Comparative analysis of cybersecurity in leading cloud platforms based on the NIST framework
Abstract
Abstract
Purpose: To examine the cybersecurity capabilities of three leading cloud platforms—AWS, Azure, and GCP—according to the five core functions of the NIST Cybersecurity Framework: identify, protect, detect, respond, and recover.
Method: A comparative approach was used, covering the analysis of the tools and services of each platform for the implementation of NIST functions.
Findings: The analysis demonstrated the strengths and weaknesses of AWS, Azure, and GCP in terms of identity, protection, detection, response, and recovery capabilities, highlighting the most effective tools for each.
Theoretical implications: The study deepens the understanding of cybersecurity strategies based on the NIST framework and can serve as a basis for further research in the direction of optimizing protection in cloud environments.
Practical implications: The obtained results provide valuable recommendations for improving cloud security practices through informed choice of cloud services and security strategies.
Value: The study offers a structured approach to assessing the cybersecurity of cloud platforms, highlighting each provider's ability to address different aspects of cybersecurity.
Future research: Future research may focus on the impact of emerging technologies such as artificial intelligence and machine learning on improving the effectiveness of cybersecurity in cloud environments.
Paper type: Conceptual research.
Key words: cloud computing, cloud services, cloud security, cybersecurity, NIST framework
Downloads
References
NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved from: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Alam, Md & Pandey, Manjusha & Rautaray, Siddharth. (2015). A Comprehensive Survey on Cloud Computing. International Journal of Information Technology and Computer Science. 7. 68-79. DOI: https://doi.org/10.5815/ijitcs.2015.02.09/
Synergy Research Group. (2023). Cloud service providers market share at the beginning of 2023. Retrieved from: https://www.srgresearch.com/articles/cloud-spending-growth-rate-slows-but-q4-still-up-by-10-billion-from-2021-microsoft-gains-market-share
M.S. Salek and S.M. Khan. (2021). A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications.
DOI: https://doi.org/10.1109/JIOT.2022.3152477
Jai Sisodia & Mohammed Khan. (2022). Understanding the Shared Responsibilities Model in Cloud Services. Retrieved from: https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/understanding-the-shared-responsibilities-model-in-cloud-services
NIST. (2010). Contingency Planning Guide for Federal Information Systems. DOI: https://doi.org/10.6028/NIST.SP.800-34r1/
Amazon GuardDuty. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/guardduty/
Azure Resource Manager. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/azure-resource-manager/
Google Cloud Asset Inventory. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/asset-inventory/docs
Amazon Inspector. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/inspector/
Azure Security Center. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/shows/azure-friday/azure-security-center
Google Cloud Security Command Center. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/security-command-center/docs
AWS Organizations. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/organizations/
Azure Policy. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/governance/policy/
Google Cloud Resource Manager. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/resource-manager/docs
Negussie, D. (2023). Importance of cybersecurity awareness training for employees in business. A journal of Gujarat University, 2, 104-107. DOI: http://dx.doi.org/10.47413/vidya.v2i2.206
AWS IAM. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/iam/
Azure Active Directory. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/active-directory/
Google Cloud IAM. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/iam/
AWS Training and Certification. (n.d.). Official AWS Training and Certification Website [Website]. Retrieved from: https://aws.training/
Google Cloud Data Encryption. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/security/encryption
Azure Security Center. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/shows/azure-friday/azure-security-center
Azure Policy. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/governance/policy/
Azure Update Management. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/update-manager/overview
AWS Trusted Advisor. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/premiumsupport/technology/trusted-advisor/
Google Cloud Recommendations. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/recommendations/
AWS WAF. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/waf/
AWS Shield. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/shield/
AWS CloudWatch. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/cloudwatch/
Azure Monitor. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/azure-monitor/
Google Cloud Operations Suite. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/products/operations
AWS Security Hub. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/securityhub/
Azure Sentinel. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/sentinel/
AWS Simple Notification Service (SNS). (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/sns/
Azure Notification Hubs. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://azure.microsoft.com/en-us/products/notification-hubs/
Google Cloud Pub/Sub. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/pubsub/
Google Cloud Armor. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/armor/
Google Cloud CDN. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/cdn/
Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions [Journal article]. Information Fusion, 97, 101804. DOI: https://doi.org/10.1016/j.inffus.2023.101804
AWS Incident Response. (n.d.). AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/aws-security-incident-response-guide.html
Google Cloud Incident Response. (n.d.). Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/security/resources/datasheets/incident-response-services
Azure Incident Response. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/security/benchmark/azure/security-control-incident-response
Abstract views: 51 PDF Downloads: 32
Copyright (c) 2024 Vitalii Molnar, Dmytro Sabodashko

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).