Comparative analysis of cybersecurity in leading cloud platforms based on the NIST framework

Keywords: cloud computing, cloud services, cloud security, cybersecurity, NIST framework

Abstract

Abstract

Purpose: To examine the cybersecurity capabilities of three leading cloud platforms—AWS, Azure, and GCP—according to the five core functions of the NIST Cybersecurity Framework: identify, protect, detect, respond, and recover.

Method: A comparative approach was used, covering the analysis of the tools and services of each platform for the implementation of NIST functions.

Findings: The analysis demonstrated the strengths and weaknesses of AWS, Azure, and GCP in terms of identity, protection, detection, response, and recovery capabilities, highlighting the most effective tools for each.

Theoretical implications: The study deepens the understanding of cybersecurity strategies based on the NIST framework and can serve as a basis for further research in the direction of optimizing protection in cloud environments.

Practical implications: The obtained results provide valuable recommendations for improving cloud security practices through informed choice of cloud services and security strategies.

Value: The study offers a structured approach to assessing the cybersecurity of cloud platforms, highlighting each provider's ability to address different aspects of cybersecurity.

Future research: Future research may focus on the impact of emerging technologies such as artificial intelligence and machine learning on improving the effectiveness of cybersecurity in cloud environments.

Paper type: Conceptual research.

 

Key words: cloud computing, cloud services, cloud security, cybersecurity, NIST framework

Downloads

Download data is not yet available.

References

NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved from: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf

Alam, Md & Pandey, Manjusha & Rautaray, Siddharth. (2015). A Comprehensive Survey on Cloud Computing. International Journal of Information Technology and Computer Science. 7. 68-79. DOI: https://doi.org/10.5815/ijitcs.2015.02.09/

Synergy Research Group. (2023). Cloud service providers market share at the beginning of 2023. Retrieved from: https://www.srgresearch.com/articles/cloud-spending-growth-rate-slows-but-q4-still-up-by-10-billion-from-2021-microsoft-gains-market-share

M.S. Salek and S.M. Khan. (2021). A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications.

DOI: https://doi.org/10.1109/JIOT.2022.3152477

Jai Sisodia & Mohammed Khan. (2022). Understanding the Shared Responsibilities Model in Cloud Services. Retrieved from: https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/understanding-the-shared-responsibilities-model-in-cloud-services

NIST. (2010). Contingency Planning Guide for Federal Information Systems. DOI: https://doi.org/10.6028/NIST.SP.800-34r1/

Amazon GuardDuty. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/guardduty/

Azure Resource Manager. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/azure-resource-manager/

Google Cloud Asset Inventory. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/asset-inventory/docs

Amazon Inspector. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/inspector/

Azure Security Center. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/shows/azure-friday/azure-security-center

Google Cloud Security Command Center. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/security-command-center/docs

AWS Organizations. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/organizations/

Azure Policy. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/governance/policy/

Google Cloud Resource Manager. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/resource-manager/docs

Negussie, D. (2023). Importance of cybersecurity awareness training for employees in business. A journal of Gujarat University, 2, 104-107. DOI: http://dx.doi.org/10.47413/vidya.v2i2.206

AWS IAM. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/iam/

Azure Active Directory. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/active-directory/

Google Cloud IAM. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/iam/

AWS Training and Certification. (n.d.). Official AWS Training and Certification Website [Website]. Retrieved from: https://aws.training/

Google Cloud Data Encryption. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/security/encryption

Azure Security Center. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/shows/azure-friday/azure-security-center

Azure Policy. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/governance/policy/

Azure Update Management. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/update-manager/overview

AWS Trusted Advisor. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/premiumsupport/technology/trusted-advisor/

Google Cloud Recommendations. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/recommendations/

AWS WAF. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/waf/

AWS Shield. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/shield/

AWS CloudWatch. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/cloudwatch/

Azure Monitor. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/azure-monitor/

Google Cloud Operations Suite. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/products/operations

AWS Security Hub. (n.d.). Official AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/securityhub/

Azure Sentinel. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/azure/sentinel/

AWS Simple Notification Service (SNS). (n.d.). Official AWS Documentation [Website]. Retrieved from: https://aws.amazon.com/sns/

Azure Notification Hubs. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://azure.microsoft.com/en-us/products/notification-hubs/

Google Cloud Pub/Sub. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/pubsub/

Google Cloud Armor. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/armor/

Google Cloud CDN. (n.d.). Official Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/cdn/

Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions [Journal article]. Information Fusion, 97, 101804. DOI: https://doi.org/10.1016/j.inffus.2023.101804

AWS Incident Response. (n.d.). AWS Documentation [Website]. Retrieved from: https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/aws-security-incident-response-guide.html

Google Cloud Incident Response. (n.d.). Google Cloud Documentation [Website]. Retrieved from: https://cloud.google.com/security/resources/datasheets/incident-response-services

Azure Incident Response. (n.d.). Official Microsoft Documentation [Website]. Retrieved from: https://learn.microsoft.com/en-us/security/benchmark/azure/security-control-incident-response


Abstract views: 51
PDF Downloads: 32
Published
2024-12-31
How to Cite
Molnar, V., & Sabodashko, D. (2024). Comparative analysis of cybersecurity in leading cloud platforms based on the NIST framework. Social Development and Security, 14(6), 68-80. https://doi.org/10.33445/sds.2024.14.6.8
Section
Engineering and Technology

Most read articles by the same author(s)