides a comprehensive solution for improving the dependability of Cloud computing -- so that -- users can justifiably trust Cloud computing services for building, deploying and executing their applications. A number of approaches ranging from the use of trustworthy hardware to secure application design has been proposed in the literature. The proposed solution consists of three inter-operable yet independent modules, each designed to improve dependability under different system context and/or use-case. A user can selectively apply either a single module or combine them suitably to improve the dependability of her applications both during design time and runtime. Based on the modules applied, the overall proposed solution can increase dependability at three distinct levels. In the following, we provide a brief description of each module. The first module comprises a set of assurance techniques that validates whether a given service supports a specified dependability property with a given level of assurance, and accordingly, awards it a machine-readable certificate. To achieve this, we define a hierarchy of dependability properties where a property represents the dependability characteristics of the service and its specific configuration. A model of the service is also used to verify the validity of the certificate using runtime monitoring, thus complementing the dynamic nature of the Cloud computing infrastructure and making the certificate usable both at discovery and runtime. This module also extends the service registry to allow users to select services with a set of certified dependability properties, hence offering the basic support required to implement dependable applications. We note that this module directly considers services implemented by service providers and provides awareness tools that allow users to be aware of the QoS offered by potential partner services. We denote this passive technique as the solution that offers first level of dependability in this thesis. Service providers typically implement a standard set of dependability mechanisms that satisfy the basic needs of most users. Since each application has unique dependability requirements, assurance techniques are not always effective, and a pro-active approach to dependability management is also required. The second module of our solution advocates the innovative approach of offering dependability as a service to users' applications and realizes a framework containing all the mechanisms required to achieve this. We note that this approach relieves users from implementing low-level dependability mechanisms and system management procedures during application development and satisfies specific dependability goals of each application. We denote the module offering dependability as a service as the solution that offers second level of dependability in this thesis. The third, and the last, module of our solution concerns secure application execution. This module considers complex applications and presents advanced resource management schemes that deploy applications with improved optimality when compared to the algorithms of the second module. This module improves dependability of a given application by minimizing its exposure to existing vulnerabilities, while being subject to the same dependability policies and resource allocation conditions as in the second module. Our approach to secure application deployment and execution denotes the third level of dependability offered in this thesis. The contributions of this thesis can be summarized as follows.The contributions of this thesis can be summarized as follows. • With respect to assurance techniques our contributions are: i) de finition of a hierarchy of dependability properties, an approach to service modeling, and a model transformation scheme; ii) de finition of a dependability certifi cation scheme for services; iii) an approach to service selection that considers users' dependability requirements; iv) de finition of a solution to dependability certifi cation of composite services, where the dependability properties of a composite service are calculated on the basis of the dependability certi ficates of component services. • With respect to off ering dependability as a service our contributions are: i) de finition of a delivery scheme that transparently functions on users' applications and satisfi es their dependability requirements; ii) design of a framework that encapsulates all the components necessary to o er dependability as a service to the users; iii) an approach to translate high level users' requirements to low level dependability mechanisms; iv) formulation of constraints that allow enforcement of deployment conditions inherent to dependability mechanisms and an approach to satisfy such constraints during resource allocation; v) a resource management scheme that masks the a ffect of system changes by adapting the current allocation of the application. • With respect to security management our contributions are: i) an approach that deploys users' applications in the Cloud infrastructure such that their exposure to vulnerabilities is minimized; ii) an approach to build interruptible elastic algorithms whose optimality improves as the processing time increases, eventually converging to an optimal solution.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cloud Security Posture Management"

1

Abbadi, Imad M. Cloud Management and Security. John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118817087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

F, Ransome James, ed. Cloud computing: Implementation, management, and security. CRC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pearson, Siani. Privacy and Security for Cloud Computing. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Loske, André. IT Security Risk Management in the Context of Cloud Computing. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11340-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Information technology reform: Progress made but future cloud computing efforts should be better planned : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, United States Senate. U.S. Govt. Accountability Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. Innovating with less: Examining efforts to reform information technology spending : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, May 24, 2012. U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. Packt Publishing, Limited, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. de Gruyter GmbH, Walter, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cloud Security Posture Management"

1

Xing, Tianyi, Zhengyang Xiong, Haiyang Qian, Deep Medhi, and Dijiang Huang. "Cloud Security." In Cloud Services, Networking, and Management. John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119042655.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Tony. "Cloud Computing Security." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Biswal, Asutosh Kumar, Sourav Kanti Addya, Bibhudatta Sahoo, and Ashok Kumar Turuk. "Secured IoT Device Management in Cloud-Fog Environment using Blockchain." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. "Cloud Management and Monitoring." In Cloud Computing with Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24612-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ware, Willis H. "The Cyber-Posture of the National Information Infrastructure." In Information Security Management & Small Systems Security. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35575-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alani, Mohammed M. "Cloud Security: A Security Management Perspective." In Strategic Engineering for Cloud Computing and Big Data Analytics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52491-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. "Cloud Management and Monitoring." In Cloud Computing with Security and Scalability. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07242-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mishra, Pravin. "AWS Security and Management Services." In Cloud Computing with AWS. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9172-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kamongi, Patrick. "Cloud Security and Privacy Management." In Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons Singapore Pte. Ltd, 2019. http://dx.doi.org/10.1002/9781119053385.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Gurwinder, Munish Rattan, and Gurjot Kaur Walia. "Cloud Security Risk Management Quantifications." In Big Data, Cloud Computing and IoT. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003298335-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud Security Posture Management"

1

Leaua, Melina Silvia, Alexandru Chiş, Titus-Constantin Bălan, and Lucian Florin Ilca. "Assesment of Cloud Security Posture Management Scenarios." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pinto, Breno Silva, Lucas Cioffi, and Felipe Espósito. "Third-party Cloud Risk Management." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Loonkar, Shweta, Neeti Taneja, and N. Beemkumar. "Fuzzy Rule-Based Trust Management for Cloud Security." In 2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI). IEEE, 2024. https://doi.org/10.1109/icscai61790.2024.10867234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Tianyu, Chaomeng Lu, and Bert Lagaisse. "A Multi-Dimensional Visual Analytics Tool for the Security Posture of Open-Source Software." In 2025 IEEE/ACM 3rd International Workshop on Software Vulnerability Management (SVM). IEEE, 2025. https://doi.org/10.1109/svm66695.2025.00007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Lalit, Adity Dokania, Akash Verma, Divyesh Pradeep Shah, Pratik Mayur Parekh, and Sachin Sudhir Shinde. "AI-Augmented Security Protocols for Scalable Cloud Infrastructure Management." In 2025 International Conference on Engineering, Technology & Management (ICETM). IEEE, 2025. https://doi.org/10.1109/icetm63734.2025.11051957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Paidy, Pavan, and Krishna Chaganti. "CLOUD-NATIVE SECURITY POSTURE MANAGEMENT IN AWS AND AZURE: AUDITDRIVEN APPROACHES TO RISK AND COMPLIANCE." In 12th International Conference on Signal Processing. Academy & Industry Research Collaboration, 2025. https://doi.org/10.5121/csit.2025.151106.

Full text
Abstract:
Strong security becomes very necessary in the fast-paced digital environment of today as businesses are switching to multi-cloud architectures for improved scalability and agility. Ensuring visibility, control, and compliance in dynamic environments such as AWS and Azure now primarily depends on Cloud-native Security Posture Management (CSPM). These systems provide freedom but also major risks: improperly set-up storage, too authorized identities, and unattended services can be readily overlooked. Constant monitoring offered by CSPM helps to find vulnerabilities before they become more critical by means of deviations from security baselines. This approach depends on audits, which enable teams to match present status of affairs with internal compliance requirements. Consistent audit trails assist quick issue resolution and informed decision-making by giving both responsibility and knowledge of system behavior. Along with this security is continuous compliance monitoring, carefully checking systems and instantly spotting changes. Beyond detection, good Cloud Security Posture Management (CSPM) interacts with DevOps pipelines to rapidly address problems and combines automated, prioritized risk mitigating technologies, therefore enhancing security protections early in the development process Cloud Security Posture Management (CSPM) products help to organize the anarchy and match security operations with corporate goals, so preserving the speed of innovation as safeguarding cloud environments gets more complicated becomes more difficult. Not only advised, but companies running both AWS and Azure systems absolutely have to put an audit-driven, policy-enforced Cloud Security Posture Management (CSPM) plan into action.
APA, Harvard, Vancouver, ISO, and other styles
7

Bulut, Muhammed Fatih, and Jinho Hwang. "NL2Vul: Natural Language to Standard Vulnerability Score for Cloud Security Posture Management." In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021. http://dx.doi.org/10.1109/cloud53861.2021.00073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Coppola, Gregory, Aparna S. Varde, and Jiacheng Shang. "Enhancing Cloud Security Posture for Ubiquitous Data Access with a Cybersecurity Framework Based Management Tool." In 2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2023. http://dx.doi.org/10.1109/uemcon59035.2023.10316003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Maamari, Waleed A. Al, Muhammad R Ahmed, ,. Rusmawati Binti Said, and Mohammad H Marhaban. "Cybersecurity Incident Response Dynamics: Unveiling Emerging Trends and Confronting Persistent Challenges." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141104.

Full text
Abstract:
In the current cybersecurity environment, incident response holds paramount importance for organizations concerned with the need to maintain security processes and mitigate potential breaches. Therefore, this paper analyzes the emerging trends and persistent challenges that shape incident response practices. These emerging trends—ransomware attacks, the integration of AI and ML, proactive threat hunting, cloud security incident response, and threat intelligence sharing—also bring with them new opportunities for the development of incident response. However, current challenges to incident response effectiveness include resource constraints, skill shortages, issues of regulatory compliance, organizational silos, and cultural barriers. These can be addressed through investment in advanced technologies, ongoing training, collaborative partnerships, and proactive efforts in regulatory compliance. Organizations can strengthen their incident response postures and effectively mitigate cyber risks by prioritizing leadership commitment, fostering a cybersecurity-aware culture, and embracing proactive measures to meet the exigencies of the changing cybersecurity landscape.
APA, Harvard, Vancouver, ISO, and other styles
10

Shekhawat, Deependra, and Siddharth Saboo. "Fortifying the Energy Frontier: Overcoming Cybersecurity Challenges in the Oil and Gas Industry Through Resilient Strategies and Innovative Solutions." In ADIPEC. SPE, 2024. http://dx.doi.org/10.2118/222471-ms.

Full text
Abstract:
Abstract The oil and gas industry, a vital lifeline fueling the global economy, find itself at a pivotal juncture where the convergence of operational technology (OT) and information technology (IT) has ushered in unprecedented opportunities and challenges. As digital transformation sweeps across this sector, the imperative to fortify cybersecurity defenses against ever-evolving threats has become paramount. Innovative and forward-looking oil and gas organizations across the globe are adopting the Cloud in many forms because of their digital transformation initiatives. Data lakes, edge technology, machine-to-machine communication, and machine learning (ML) algorithms have been enabling this industrial digital transformation. This transformation is also driving changes to the OT landscape, and as these environments continue to evolve, OT environments are leveraging well proven IT solution patterns to improve the productivity and efficiency of production operations. Industrial customers often start their digital transformation journey by sending OT data to the cloud for analysis and analytics without sending commands back to the industrial automation and control systems (ICAS). This process is often called "open loop" operations, since there is one-way communication from edge to cloud. Customers generally find this relatively easy to secure and manage. However, more often we are witnessing requirements to optimize operations by generating an automatic or operator-initiated response in the oil and gas production operation, rig management based on insights gained from cloud analytics. This process is often referred to as "closed loop" operations with two-way communication between edge and cloud. The security and compliance practices for closed loop operations are more rigorous because closed operations manipulate OT devices remotely. Developing these practices should be rooted in a cyber risk assessment to help businesses understand and prioritize security concerns. In this paper we propose how strengths of Cloud computing can become key enabler for oil and gas organizations in helping them enhance their overall security posture and manage risks within OT environments. We have deployed solution patterns described in this paper as the foundational pillar of several Oil and Gas organization's overall OT system architecture to unlock both "open loop" and "closed loop" operations in a secure, reliable and cost-effective manner. The specific scope items we will cover in this paper focus on a custom security uplift framework having four foundational components – 1) Cloud led architecture patterns to provide next generation network segmentation strategies in OT De-militarized Zone 2) OT asset inventory and vulnerability management 3) Centralized security monitoring and incident response with help of Artificial Intelligence and most recently providing Generative AI based virtual assistant to query security event data from OT systems. For organizations to plan their industrial digital transformation safely and securely, it is recommended that a multi-layered approach to secure the Industrial Control Systems (ICS)/OT and Cloud environments be implemented as captured in ten security golden rules in the following paper [1]. In addition to this, in the paper we propose a comprehensive architecture framework that aligns with established cybersecurity framework (CSF) such as NIST. The use case studies discussed in the paper will highlight how customer have been able to remediate critical security vulnerabilities within weeks post implementation by deploying a comprehensive asset inventory discovery and vulnerability assessment. This has help reduce mean time to identify and mitigate vulnerabilities from months to days with automated testing in pre-production environments, ensure quick detection and response towards security incidents with help of advanced security monitoring and incident response playbooks, covering 100% of the OT assets through this capability and leverage advanced data analytics, machine learning to perform log mining, data cleansing, data validation, log mining and analysis through natural language processing such as conversational AI assistants powered by large language model (LLM) in the Cloud.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud Security Posture Management"

1

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under this type of attack is to assume that everything will eventually get compromised. The incident makes a case for why companies should always deploy additional defenses, such as employing security keys, to stay secure in the long term.
APA, Harvard, Vancouver, ISO, and other styles
2

Rose, Scott. Planning for a Zero Trust Architecture. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.cswp.20.

Full text
Abstract:
NIST Special Publication 800-207 defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zero trust architecture to succeed in improving the enterprise security posture. Some of these stakeholders may not be familiar with risk analysis and management. This document provides an overview of the NIST Risk Management Framework (NIST RMF) and how the NIST RMF can be applied when developing and implementing a zero trust architecture.
APA, Harvard, Vancouver, ISO, and other styles
3

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
APA, Harvard, Vancouver, ISO, and other styles
4

Coyner, Kelley, and Jason Bittner. Automated Vehicles and Infrastructure Enablers: Cybersecurity. SAE International, 2024. http://dx.doi.org/10.4271/epr2024018.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;While weaponizing automated vehicles (AVs) seems unlikely, cybersecurity breaches may disrupt automated driving systems’ navigation, operation, and safety—especially with the proliferation of vehicle-to-everything (V2X) technologies. The design, maintenance, and management of digital infrastructure, including cloud computing, V2X, and communications, can make the difference in whether AVs can operate and gain consumer and regulator confidence more broadly. Effective cybersecurity standards, physical and digital security practices, and well-thought-out design can provide a layered approach to avoiding and mitigating cyber breaches for advanced driver assistance systems and AVs alike. Addressing cybersecurity may be key to unlocking benefits in safety, reduced emissions, operations, and navigation that rely on external communication with the vehicle.&lt;/div&gt;&lt;div class="htmlview paragraph"&gt;&lt;b&gt;Automated Vehicles and Infrastructure Enablers: Cybersecurity&lt;/b&gt; focuses on considerations regarding cybersecurity and AVs from the perspective of V2X infrastructure, including electric charging infrastructure. These issues are examined in the context of initiatives in the US at all levels of government and regulatory frameworks in the UK, Europe, and Asia.&lt;/div&gt;&lt;div class="htmlview paragraph"&gt;&lt;a href="https://www.sae.org/publications/edge-research-reports" target="_blank"&gt;Click here to access the full SAE EDGE&lt;/a&gt;&lt;sup&gt;TM&lt;/sup&gt;&lt;a href="https://www.sae.org/publications/edge-research-reports" target="_blank"&gt; Research Report portfolio.&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;
APA, Harvard, Vancouver, ISO, and other styles
5

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security issues in edge computing, particularly in the realm of encryption. A prominent limitation of edge devices is the hardware’s ability to support the computational complexity of traditional encryption methodologies (Alwarafy et al. 2020). Furthermore, encryption on the edge poses challenges in key management, the process by which cryptographic keys are transferred and stored among devices (Zeyu et al. 2020). Though edge computing provides reduced latency in data processing, encryption mechanism utilization reintroduces delay and can hinder achieving real-time results (Yu et al. 2018). The IoT is composed of a wide range of devices with a diverse set of computational capabilities, rendering a homogeneous solution for encryption impractical (Dar et al. 2019). Edge devices are often deployed in operational locations that are vulnerable to physical tampering and attacks. Sensitive data may be compromised if not sufficiently encrypted or if keys are not managed properly. Furthermore, the distributed nature and quantity of edge devices create a vast attack surface that can be compromised in other ways (Xiao et al. 2019). Understanding established mechanisms and exploring emerging methodologies for encryption reveals potential solutions for developing a robust solution for edge computing applications. The purpose of this document is to detail the current research for encryption methods in the edge computing space and highlight the major challenges associated with executing successful encryption on the edge.
APA, Harvard, Vancouver, ISO, and other styles
6

The 5th National Global Change Conference; Transformative Futures for Water Security Seminar. Academy of Science of South Africa, 2023. http://dx.doi.org/10.17159/assaf.2023/90.

Full text
Abstract:
The 5th National Global Change Conference organised by the Department of Science and Innovation (DSI) and the National Research Foundation (NRF), in partnership with the University of the Free State (UFS), took place at the Bloemfontein Campus of the UFS, from 30 January to 2 February 2023. The central theme of the 5th National Global Change Conference was: “Research and Innovation Accelerating transformations to global sustainability”. The Academy of Science of South Africa (ASSAf) and the International Water Management Institute (IWMI) jointly hosted a hybrid special session titled, Transformative Futures for Water Security on 31 January 2023. The objectives of the session were to; 1. Obtain sector grounded suggestions to climate change adaptation for the water sector, and 2. Identify data and information gaps under the cloud of climate change to influence planning for a water secure future. This Special Session provided a multisectoral dialogue on South Africa’s water future and adaptation to the influence of climate change. The engagement proposed and discussed actions required nationally and regionally to strengthen water security in the face of global change. The following key recommendations were tabled from the session: 1. Engagement with communities to promote conservation of water resources must be a priority. 2. Municipalities need to develop own groundwater strategies to inform groundwater utilisation. 3. The process of transforming the water sector should be taken to local communities. 4. Water use quotas need to be stricter. 5. The implementation of solutions from the research community is commonly hindered bureaucratic processes; there needs to be means to minimize red tape.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!