From deployment to defense: Real world strategies for enhancing cloud security through preventative infrastructure controls

Kathuria, Ranjan (2025) From deployment to defense: Real world strategies for enhancing cloud security through preventative infrastructure controls. International Journal of Science and Research Archive, 16 (1). pp. 781-787. ISSN 2582-8185

Abstract

Cloud infrastructure has become foundational to modern digital services; yet recent high profile breaches have exposed critical weaknesses in cloud security design. This research addresses the problem of infrastructure level vulnerabilities that persist even when application level security is robust. Through analysis of documented breaches at Capital One; Tesla; Accenture; and Uber; this study demonstrates that misconfigurations; insufficient access controls; and inadequate monitoring are recurring factors that enable attackers to compromise sensitive data and disrupt operations. To address these risks; this paper proposes a secure-by-design cloud architecture that integrates preventative controls at every layer. The methodology includes a comparative analysis of breach reports and security documentation; followed by the development of a reference architecture featuring web application firewalls; private subnets; IMDSv2; restrictive security groups; encrypted storage; autoscaling; centralized logging; and secret management. The design is evaluated against the root causes of the selected breaches to demonstrate its effectiveness. The results show that implementing these preventative infrastructure controls would have directly mitigated the vulnerabilities exploited in the analyzed incidents. The research contributes to a practical; adaptable framework for organizations seeking to enhance cloud security and reliability. The conclusion emphasizes that proactive; infrastructure focused security measures are essential for defending against evolving cloud threats; and that secure design must be prioritized alongside application development from the outset.

Item Type: Article
Official URL: https://doi.org/10.30574/ijsra.2025.16.1.2059
Uncontrolled Keywords: Secure Cloud Design; IMDSv2; Storage; WAF; Security Logging
Date Deposited: 01 Sep 2025 12:12
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/4458