An Analysis of Cloud Security Frameworks, Problems and Proposed
An Analysis of Cloud Security Frameworks, Problems and Proposed
net/publication/373902348
CITATIONS READS
26 1,150
2 authors:
All content following this page was uploaded by Milan Chauhan on 14 September 2023.
Abstract: The rapidly growing use of cloud computing raises security concerns. This study paper
seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting
solutions. This research provides greater knowledge of the various frameworks, assisting in making
educated decisions about selecting and implementing suitable security measures for cloud-based
systems. The study begins with introducing cloud technology, its issues and frameworks to secure
infrastructure, and an examination of the various cloud security frameworks available in the industry.
A full comparison is performed to assess the framework’s focus, scope, approach, strength, limitations,
implementation steps and tools required in the implementation process. The frameworks focused on
in the paper are COBIT5, NIST (National Institute of Standards and Technology), ISO (International
Organization for Standardization), CSA (Cloud Security Alliance) STAR and AWS (Amazon Web
Services) well-architected framework. Later, the study digs into identifying and analyzing prevalent
cloud security issues. This contains attack vectors that are inherent in cloud settings. Plus, this part
includes the risk factor of top cloud security threats and their effect on cloud platforms. Also, it
presents ideas and countermeasures to reduce the observed difficulties.
Keywords: cloud security; security frameworks; NIST; COBIT; ISO; AWS; ENISA
1. Introduction
Citation: Chauhan, M.; Shiaeles, S.
First and foremost, what exactly is cloud computing? Cloud computing is a technology
An Analysis of Cloud Security
Frameworks, Problems and Proposed
that allows anybody to remotely access high computing equipment and computing services
Solutions. Network 2023, 3, 422–450.
without having to purchase physical infrastructure. And the fundamental advantage of
https://doi.org/10.3390/ cloud computing is that it only costs on a pay-as-you-go basis. The cloud is a game-
network3030018 changing technology because it enables flexibility, scalability, and a cost-effective means of
managing IT resources. According to recent predictions, the worldwide cloud computing
Academic Editor: Khaled Elleithy
market will exceed $800 billion in the next 2–3 years [1–3].
Received: 26 July 2023 However, the acceptance and expanded use of cloud computing raises security con-
Revised: 16 August 2023 cerns. Data breaches, unauthorized access, and data loss during transfer or due to system
Accepted: 1 September 2023 failure are examples of security issues. Five factors determine the major component of
Published: 12 September 2023 security concerns [4–6].
1. Network related
2. Confidentiality and privacy
Copyright: © 2023 by the authors.
3. Data-related issues
Licensee MDPI, Basel, Switzerland. 4. Virtualization-related issues
This article is an open access article 5. Others
distributed under the terms and Cloud security frameworks are created to assist organizations in understanding their
conditions of the Creative Commons
vulnerabilities when building cloud infrastructure. Cloud security frameworks are a
Attribution (CC BY) license (https://
collection of rules, standards, and best that companies may use to safeguard their cloud
creativecommons.org/licenses/by/
environments against security risks. Its core overview is the required policies, tools, settings,
4.0/).
and procedures for securing and managing cloud infrastructure. It helps organizations to
identify, access, and reduce risks by providing a systematic method for managing cloud
security threats.
There are several well-known frameworks available. CSA STAR (Cloud Security
Alliance Control Matrix), FedRAMP, NIST (National Institute of Standards and Technology),
COBIT 5, International Organization for Standardization, and Well-Architected Cloud
Frameworks (AWS, Azure, Google) are a few examples. Companies confront considerable
issues when it comes to guaranteeing the confidentiality, integrity, and availability of
their data and applications in cloud environments. Inadequate cloud security typically
leads to vulnerabilities, unauthorized access, data breaches, and significant harm to the
organization’s brand and consumer confidence.
In carrying out this evaluation project, it is essential to identify the targeted outcomes
of the project. The question behind the author’s mind is as follows:
1. What is the procedure for implementing a cloud security architecture in an organiza-
tion? What tools are needed to carry out each step?
2. What are the important issues for organizations when establishing a cloud security
strategy in terms of training, awareness, and change management?
Hypothesis on cloud security frameworks.
Hypothesis 1: The effectiveness of cloud security frameworks significantly influences the overall
security posture of cloud-based systems.
Hypothesis 2: The implementation process of the Cloud Security Framework is very hard to
understand.
Hypothesis 3: Implementing comprehensive security measures and adopting robust solutions can
effectively mitigate common cloud security problems and enhance the overall security posture of
cloud environments.
2. Literature Review
Cloud computing has its roots in several fundamental concepts and technologies.
In the 1960s, J.C.R. Licklider, a prominent computer scientist, envisioned an “Intergalac-
tic Computer Network” that allowed remote access to programs and data, laying the
groundwork for distributed computing models. In the 1990s, grid computing emerged as
a way to harness geographically dispersed resources for computationally intensive tasks.
The Globus Toolkit, developed by Ian Foster and Carl Kesselman, provided a software
infrastructure for managing computational grids. Utility computing also emerged during
this time, offering computing resources as a pay-per-use utility. Sun Microsystems and
Amazon introduced utility computing models, demonstrating the benefits of on-demand
resource rental.
The phrase “cloud computing” first appeared in the mid-2000s, revolutionizing how
computer resources are distributed and utilized. Amazon Web Services (AWS) established
Infrastructure as a Service (IaaS) in 2006, providing virtualized servers, storage, and net-
working capabilities via the Internet. This revolutionized traditional hosting paradigms
by introducing scalable and adaptable cloud-based infrastructure. The National Institute
of Standards and Technology (NIST) was instrumental in standardizing cloud computing,
describing it in 2011 as a concept that allows on-demand network access to a shared pool of
programmable computing resources. NIST emphasized the model’s ease of use and univer-
sality. Extensive study has been conducted to examine many views on cloud computing,
offering insight into its consequences and potential.
Shared Responsibility Model: Cloud providers and users share responsibility for secu-
rity. Defining roles and responsibilities can lead to ambiguity and gaps in implementation.
Compliance and Regulations: Ensuring compliance with industry regulations and
data protection laws adds complexity to implementation [11] highlight the need to adapt
frameworks to meet specific regulatory requirements.
Dynamic Environment: Cloud environments are dynamic and scalable, making con-
tinuous monitoring and control adaptation a challenge. Automation and real-time threat
detection are vital to maintaining security.
While the literature on cloud security frameworks is rich, earlier research has high-
lighted many limitations. These gaps represent areas where further research and develop-
ment are required to improve the efficacy of cloud security systems.
MainComponents
Figure1.1.Main
Figure Componentsof
ofCloud
CloudSecurity
SecurityIssues.
Issues.Image
ImageSource:
Source:[15].
[15].
an ongoing difficulty. Effective threat intelligence is crucial for proactive security measures.
However, there is a gap in the availability of comprehensive threat intelligence specific to
cloud environments. Research is needed to enhance threat intelligence mechanisms tailored
to cloud-based threats [23,24].
A research study paper is essential in the field of research since it serves numerous
objectives and helps the growth of knowledge and understanding in a certain area. Table 2
is an explanation of the importance of this study paper and how it can contribute to the area.
Frameworks Description
COBIT 5 for Cloud Computing The COBIT framework is extended to solve unique cloud computing concerns.
NIST Provides standards and best practices for cloud computing security and privacy issues.
ISO 27017 Code of practice for information security measures for cloud services based on ISO/IEC 27002.
A federal program in the United States provides a standardized method for cloud security evaluation and
FedRAMP
authorization.
AWS Well-Architected Framework Best practices and guidelines for creating and running safe and efficient cloud infrastructures are provided.
CSA STAR A registry that details the security practices of cloud service providers using the CSA’s Cloud Control Matrix.
Addresses several security topics while providing information on analyzing and reducing threats in cloud
ENISA Cloud Security Guide
settings.
CIS Controls for Cloud Based on the CIS Controls, tailored security controls and practices for safeguarding cloud environments.
Cloud Controls Matrix (CCM) Provides a set of cloud-specific security measures that are compliant with industry standards and legislation.
Describes thorough security best practices and controls for various cloud service architectures and
CSA Security Guidance
deployments.
Network 2023, 3 429
3.1.1. Principles
Here is the understable definition of each principles of the Figure 2.
Separating Governance from Management: Define and separate the roles of cloud
security governance (strategic decision-making and supervision) and management (day-to-
day operational tasks).
Meeting stakeholder needs: Align cloud security activities with the needs and expec-
tations of stakeholders such as consumers, regulators, and business partners.
End-to-end Enterprise Coverage: Adopt a comprehensive approach to IT governance
and management that includes all parts of the business. This principle emphasizes the
need to consider the full IT value chain, from strategy development and execution through
value delivery, resource management, and risk management.
Applying a single integrated framework: Use a consistent framework for cloud secu-
rity management that corresponds with existing governance and management frameworks
and standards, such as ISO 27001 or the NIST Cybersecurity Framework.
Network 2023, 3 431
with cloud services, data security, and regulatory compliance. This helps organiza-
tions to properly allocate resources and prioritize risk reduction activities.
3. Alignment with Industry Standards, Frameworks, and Laws: COBIT 5 is aligned
with industry standards, frameworks, and laws, allowing organizations to satisfy
compliance needs. It advises on how to apply best practices from standards such as
ISO 27001, the NIST Cybersecurity Framework, and GDPR. This alignment makes it
easier to implement a uniform and effective control and assurance program.
4. Control Objectives: COBIT 5 provides a set of specified control goals targeted to
cloud settings. Access management, data protection, incident response, and vendor
management are among the important control objectives addressed. They serve as
realistic guidance for building cloud security policies.
5. Continual Improvement: COBIT 5 encourages a culture of continuous development in
cloud control and assurance. It promotes businesses to evaluate their control system,
measure performance, and identify opportunities for improvement. This iterative
strategy assists organizations in adapting to changing cloud security concerns and
continuously improving their control environment.
3.1.3. Limitations
1. Complexity: To implement COBIT 5 for cloud control and assurance, a complete grasp
of the framework and its components is required. It can be difficult, particularly for
organizations with few resources or technical knowledge. Adequate training and
assistance may be required to properly capitalize on the benefits of COBIT 5.
2. Customization Issues: COBIT 5 provides a broad framework that must be customized
to an organization’s individual needs and cloud environment. Customizing the
framework to meet specific needs and cloud service providers may necessitate more
effort and skill.
3. Tools Dependency: COBIT 5 gives guidelines on control and assurance operations but
does not advocate specific tools or technology. Organizations must rely on outside
sources or expertise to choose and deploy appropriate cloud control and assurance
systems.
4. Dynamic Cloud Environment: Cloud environments are ever-changing and dynamic.
COBIT 5 may need to be updated and adjusted on a regular basis to accommodate new
technology, emerging risks, and changing regulatory requirements. Organizations
must stay current in order to keep their control and assurance practices relevant.
(SLAs) that explicitly explain expectations, duties, and performance indicators should
be established.
5. Risk Management: Risk management includes identifying and assessing the hazards
connected with cloud adoption, as well as developing risk mitigation techniques. This
involves examining security procedures, determining the dependability and availabil-
ity of cloud services, and dealing with data privacy and confidentiality problems.
6. Data Management: Establish data management practices to assure the confidentiality,
integrity, and availability of cloud-stored data. Data classification, encryption, backup
and recovery procedures, and adherence to data protection requirements are all part
of this.
7. Incident Response and Forensics: Create cloud-specific incident response strategies,
including methods for identifying and reacting to security problems. When creating
investigative methods, keep in mind the particular problems of cloud forensics, such
as data dispersion, shared resources, and multi-tenancy.
8. Performance Measurement: Define and monitor key performance indicators (KPIs)
to assess the efficacy and efficiency of cloud services. Assess and report on the
performance and value supplied by cloud services on a regular basis to ensure they
fulfill business needs.
9. Continuous Improvement: Implement a continuous improvement process for cloud
services, including regular reviews and assessments to identify areas for enhancement.
Continuously monitor emerging cloud technologies, industry trends, and regulatory
changes to ensure ongoing alignment with best.
10. Security Awareness and Training: Provide ongoing security awareness and training
to educate employees about cloud security risks and best. Foster a culture of security
awareness and accountability within the organization.
Each phase of the NIST architecture for securing cloud infrastructure necessitates
the use of a variety of tools and technologies. Here, are some regularly used tools that
might help with each step. Table 6 gives information about tools required to implement
NIST framework
Controls Description
Asset inventory: Keep track of all cloud-based assets, including data, apps, systems, and
Asset Management infrastructure components.
Controls: Classification of assets: Classify cloud assets based on their criticality and sensitivity to ensure
appropriate security measures are applied.
Identity and access management: Implement controls to manage user identities, authentication, and
authorization for accessing cloud resources.
Access Controls
Control and monitoring of privileged access to cloud environments to reduce the danger of
unauthorised acts.
Encryption: Use encryption technologies to safeguard data at rest and in transit in the cloud.
Cryptographic Controls Key management: Establish proper key management processes to ensure the secure generation,
storage, and destruction of encryption keys.
Incident response planning: Create and implement a cloud incident response plan that outlines roles,
Incident Management responsibilities, and processes for dealing with security events.
Controls Logging and monitoring: Implement logging and monitoring mechanisms to detect and respond to
security events and potential breaches within the cloud environment.
Supplier evaluation: Evaluate and choose cloud service providers (CSPs) based on their security
Supplier Management capabilities and compliance with recognised security standards.
Controls Contractual agreements: In contracts with CSPs, define specific security standards and duties, such
as data protection, incident reporting, and compliance obligations.
Network 2023, 3, FOR PEER REVIEW Legal and regulatory compliance: Ensure that all applicable laws, regulations, and contractual duties 18
for information security and data protection in the cloud are met.
Compliance Controls
Auditing and evaluation: Conduct frequent audits and evaluations to ensure compliance with
security measures and standards.
27002Implement
as well as seven additional
procedures cloud-related
to ensure the logical controls
and physical (As
separation of shown inwithin
client data Figurethe 4) that ad-
dress the following. cloud environment.
Data Protection Controls
Establish data backup and recovery mechanisms to prevent data loss or destruction within the
cloud environment.
3.3.2. Benefits
ISO/IEC 27017 can help enterprises in [32]:
1. Within the Cloud computing environment, they must safeguard their information
assets.
2. Comply with all applicable laws and regulations.
3. Reduce the likelihood of data security problems.
4. Reduce the need for redundant controls to save money.
analyzing hazards in cloud computing systems. The NIST Risk Management Framework
(RMF) or industry-specific risk assessment methodology are two examples.
Tools for Evaluating Cloud Service Providers (CSPs): It is critical to analyze CSP
security capabilities and adherence to ISO 27017 criteria when selecting and assessing CSPs.
Cloud security evaluation questionnaires and vendor security assessment frameworks, for
example, can help in assessing and comparing CSPs based on their security controls and
practices.
Cloud Security Monitoring and Management Tools: Putting in place effective secu-
rity controls and monitoring in a cloud environment frequently necessitates the use of
specialized tools. These technologies aid in the monitoring of cloud infrastructure, the
detection of security issues, the management of access restrictions, and the enforcement
of security rules. Cloud security platforms, security information and event management
(SIEM) systems, and identity and access management (IAM) solutions are some examples.
Documentation and Policy Templates: Using templates and frameworks will help you
develop the relevant documentation and policies in accordance with ISO 27017. These
materials may be used to develop an information security policy, risk assessment reports,
incident response plans, and other necessary documentation. Templates are accessible from
a variety of sources, including industry groups, consultancies, and information security
organizations.
Training and awareness programs can help educate workers and stakeholders about
ISO 27017 and its standards. These can include e-learning courses, workshops, and aware-
ness campaigns targeted to certain organizational roles and responsibilities.
Audit and Compliance Tools: Tools that aid in performing internal audits, monitoring
ISO 27017 compliance, and tracking remedial actions can be beneficial in maintaining an
effective ISMS. These systems can automate audit operations, create compliance reports,
and streamline nonconformity and corrective action management.
3.4.1. Strengths
1. Standardized Assessment: The CSA STAR framework provides a standardized way
to evaluate CSP security posture. It offers a standardized set of control objectives and
criteria that organizations may use to evaluate and compare various cloud service
providers.
2. Transparency and accountability: The framework encourages CSPs to give thorough
information about their security, data handling methods, and regulatory compliance.
Customers may thus make educated judgments when purchasing and using cloud
services.
3. Third-Party Certification: The CSA STAR program provides a certification mech-
anism for CSPs to certify compliance with the CSA’s security principles and best.
This accreditation gives clients peace of mind about the security of their selected
cloud services.
Network 2023, 3 440
3.4.2. Limitations
1. Reliance on Self-Assessment: The CSA STAR methodology is based on self-assessment
by cloud service providers. While CSPs are urged to submit accurate and full infor-
mation, the framework makes no guarantees regarding the quality or completeness of
the information given. Customers must use caution and check the promises provided
by CSPs.
2. Developing Technology Coverage Is Limited: The CSA STAR framework may not
adequately address the security problems associated with developing technologies
or niche cloud services. As technology advances, new security issues that are not
expressly addressed in the framework may emerge.
3. Lack of Enforcement: CSPs’ compliance with the CSA STAR framework is entirely
voluntary. Although the framework promotes openness and best, it lacks legal or
regulatory enforcement measures. Organizations must evaluate the credibility of a
CSP’s promises and adopt extra security measures depending on their unique needs.
SixPillars
Figure5.5.Six
Figure PillarsofofAWS
AWS(Source:
(Source: Tutorials Dojo).
Tutorials Dojo).
3.5.1. Pillars
3.5.1. Pillars
Security: Security is concerned with the safeguarding of information, systems, and
assets throughSecurity
Security: is concerned
secure design with the safeguarding of information, systems, and
and execution.
assetsReliability:
through secure design and execution.
Ensures that systems can recover from faults, scale automatically, and
Reliability:
mitigate Ensures that systems can recover from faults, scale automatically, and
interruptions.
mitigate interruptions.
Performance efficiency: Performance efficiency is concerned with optimizing resource
Performance
utilization in orderefficiency:
to improvePerformance efficiencywhile
system performance is concerned with optimizing re-
lowering expenses.
sourceOperational
utilization in order to improve
Excellence: system
Operational performance
Excellence while lowering
is concerned with the expenses.
effective opera-
tion Operational
and managementExcellence: Operational
of systems in orderExcellence is concerned
to deliver corporate with the effective oper-
value.
ation Cost
and management
Optimization: of systems in order to seeks
Cost optimization delivertocorporate value. over the system’s
reduce expenses
Cost Optimization: Cost optimization seeks to reduce
lifespan while preserving required performance and functionality. expenses over the system’s
lifespan while preserving
Sustainability: The required performance
sustainability andconsiders
discipline functionality.
your company’s long-term
Sustainability:
environmental, The sustainability
economic, and societaldiscipline
effects. considers your company’s long-term en-
vironmental, economic, and societal effects.
3.5.2. Advantages
3.5.2.
1. Advantages
The following are some of the advantages of adopting the AWS Well-Architected
1. The Framework:
following are some of the advantages of adopting the AWS Well-Architected
2. Framework:
Best Practices: The framework includes a collection of tried-and-true best practices for
2. Best creating, deploying,
Practices: and running
The framework AWS aapplications.
includes collection ofFollowing thesebest
tried-and-true bestpractices
practices
for creating, deploying, and running AWS applications. Following these best prac-
tices will help you enhance your system’s overall architecture, security, dependabil-
ity, performance, and cost-efficiency.
3. Mitigation of Risks: The framework assists in identifying possible risks and vulnera-
bilities in your architecture. By tackling these risks early on, you may improve your
Network 2023, 3 442
will help you enhance your system’s overall architecture, security, dependability,
performance, and cost-efficiency.
3. Mitigation of Risks: The framework assists in identifying possible risks and vulnera-
bilities in your architecture. By tackling these risks early on, you may improve your
systems’ security, compliance, and resilience, minimizing the possibility of security
breaches, downtime, or performance difficulties.
4. Cost Optimization: By implementing the Cost Optimization pillar, you will be able
to analyze and optimize your AWS resource utilization and expenses. This assists in
identifying possibilities to cut needless spending, remove inefficient resources, and
enhance overall cost efficiency, potentially saving money.
5. The Performance Efficiency pillar is concerned with optimizing the performance of
your applications. You may increase the responsiveness, scalability, and performance
of your systems by using best practices such as auto-scaling, caching, and efficient
data storage.
6. The framework emphasizes operational efficiency, allowing organizations to optimize
their procedures and workflows. You may improve system dependability, streamline
processes, and save manual work by integrating automation, monitoring, and effective
incident response systems.
7. Scalability and Flexibility: By following the guidelines of the framework, you may
build your applications to be highly scalable and adaptable, allowing them to handle
variable workloads and adapt to changing business requirements. This allows you to
adapt to market needs fast and grow your systems as needed.
8. AWS Service Alignment: The Well-Architected Framework is compatible with a
variety of AWS services, features, and technologies. You may use the framework
to construct powerful, scalable, and cost-effective solutions by using AWS’s vast
spectrum of services.
3.5.3. Limitations
1. While AWS Well-Architected has many advantages, it also has several restrictions and
drawbacks that should be considered:
2. Adoption of the Well-Architected Framework may include a learning curve for teams
who are unfamiliar with AWS or cloud architecture. To successfully comprehend and
use the best, training and upskilling are required.
3. Overemphasis on AWS Services: The Well-Architected Framework strongly encour-
ages the usage of AWS services, which may result in vendor lock-in. Organizations
may grow unduly reliant on AWS-specific services, making migration to alternative
cloud providers difficult if necessary.
4. Assessing Complexity: Performing Well-Architected reviews and evaluations can
take a long time and a lot of resources. It necessitates data collection and analysis,
architectural evaluations, and change implementation, which may be a big endeavor
for organizations.
4. Design for Well-Architected: Align your architecture with the Well-Architected Frame-
work. Consider the AWS best practices and recommendations for each pillar. Address
any risks or deficiencies that have been discovered.
5. Create an Action Plan: Make a thorough action plan outlining the measures needed to
close the identified gaps. Define tasks, assign responsibilities, and establish timetables
for achieving improvements.
6. Test and validate: Perform extensive testing to check that the introduced modifications
have remedied the highlighted issues and that the workload is functioning as intended.
Validate the architecture’s performance, security, and dependability.
7. Review and Improve: Review your architecture on a regular basis to ensure that
it adheres to the Well-Architected Framework. Formal Well-Architected Reviews
should be conducted with AWS Solution Architects or authorized partners to obtain
professional perspectives and recommendations for future enhancements.
8. Foster a Culture of Best Practices: Within your organization, foster a culture of best
practices and architectural excellence. Educate and train your teams on the Well-
Architected Framework’s concepts and urge them to use them in their everyday
work.
Several tools are available to help you adopt the AWS Well-Architected Framework.
Here are some examples of widely used tools:
The official AWS Well-Architected Tool provides a thorough framework for examining
and grading workloads against Well-Architected best practices. It employs a questionnaire-
based technique, creates reports, and makes suggestions for enhancement.
AWS Trusted Advisor is an AWS service that gives automatic advice for optimizing
your AWS infrastructure. It analyses your AWS infrastructure and makes suggestions
based on the Well-Architected Framework to help detect possible security, performance,
and cost optimization concerns.
AWS CloudFormation is an Infrastructure as Code (IaC) solution that lets you create
and provision AWS services using a declarative template. It aids in the consistent and
repeatable deployment of infrastructure, allowing you to execute Well-Architected best
practices in a controlled and automated way.
AWS Config is a service that gives a full inventory of your AWS resources and records
configuration changes over time. By regularly monitoring and reviewing the configuration
of your resources, it may assist in verifying that your infrastructure complies with the
Well-Architected principles.
AWS CloudWatch: CloudWatch is an observability and monitoring service that gathers
and records metrics, logs, and events from your AWS services. It may be used to monitor
the performance and availability of your applications and infrastructure, allowing you to
spot possible problems and verify that the Well-Architected principles are followed.
AWS Cost Explorer: A cost management tool that allows you to analyze and visu-
alize your AWS spending. It analyses your consumption patterns, discovers cost-saving
options, and helps you optimize your infrastructure expenses in accordance with the
Well-Architected cost optimization pillar.
Finally, the cloud security framework gives a thorough overview and analysis of
several cloud security frameworks, models, and best practices. The purpose of this section
was to investigate the present state of cloud security and to emphasize the significance of
adopting robust security mechanisms in cloud systems.
services such as Microsoft Office 365, Gmail, and Dropbox. Adopting cloud computing has
several benefits, including anytime-anywhere accessibility, increased geographic coverage,
lower infrastructure investment, and more [34]. There are, however, security risks involved
with cloud computing. These risks can jeopardize the security of cloud-stored data, pro-
grams, and infrastructure. With organizations increasingly utilizing cloud services, it is
Network 2023, 3, FOR PEER REVIEW critical to recognize and manage these threats in order to protect the confidentiality, in-26
tegrity, and availability of cloud resources. The diagram below depicts some frequent cloud
security issues. The given Figure 6 describes some common cloud security problems [35–37]
and Table 9 describe the effects on cloud & affected cloud services.
4.1. 6.
Figure Managed Security
Top Cloud Threats
Security threats.
4.1.1. Abuse of Cloud Computing
Table 9. Criminals
Comparative Study cloud
employ of Cloud security problems.
computing to target victims and misappropriate cloud ser-
vices. They conduct DDoS assaults, phishing, email spam, and Bitcoin mining. Breaching
Threats Affected Cloud Services Effects Solutions
a user’s cloud infrastructure can have serious ramifications for businesses. As a result,
Validation
it is critical for businesses to monitor cloudLoss, Service
access and applyNetwork analysis,
risk mitigation Robust
measures.
Abuse of Cloud Computing PaaS and IaaS Fraud, Strong attacks due to registration and multifactor
In the event of cloud service misuse, disaster recovery and data loss prevention tech-
niques are critical to the recovery unidentified
process. Cloudsign-up authentication
computing abuse can take various forms,
including [38,39]: Improper authentication and Data Encryption, Strong ac-
Insecure API PaaS, SaaS, IaaS authorization, the wrong cess control and multi-factor
transmission of Content authentication
Assets damage, productivity Duty Segregation, IAM poli-
Malicious Insider PaaS, SaaS and IaaS
loss and confidentiality break cies
Network 2023, 3 445
• Unauthorized Access
• Data Breaches
• Resource misuse
• Cryptocurrency mining
• Spamming and phishing
Solution:
Use rigorous authentication measures such as multi-factor authentication (MFA) to
ensure that only authorized users may access cloud services. Review and adjust user access
rights depending on their positions and responsibilities on a regular basis.
Monitor and analyze user activities: Use security monitoring technologies to detect
any unusual or suspicious activity in the cloud environment. Use log management and
analysis software to track and investigate any suspected misuse or unauthorized access.
Encrypt sensitive data: Encrypt data in transit and at rest using encryption methods.
Encrypt critical data before storing it in the cloud, and make sure the cloud and users have
safe communication routes.
Affected Cloud
Threats Effects Solutions
Services
Validation Loss, Service Fraud, Network analysis, Robust
Abuse of Cloud Computing PaaS and IaaS Strong attacks due to unidentified registration and multifactor
sign-up authentication
Improper authentication and Data Encryption, Strong access
Insecure API PaaS, SaaS, IaaS authorization, the wrong control and multi-factor
transmission of Content authentication
Assets damage, productivity loss
Malicious Insider PaaS, SaaS and IaaS Duty Segregation, IAM policies
and confidentiality break
Removal, modification and stealing Disaster, backup and recovery
Data Loss PaaS, SaaS and IaaS
of confidential and personal data management
Adoption of strong
Service and Account Breaching into critical areas of cloud
PaaS, SaaS and IaaS authentication, and security
hijacking and server, access of root account
policies.
5. Conclusions
Finally, several major results and consequences have emerged as a result of intensive
study, analysis, and review. We looked at popular cloud security frameworks including
the NIST Cloud Security Framework, the CSA STAR, ISO/IEC 27017, COBIT5 and AWS
Network 2023, 3 448
Well-architected framework throughout the chapter. These frameworks give useful guide-
lines and controls for protecting cloud computing systems, addressing critical security
concerns, and maintaining data and resource confidentiality, integrity, and availability. The
investigation indicated that there are several frameworks available to meet the particular
issues involved with protecting cloud systems in terms of cloud security frameworks. Each
framework has its own set of characteristics, strengths, and shortcomings. When several
frameworks are compared and contrasted, it becomes clear that no single framework can
fully fulfill all criteria for any cloud deployment because every framework has disadvan-
tages and limitations. To choose the best framework or mix of frameworks, organizations
must carefully examine their unique demands, compliance requirements, and risk tolerance.
Furthermore, the research effort provided light on typical challenges and weaknesses in
cloud security. Data breaches, unauthorized access, unsecured APIs, insider risks, and
insufficient security measures are examples of these. These problems highlight the crucial
importance of strong security, extensive risk assessments, and constant monitoring and
enhancement of cloud infrastructures. Cloud security issues offer substantial concerns for
organizations that use cloud computing services. These issues, however, may be efficiently
managed with proactive steps and solid security systems. Data breaches, unprotected APIs,
cloud computing abuse, and hostile insider threats are just a few of the major cloud security
issues. Organizations should focus on adopting solutions such as tight access restrictions,
encryption of sensitive data, frequent security assessments, monitoring and analysis of user
actions, and robust authentication systems such as multi-factor authentication to address
these issues. Furthermore, educating users on cloud security risks and recommending and
utilizing third-party security services can all help to improve cloud security.
Author Contributions: Methodology, M.C., S.S.; Formal analysis, M.C.; Investigation, M.C.; Re-
sources M.C., S.S.; Writing—review & editing, M.C., S.S.; Visualization, M.C., S.S. All authors have
read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Data Availability Statement: No new data were created or analyzed in this study. Data sharing is
not applicable to this article.
Acknowledgments: Special Thanks to: Hasmukhlal, Kailasben, Darpen, Sita Ma & Rushika, pals:
Aayush, Divyang, Mitul, Karan, Chetav, Sooraj, Sagar Mal sen, Prateek Kumawat.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Rayaprolu, A. How-Many-Companies-Use-Cloud-Computing/#gref, Techjury, February 2023. Available online: https://techjury.
net/blog (accessed on 2 April 2023).
2. Marston, S.; Li, Z.; Bandyopadhyay, S.; Zhang, J.; Ghalsasi, A. Cloud computing—The business perspective. Decis. Support Syst.
2011, 51, 176–189.
3. Weinhardt, C.; Anandasivam, A.; Blau, B.; Borissov, N.; Meinl, T. Cloud Computing—A Classification, Business Models, and
Research Directions. Bus. Inf. Syst. Eng. 2009, 1, 391–399.
4. Bhushan, K.; Gupta, B.B. Security challenges in cloud computing: State-of-art. Int. J. Big Data Intell. 2017, 4, 81–107.
5. Di Giulio, C.; Sprabery, R.; Kamhoua, C.; Kwiat, K.; Campbell, R.H.; Bashir, M.N. Cloud Standards in Comparison: Are New Security
Frameworks Improving Cloud Security? IEEE: Honololu, HI, USA, 2017.
6. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; et al. A view
of cloud computing. Commun. ACM 2010, 53, 50–58.
7. Gartner. Cloud-Strategy; Gartner: Stamford, CT, USA, 2020. Available online: https://www.gartner.com/en/information-
technology/insights/cloud-strategy (accessed on 4 April 2023).
8. Amara, N.; Huang, Z.; Awais, A. Cloud Computing Security Threats and Attacks with Their Mitigation Techniques. In Proceedings
of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing,
China, 12–14 October 2017.
9. Mohanan, S.; Sridhar, N.; Bhatia, S. Comparative Analysis of Various Cloud Security Frameworks. In Proceedings of the 6th
International Congress on Information and Communication Technology, London, UK, 25–26 February 2019.
10. Popa, D.; Cremene, M.; Borda, M.; Boudaoud, K. A security framework for mobile cloud applications. In Proceedings of the 11th
RoEduNet International Conference, Sinaia, Romania, 17–19 January 2013.
Network 2023, 3 449
11. Ukil, A.; Jana, D.; Das, A. A Security Framework in Cloud Computing Infrastructure. Int. J. Netw. Secur. Its Appl. 2013, 5, 11–24.
[CrossRef]
12. Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J.
Internet Serv. Appl. 2013, 4, 1–13. [CrossRef]
13. Grobauer, B.; Walloschek, T.; Stocker, E. Understanding Cloud Computing Vulnerabilities; IEEE: Piscataway, NJ, USA, 2011.
14. Rodero-Merino, L.; Vaquero, L.M.; Caron, E.; Muresan, A.; Desprez, F. Building Safe PaaS Clouds: A Survey on Security in
Multitenant Software Platforms. Comput. Secur. 2012, 31, 96–108.
15. Tsochev, G.R.; Trifonov, R.I. Cloud computing security requirements: A Review. IOP Conf. Ser. Mater. Sci. Eng. 2022, 1216, 012001.
16. Ristenpart, T.; Tromer, E.; Shacham, H.; Savage, S. Hey you get off of my cloud: Exploring information leakage in third-party
compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA,
9–13 November 2009.
17. European Commission. MEMO_12_713. European Commission. 27 September 2012. Available online: https://ec.europa.eu/
commission/presscorner/detail/en/ (accessed on 4 April 2023).
18. Subashini, S.; Kavitha, V. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 2011,
34, 1–11.
19. Kamara, S.; Lauter, K. Cryptographic Cloud Storage. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg,
Germany, 2010; Volume 6054, pp. 136–149.
20. Sonam Sudha, M.A. Identity and Access Management in Cloud. J. Res. Appl. Sci. 2014, 7.
21. Neves Calheiros, R.; Ranjan, R.; Beloglazov, A.; De Rose, C.A.; Buyya, R. CloudSim: A toolkit for modeling and simulation of
cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exp. 2011, 41, 23–50.
22. You, P.; Peng, Y.; Liu, W.; Xue, S. Security Issues and Solutions in Cloud Computing. In Proceedings of the 32nd IEEE International
Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012.
23. Chang, V.; Ramachandran, M. Towards Achieving Data Security with the Cloud Computing Adoption Framework. IEEE Trans.
Serv. Comput. 2016, 9, 246–258.
24. Khan, M.A. A survey of security issues for cloud computing. J. Netw. Comput. Appl. 2016, 71, 11–29.
25. Youssef, A.; Alageel, M. A Framework for Secure Cloud Computing. Int. J. Comput. Sci. Issues 2012, 9.
26. Patel, V. A framework for secure and decentralized sharing of medical imaging data. Health Inform. J. 2019, 25, 1398–1411.
[CrossRef]
27. ISACA. Security Considerations for Cloud Computing; ISACA: Schaumburg, IL, USA, 2012.
28. OIlloh, O.; Aghili, S.; Butakov, S. Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates. In Proceedings
of the 12th International Conference on Services Oriented Computing 2014, Paris, France, 3–6 November 2014.
29. Mell, P.; Grance, T. The NIST Definition of Cloud Computing (NIST Special Publication 800-145); National Institute of Standards and
Technology: Gaithersburg, MD, USA, 2011.
30. Jansen, W.; Grance, T. Guidelines on Security and Privacy in Public Cloud Computing; NIST: Gaithersburg, MD, USA, 2011.
31. NIST. NIST US Government Cloud Computing Technology Roadmap, Release 1.0 (Draft); NIST: Gaithersburg, MD, USA, 2011.
32. i.governance. ISO-27017 and ISO-27018. Available online: https://www.itgovernance.co.uk/iso-27017-and-iso-27018 (accessed
on 4 April 2023).
33. CSA. Security Guidance for Critical Areas of Focus in Cloud Computing v3.0; CSA: Toronto, ON, Canada, 2011.
34. Sharma, R.; Trivedi, R.K. Literature review: Cloud Computing—Security Issues, Solution and Technologies. Int. J. Eng. Res. 2014,
3, 221–225. [CrossRef]
35. Park, S.-J.; Lee, Y.-J.; Park, W.-H. Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle
for Sustainable Social Network. Commun. Secur. Soc.-Oriented Cyber Spaces 2021, 2021, 3686423.
36. Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the internet of things: A review. In Proceedings of the 10th International Conference
on Frontiers of Information Technology, Hangzhou, China, 23–25 March 2012.
37. Rittinghouse, J.W.; Ransome, J.F. Cloud Computing: Implementation, Management, and Security; CRC Press: Boca Raton, FL, USA,
2016.
38. Rackwareinc. Preventing-the-Top-9-Threats-in-Cloud-Computing. Rackwareinc. Available online: https://www.rackwareinc.
com (accessed on 4 April 2023).
39. Kazim, M.; Zhu, S.Y. A survey on top security threats in cloud computing. Int. J. Adv. Comput. Sci. Appl. 2015, 6. [CrossRef]
40. Tessian. What-Is-a-Malicious-Insider. Tessian. 20 February 2023. Available online: https://www.tessian.com (accessed on 4 April
2023).
41. CSA Top Threats Working Group. Top-Threat-2-to-Cloud-Computing-Insecure-Interfaces-and-Apis. CSA. 30 July 2022. Available
online: https://cloudsecurityalliance.org/blog/2022/07/30/top-threat-2-to-cloud-computing-insecure-interfaces-and-apis/
(accessed on 4 April 2023).
42. Zhu, G.; Yin, Y.; Cai, R.; Li, K. Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment. In Proceedings
of the IEEE 10th International Conference on Cloud Computing, Honololu, HI, USA, 25–30 June 2017.
43. Gillis, J. 10-Common-Causes-of-Data-Loss. Newera. 31 January 2023. Available online: https://www.neweratech.com/us/blog/
10-common-causes-of-data-loss/ (accessed on 4 April 2023).
Network 2023, 3 450
44. Tissir, N.; El Kafhali, S.; Aboutabit, N. Cybersecurity management in cloud computing: Semantic literature. J. Reliab. Intell.
Environ. 2020, 7, 69–84.
45. Lord, N. What-Cloud-Account-Hijacking. Digital Gaurdian. 11 September 2018. Available online: https://www.digitalguardian.
com/blog/ (accessed on 4 April 2023).
46. Buyya, R.; Yeo, C.S.; Venugopal, S.; Broberg, J.; Brandic, I. Cloud computing and emerging IT platforms: Vision, hype, and reality
for delivering computing as the 5th utility. Future Gener. Comput. Syst. 2009, 25, 599–616.
47. Vaquero, L.M.; Rodero-Merino, L.; Caceres, J.; Lindner, M. A break in the clouds: Towards a cloud definition. ACM SIGCOMM
Comput. Commun. Rev. 2009, 35, 50–55. [CrossRef]
48. Dinh, H.T.; Lee, C.; Niyato, D.; Wang, P. A survey of mobile cloud computing: Architecture, applications, and approaches. Wirel.
Commun. Mob. Comput. 2013, 13, 1587–1611.
49. Ali, M.; Khan, S.U.; Vasilakos, A.V. Security in cloud computing: Opportunities and challenges. Inf. Sci. 2015, 305, 357–383.
50. Zhang, S.; Zhang, S.; Chen, X.; Huo, X. Cloud computing research and development trend. In Proceedings of the 2010 Second
International Conference on Future Networks, Sanya, China, 22–24 January 2010.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.