Madan, Vivek (2025) Cloud security in practice: A technical guide to confidentiality, integrity, and availability at scale. World Journal of Advanced Research and Reviews, 26 (2). pp. 2165-2171. ISSN 2581-9615
![WJARR-2025-1904.pdf [thumbnail of WJARR-2025-1904.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1904.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Cloud computing has revolutionized how businesses deploy and scale IT infrastructure. However, this shift introduces significant security challenges that require well-architected security techniques across the cloud ecosystem. This paper presents comprehensive techniques to ensure confidentiality, integrity, and availability of data and systems in cloud environments. Covered topics include data encryption, secure storage, key management, logging and monitoring, virtual private cloud (VPC) security, container security, DAST and SAST scanning, baseline imaging, configuration management, and change control practices. These are mapped to CSA's Cloud Controls Matrix (CCM) and CAIQ v4.0 domains to demonstrate holistic cloud risk management. Real-world examples, missteps, and best practices are discussed
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.2.1904 |
Uncontrolled Keywords: | Cloud Security; Data Encryption; CSA; CAIQ; Cloud Controls Matrix; Zero Trust; Compliance |
Depositing User: | Editor WJARR |
Date Deposited: | 20 Aug 2025 11:03 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3089 |