Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud

被引:0
作者
Alharthi, Dalal N. [1 ]
机构
[1] Univ Arizona, Tucson, AZ 85721 USA
来源
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS | 2023年
关键词
Cloud Migration; Cloud Transformation; Cloud Security; Cloud Strategy; Attacking Public Cloud; Defending Public Cloud;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The state of cloud security is evolving. Many organizations are migrating their on-premises data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness, scalability, reliability, and flexibility. Yet, cloud environments also raise certain security concerns that may hinder their adoption. Cloud security threats may include data breaches/leaks, data loss, access management, insecure APIs, and misconfigured cloud storage. The security challenges associated with cloud computing have been widely studied in previous literature and different research groups. This paper conducted a systematic literature review and examined the research studies published between 2010 and 2023 within popular digital libraries. The paper then proposes a comprehensive Secure Cloud Migration Strategy (SCMS) that organizations can adopt to secure their cloud environment. The proposed SCMS consists of three main repeatable phases/processes, which are preparation; readiness and adoption; and testing. Among these phases, the author addresses tasks/projects from the different perspectives of the three cybersecurity teams, which are the blue team (defenders), the red team (attackers), and the yellow team (developers). This can be used by the Cloud Center of Excellence (CCoE) as a checklist that covers defending the cloud; attacking and abusing the cloud; and applying the security shift left concepts. In addition to that, the paper addresses the necessary cloud security documents/runbooks that should be developed and automated such as incident response runbook, disaster recovery planning, risk assessment methodology, and cloud security controls. Future research venues and open cloud security problems/issues were addressed throughout the paper. The ultimate goal is to support the development of a proper security system to an efficient cloud computing system to help harden organizations' cloud infrastructures and increase the cloud security awareness level, which is significant to national security. Furthermore, practitioners and researchers can use the proposed solutions to replicate and/or extend the proposed work.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 25 条
[1]   Security and Privacy in Cloud Computing: Technical Review [J].
Abdulsalam, Yunusa Simpa ;
Hedabou, Mustapha .
FUTURE INTERNET, 2022, 14 (01)
[2]  
Ahmad Naim, 2020, Innovations in Electronics and Communication Engineering. Proceedings of the 8th ICIECE 2019. Lecture Notes in Networks and Systems (LNNS 107), P737, DOI 10.1007/978-981-15-3172-9_69
[3]  
Ahmad Naim, 2018, 2018 5 IEEE INT C EN
[4]   Assessing information security risks in the cloud: A case study of Australian local government authorities [J].
Ali, Omar ;
Shrestha, Anup ;
Chatfield, Akemi ;
Murray, Peter .
GOVERNMENT INFORMATION QUARTERLY, 2020, 37 (01)
[5]   Understanding the challenges and novel architectural models of multi-cloud native applications - a systematic literature review [J].
Alonso, Juncal ;
Orue-Echevarria, Leire ;
Casola, Valentina ;
Torre, Ana Isabel ;
Huarte, Maider ;
Osaba, Eneko ;
Lobo, Jesus L. .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01)
[6]  
Alshammari MM, 2017, 2017 4TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGIES AND APPLIED SCIENCES (ICETAS)
[7]  
AlZain M. A., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P5490, DOI 10.1109/HICSS.2012.153
[8]  
Araujo T.M.R.P.D., 2021, THESIS
[9]  
Casola Valentina, 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), P24, DOI 10.1109/WETICE.2018.00012
[10]   A Cloud SecDevOps Methodology: From Design to Testing [J].
Casola, Valentina ;
De Benedictis, Alessandra ;
Rak, Massimiliano ;
Salzillo, Giovanni .
QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2020, 2020, 1266 :317-331