Научная статья на тему 'THE ROLE OF CLOUD TECHNOLOGIES IN BUILDING RESILIENT CYBERSECURITY SYSTEMS'

THE ROLE OF CLOUD TECHNOLOGIES IN BUILDING RESILIENT CYBERSECURITY SYSTEMS Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY
1
0
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
сloud technologies (CT) / cybersecurity / resilience / threat detection / access control / encryption / risk management / data protection / облачные технологии (ОТ) / кибербезопасность / устойчивость / обнаружение угроз / контроль доступа / шифрование / управление рисками / защита данных

Аннотация научной статьи по СМИ (медиа) и массовым коммуникациям, автор научной работы — Anar Israfilov

This article analyzes the role of cloud technologies (CT) as scalable, flexible, and reliable tools for data protection, threat detection, and incident response. It examines key aspects such as the shared responsibility model, encryption, and access control. The paper demonstrates various methods and practices for using CT to build resilient cybersecurity systems. It discusses case studies of American companies, including Capital One and NASA, to showcase the successful implementation of cloud security measures.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

РОЛЬ ОБЛАЧНЫХ ТЕХНОЛОГИЙ В ПОСТРОЕНИИ УСТОЙЧИВЫХ СИСТЕМ КИБЕРБЕЗОПАСНОСТИ

В данной статье анализируется роль облачных технологий (ОТ) как масштабируемых, гибких и надежных инструментов для защиты данных, обнаружения угроз и реагирования на инциденты. Рассматриваются ключевые аспекты, такие как модель разделения ответственности, шифрование и контроль доступа. Демонстрируются различные методы и практики по использованию ОТ для создания устойчивых систем кибербезопасности. Обсуждаются кейсы американских компаний, таких как Capital One и NASA, для демонстрации успешной реализации мер облачной безопасности.

Текст научной работы на тему «THE ROLE OF CLOUD TECHNOLOGIES IN BUILDING RESILIENT CYBERSECURITY SYSTEMS»

THE ROLE OF CLOUD TECHNOLOGIES IN BUILDING RESILIENT CYBERSECURITY SYSTEMS

Anar Israfilov, individual researcher, master's degree Cyberoon Enterprise (Estonia, Tallinn)

DOI:10.24412/2500-1000-2024-9-2-105-109

Abstract. This article analyzes the role of cloud technologies (CT) as scalable, flexible, and reliable tools for data protection, threat detection, and incident response. It examines key aspects such as the shared responsibility model, encryption, and access control. The paper demonstrates various methods and practices for using CT to build resilient cybersecurity systems. It discusses case studies of American companies, including Capital One and NASA, to showcase the successful implementation of cloud security measures.

Keywords: cloud technologies (CT), cybersecurity, resilience, threat detection, access control, encryption, risk management, data protection.

In the modern IT landscape, the evolution of information systems has made cybersecuri-ty a significant priority for organizations in every sector. The growing complexity of computer threats, along with the rapid expansion of digital data and services, has made the implementation of sophisticated safety measures essential. Cloud technologies (CT) have become a key component in this context. They offer a variety of tools and strategies to enhance cybersecurity and safeguard data, applications, and networks effectively.

The implementation of CT delivers a flexible and scalable infrastructure that enables organizations to address safety challenges swiftly. By utilizing cloud services, companies can integrate advanced security measures such as encryption, automated threat detection, and monitoring more efficiently. These platforms operate on a shared responsibility model, that fosters the development of more

robust and comprehensive systems, capable of withstanding the evolving landscape of cyber threats. The aim of this paper - to analyze the role of cloud-based technologies and solutions in building resilient cybersecurity systems.

Main part. Analysis of the concept of cloud-based solutions for cybersecurity

A significant increase in cyber threats has been driven by the rapid evolution of digital technologies and the growing reliance on online services, which are utilized across both mobile and desktop devices [1]. Cybercrimi-nals have become more sophisticated, exploiting vulnerabilities in networks, systems, and applications to steal sensitive data, disrupt services, and cause widespread damage. According to statistics [2], the reported monetary damage caused by cybercrime in the USA exceeded the $12 million mark (fig. 1).

12000 10000 8000 6000 4000 2000

12500

10300

6900

4201

350Д—*

21W^^

lf™ 1450 1418/^ 7Я1 Я00 10,

Fig. 1. Annual amount of monetary damage caused by reported cybercrime in the United States

from 2013 to 2023, million US dollars

- TexHuuecKue HayKU -

At the same time, the adoption of CT has surged, offering organizations scalable, flexible, and cost-effective solutions for data storage, processing, and application deployment [3]. According to statistics, the global cloud computing market size is valued at over $500 billion in 2023 [4]. This convergence of rising various threats and the growing dependence on cloud infrastructure has made cybersecurity a top priority.

Cloud cybersecurity refers to the set of policies, technologies, and controls deployed to protect data, applications, and infrastructure in network-based environments. It encompasses measures to safeguard cloud-based assets from a variety of threats, including data breaches, unauthorized access, malware, and Distributed Denial of Service (DDoS) attacks. Unlike traditional on-premises security, cloud protection must address the complexities of a shared, virtualized, and distributed architecture.

The shared responsibility model is a fundamental concept in cloud cybersecurity, delineating the division of security duties between the cloud service provider (CSP) and the customer. This model varies depending on the type of cloud service in use - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (SaaS).

While customers bear significant responsibility for securing their data and applications, CSP plays a critical role in maintaining a se-

In an IaaS model, the CSP is responsible for securing the underlying infrastructure, including physical servers, storage, and networking. The customer, on the other hand, is responsible for securing everything that runs on top of this infrastructure, such as operating systems, applications, data, and network configurations.

For PaaS offerings, the CSP takes on more responsibilities, including securing the underlying infrastructure and the platform layer (middleware, runtime, etc.). Customers are primarily responsible for securing their applications and data.

In SaaS models, the CSP handles the majority of security concerns, including application security, infrastructure, and platform security. Customers are typically responsible for securing their data and managing user access.

This whole model emphasizes that while CSP offers a secure environment, customers must actively manage and implement their security measures to protect their cloud assets. A failure to understand and act on this shared responsibility can lead to vulnerabilities and potential breaches as cloud environments introduce a unique set of security risks that organizations must address to protect their data (table 1).

cure cloud infrastructure. With the development of artificial intelligence and machine learning in the IT sector, the future of cloud

Table 1. Security threats in cloud services [5]

Area Threats Problems Affected cloud services

Infrastructure threats Data breaches Unauthorized access or retrieval of data, application, or service. IaaS, SaaS, and PaaS

Cloud service abuse Loss of validation service fraud and more vigorous attacks due to unidentified login. PaaS and IaaS

Service threats Service delivery Loss of control of cloud infrastructure. IaaS, SaaS, and PaaS

Insecure interface Improper authorization and incorrect authentication transmission of content.

Platform threats Malicious insiders Infiltration of organizational resources, destruction of asset productivity losses, and impact on operations.

Identity theft An attacker could gain the identity of a valid user to access the usage resources.

cybersecurity has been evolving through these advancements [6]. These tools can enhance threat detection and response capabilities, enabling more proactive security measures, similar to the use of big data analytics [7]. As cloud adoption continues to grow, organizations must remain vigilant and adaptive, ensuring that their cybersecurity measures are robust and responsive to emerging threats.

The implementation of security measures and methods in CT services

Cloud computing has revolutionized the way organizations handle data, offering unparalleled scalability, flexibility, and efficiency. The adoption of such services also introduces new security challenges that require robust and comprehensive measures. It is significant for companies to explore the key methods used to ensure data safety in cloud environments. These techniques can include continuous monitoring and rapid incident response, that are vital components of cloud protection. These processes help detect, respond to, and recover from security incidents in real-time, minimizing the impact of potential breaches.

Encryption is also a foundational element of CT, that provides a means to protect data both in transit and at rest. In cloud environments, sensitive information such as personal data, financial records, and intellectual property must be safeguarded against unauthorized access. This method transforms readable data into an unreadable format using cryptographic algorithms, ensuring that only authorized parties with the correct decryption key can access the original information.

Data encryption at rest involves encrypting data stored in cloud storage systems, databases, and backup services. Different CSP often offer built-in encryption mechanisms, such as AES-256, to secure stored data. By encrypting data at rest, organizations protect their information even if physical security controls are breached. Data encryption in transit means that data traveling between the cloud, users, and applications is vulnerable to interception and man-in-the-middle attacks. Encryption protocols like TLS (Transport Layer Security) and VPNs (Virtual Private Networks) secure data in transit, ensuring that

it cannot be intercepted or tampered with during transmission.

Effective encryption relies on the management of cryptographic keys. Various CSP often offer key management services to generate, store, and manage keys securely. Organizations can choose to use provider-managed keys, or they can implement their own key management system for added control and security.

Access control mechanisms are essential to limit and monitor access to cloud resources. These mechanisms ensure that only authorized users and devices can interact with services and data, minimizing the risk of insider threats and unauthorized access. A framework Identity and Access Management (IAM) is used to manage user identities and their access to cloud resources. These IAM services in cloud environments allow organizations to define roles, permissions, and policies that govern access to various resources. By implementing the principle of least privilege, organizations can restrict users' access rights to only the resources they need for their roles.

Multi-factor authentication (MFA) adds an extra layer of security by requiring users to provide two or more verification factors to gain access to cloud services. This typically includes something the user knows (password), something the user has (security token), and something the user is (biometric verification). The implementation of MFA significantly reduces the risk of unauthorized access due to compromised credentials. Single sign-on (SSO) enables users to log in once and gain access to multiple cloud services without needing to re-authenticate. While SSO simplifies the user experience, it must be implemented securely to avoid becoming a single point of failure. Properly configured SSO solutions can enhance security by centralizing authentication processes and reducing password-related vulnerabilities.

By implementing a combination of encryption, access control, network security, monitoring, and compliance measures, organizations can build a robust security framework in the cloud. These CT methods work together to protect remote environments from a wide

10S

range of threats, ensuring the confidentiality, integrity, and availability of data and services.

The application of CT in companies

Organizations have effectively utilized cloud-based solutions to develop resilient digital protection frameworks. A major financial institution Capital One (USA) embarked on a technological transformation journey by migrating its operations to the cloud. The bank adopted over 30 Amazon Web Services (AWS) services, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), and Amazon Relational Database Service (RDS). These services allowed Capital One to manage data at a larger scale and integrate machine learning for personalized customer experiences. The use of AWS's cloud infrastructure enabled the bank to provision resources quickly, maintain system availability, and conduct regular business continuity exercises, reducing disaster recovery time by 70% [8].

The space agency NASA (USA) generates and manages vast amounts of sensitive data from its space missions and research activities. To enhance its data security and operational efficiency, NASA turned to cloud computing, specifically AWS, to build a robust and scalable infrastructure. NASA uses Amazon Simple Storage Service (S3) to store massive volumes of data securely. S3's built-in encryption options, such as server-side encryption (SSE-S3 and SSE-KMS), allow NASA to automatically encrypt all stored data. NASA's partnership with AWS demonstrates the potential of CT to create secure, resilient, and efficient cybersecurity sys-

A leading provider of industrial automation and information technology Rockwell Automation (USA) leveraged Microsoft Azure to enhance its security and operational efficiency. The company utilized Azure's robust security features, including multi-layered protection and identity management, to secure its cloud infrastructure. Azure's built-in security controls helped Rockwell Automation safeguard sensitive data and maintain compliance with industry regulations. The organization also utilized Microsoft Defender for Cloud to scan and help protect the Azure services that power its application [10].

Case studies demonstrate the diverse applications of CT in enhancing cybersecurity across different sectors Cloud-based solutions provide scalable capabilities that can adapt to the varying security needs of organizations, from financial institutions to government agencies.

Conclusion

The implementation of CT is significant for building resilient cybersecurity systems. By providing scalable, flexible tools for data protection, threat detection, and incident response, cloud solutions have revolutionized how organizations secure their digital assets. The shared responsibility model encourages a collaborative approach to security between CSP and customers. Challenges like data privacy, compliance, and evolving cyber threats necessitate a proactive security strategy. By adopting best practices such as encryption, access control, and continuous monitoring, businesses can leverage CT to strengthen their overall cybersecurity resilience.

tems [9].

References

1. Mozharovskii E. Performance Analysis of Flutter Applications vs. Native iOS and Android Apps // International Journal of Humanities and Natural Sciences. - 2024. - T. 8-2, № 95. -C. 150-155.

2. Annual amount of monetary damage caused by reported cybercrime in the United States from 2001 to 2023 / Statista. - URL: https://www.statista.com/statistics/267132/total-damage-caused-by-by-cybercrime-in-the-us/ (date of application 05.09.2024).

3. Verner D. The impact of cloud technologies on accelerating digital transformation in enterprises // Polish journal of science. - 2024. - № 77. - C. 42-45.

4. Cloud Computing Market Size, Share, and Trends 2024 to 2034 / Precedence Research. -URL: https://www.precedenceresearch.com/cloud-computing-market (date of application: 13.09.2024).

5. Muhammad D., Tu S., Xiao C., Alasmary H., Waqas M., Ur Rehman S. Cyberattacks and Security of Cloud Computing: A Complete Guideline // Symmetry. - 2023. - T. 15. № 11. -C. 1981.

6. Bushuev S. Application of AI for monitoring and optimizing IT infrastructure: economic prospects for implementing predictive analytics in enterprise operations. - 2024. - T. 8-3. № 95. - C. 125-128.

7. Ogarkov A. Application of big data analytics to improve business customer service // Inno-vacionnaya nauka. - 2024. - №7-1. - C. 61-65.

8. Capital One Completes Migration from Data Centers to AWS, Becomes First US Bank to Announce Going All In on the Cloud / AWS. - URL: https://aws.amazon.com/solutions/case-studies/capital-one-all-in-on-aws/ (date of application: 17.09.2024).

9. AWS Partner Story: NASA / AWS. - URL: https://aws.amazon.com/partners/success/nasa-image-library/ (date of application: 19.09.2024).

10. Rockwell Automation goes cloud-native on Azure to bring modern software development paradigms to the factory floor / Microsoft Customer Stories. - URL: https://customers.microsoft.com/en-us/story/1687814927656339280-rockwell-automation-azure-discrete-manufacturing-usa (date of application: 21.09.2024).

РОЛЬ ОБЛАЧНЫХ ТЕХНОЛОГИЙ В ПОСТРОЕНИИ УСТОЙЧИВЫХ СИСТЕМ

КИБЕРБЕЗОПАСНОСТИ

Анар Исрафилов, индивидуальный исследователь, магистр Cyberoon Enterprise (Эстония, г. Таллин)

Аннотация. В данной статье анализируется роль облачных технологий (ОТ) как масштабируемых, гибких и надежных инструментов для защиты данных, обнаружения угроз и реагирования на инциденты. Рассматриваются ключевые аспекты, такие как модель разделения ответственности, шифрование и контроль доступа. Демонстрируются различные методы и практики по использованию ОТ для создания устойчивых систем кибер-безопасности. Обсуждаются кейсы американских компаний, таких как Capital One и NASA, для демонстрации успешной реализации мер облачной безопасности.

Ключевые слова: облачные технологии (ОТ), кибербезопасность, устойчивость, обнаружение угроз, контроль доступа, шифрование, управление рисками, защита данных.

i Надоели баннеры? Вы всегда можете отключить рекламу.