A case study on cloud security controls

https://doi.org/10.53730/ijhs.v6nS1.7778

Authors

  • Nisha Soms Department of CSE, Sri Ramakrishna Institute of Technology
  • Oswalt Manoj S Department of CSE, Sri Krishna College of Engineering and Technology, Coimbatore, India
  • Santhosh Kumar P Department of CSE, Sri Ramakrishna Institute of Technology

Keywords:

Cloud computing, security controls, case study, Capital one data breach, cyber attacks, AFS, SSO, IAM

Abstract

Cloud computing is a highly discussed topic in today’s technical and economic world. Many big players of the software industry are concentrating more on cloud services. Companies are racing to incorporate cloud infrastructures into their businesses or provide their own. While speaking of development, we cannot let down an important aspect called security. A misconfiguration or a minor vulnerability in a way the services are handled may result in a huge loss of data, which in turn would result in great loss of revenue. Money can be generated in one way or the other, but reputation once lost cannot be brought back again. In this paper, we discuss about the security controls and misconfigurations that frequently happen in AWS environments and discuss ways to avoid it using Capital One Data Breach as an example.

Downloads

Download data is not yet available.

References

C.N. Höfer, G. Karagiannis, “Cloud computing services: taxonomy and comparison”, published on the Journal of Internet Services and Applications (Volume 2), pp. 81-94, January 2010.

https://aws.amazon.com/s3/features/

https://aws.amazon.com/s3/c=23&pt=1

Nelson Novaes Neto, Stuart Madnick, Anchises Moraes G. de Paula, Natasha Malara Borges, “A Case Study of the Capital One Data Breach” published on the SSRN Electronic Journal, January 2020.

https://www.mcafee.com/enterprise/en-us/security-awareness/cloud/security-issues-in-cloud-computing.html

https://aws.amazon.com/security/?nc1=f_cc

https://aws.amazon.com/firewall-manager/?c=22&pt=11

Amazon WhitePaper, “AWS Best Practices for DDOS Resiliency”, https://docs.aws.amazon.com/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-best-practices-ddos-resiliency.pdf#welcome, December 2019.

L.Ertaul, S.Singhal, G.Saldamli, “Security Challenges in Cloud Computing” published on the proceedings of the International Conference on Security and Management, January 2010.

Amazon WhitePaper, “Intro to AWS Security”, https://d1.awsstatic.com/whitepapers/Security/Intro_to_AWS_Security.pdf?did=wp_card&trk=wp_card , January 2020

Published

23-05-2022

How to Cite

Soms, N., Oswalt, M. S., & Santhosh, K. P. (2022). A case study on cloud security controls. International Journal of Health Sciences, 6(S1), 11374–11380. https://doi.org/10.53730/ijhs.v6nS1.7778

Issue

Section

Peer Review Articles