Cloud security in practice: A technical guide to confidentiality, integrity, and availability at scale

Madan, Vivek (2025) Cloud security in practice: A technical guide to confidentiality, integrity, and availability at scale. World Journal of Advanced Research and Reviews, 26 (2). pp. 2165-2171. ISSN 2581-9615

[thumbnail of WJARR-2025-1904.pdf] Article PDF
WJARR-2025-1904.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 488kB)

Abstract

Cloud computing has revolutionized how businesses deploy and scale IT infrastructure. However, this shift introduces significant security challenges that require well-architected security techniques across the cloud ecosystem. This paper presents comprehensive techniques to ensure confidentiality, integrity, and availability of data and systems in cloud environments. Covered topics include data encryption, secure storage, key management, logging and monitoring, virtual private cloud (VPC) security, container security, DAST and SAST scanning, baseline imaging, configuration management, and change control practices. These are mapped to CSA's Cloud Controls Matrix (CCM) and CAIQ v4.0 domains to demonstrate holistic cloud risk management. Real-world examples, missteps, and best practices are discussed

Item Type: Article
Official URL: https://doi.org/10.30574/wjarr.2025.26.2.1904
Uncontrolled Keywords: Cloud Security; Data Encryption; CSA; CAIQ; Cloud Controls Matrix; Zero Trust; Compliance
Depositing User: Editor WJARR
Date Deposited: 20 Aug 2025 11:03
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/3089