| ESP Journal of Engineering & Technology Advancements |
| © 2022 by ESP JETA |
| Volume 2 Issue 2 |
| Year of Publication : 2022 |
| Authors : Godavari Modalavalasa, Sumit Pillai |
: 10.56472/25832646/JETA-V2I2P120 |
Godavari Modalavalasa, Sumit Pillai, 2022. "Exploring Azure Security Center: A Review of Challenges and Opportunities in Cloud Security", ESP Journal of Engineering & Technology Advancements 2(2): 176-182.
Several businesses now need cloud services as their fundamental operational element. Cloud providers need to respect security and privacy regulations to ensure data confidentiality with their customer base. Cloud providers use non-consistent security and privacy methods while ongoing efforts exist to create cloud security standards. Azure Security Center works as a complete cloud security solution that advances the defensive measures of cloud infrastructures. This paper examines the features, challenges, and opportunities associated with the use of Azure Security Center in organizational cloud security frameworks. This work addresses issues related to configuring Azure Security Center maintenance while focusing on its role in threat intelligence development automated security procedures and standard compliance requirements. Furthermore, the paper explores Azure’s data protection capabilities, including redundancy and disaster recovery options, that contribute to secure data storage and management. A survey of past publications explores cloud security research which serves as basis for developing superior integration methods and functional enhancements for Azure Security Center. The research finds that Azure Security Center provides an effective security framework although solving current limitations will improve its efficiency for diverse organizational needs.
[1] S. S. S. Neeli, “Ensuring Data Quality: A Critical Aspect of Business Intelligence Success,” Int. J. Lead. Res. Publ., vol. 2, no. 9, p. 7, 2021, [Online]. Available: https://www.ijlrp.com/papers/2021/9/1177.pdf%0A
[2] I. Tahirkheli et al., “A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges,” Electronics, vol. 10, no. 15, 2021, doi: 10.3390/electronics10151811.
[3] Choudhary and R. Bhadada, “Emerging threats in cloud computing,” in Emerging Technology Trends in Electronics, Communication and Networking: Third International Conference, ET2ECN 2020, Surat, India, February 7--8, 2020, Revised Selected Papers 3, 2020, pp. 147–156.
[4] Rath, B. Spasic, N. Boucart, and P. Thiran, “Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure,” Computers, vol. 8, no. 2, 2019, doi: 10.3390/computers8020034.
[5] S. Elmaghraby and M. M. Losavio, “Cyber security challenges in Smart Cities: Safety, security and privacy,” J. Adv. Res., vol. 5, no. 4, pp. 491–497, 2014.
[6] Belanche-Gracia, L. V Casaló-Ariño, and A. Pérez-Rueda, “Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions,” Gov. Inf. Q., vol. 32, no. 2, pp. 154–163, 2015.
[7] P. Pandit, “Cloud Computing Case Study on Microsoft Azure,” 2021. doi: 10.13140/RG.2.2.22421.86245.
[8] T. Zhao, T. Gasiba, U. Lechner, and M. Pinto-Albuquerque, “Raising Awareness about Cloud Security in Industry through a Board Game,” Information, vol. 12, no. 11, 2021, doi: 10.3390/info12110482.
[9] P. Khare, “Cloud Security Challenges : Implementing Best Practices for Secure SaaS Application Development,” Int. J. Curr. Eng. Technol., vol. 11, no. 6, pp. 669–676, 2021, doi: https://doi.org/10.14741/ijcet/v.11.6.11.
[10] Petrik and G. Herzwurm, “iIoT ecosystem development through boundary resources: a Siemens MindSphere case study,” in Proceedings of the 2nd ACM SIGSOFT International Workshop on Software-Intensive Business: Start-Ups, Platforms, and Ecosystems, 2019, pp. 1–6.
[11] G. Ramachandra, M. Iftikhar, and F. A. Khan, “A Comprehensive Survey on Security in Cloud Computing,” in Procedia Computer Science, 2017. doi: 10.1016/j.procs.2017.06.124.
[12] S. Tabassam, “Security and Privacy Issues in Cloud Computing Environment,” J. Inf. Technol. Softw. Eng., 2017, doi: 10.4172/2165-7866.1000216.
[13] V. U. Uttarwar and A. A. Kalia, “Latest Trend in Network Security as Zero Trust Security Model,” Natl. J. Comput. Appl. Sci., 2019.
[14] Godavari Modalavalasa, “The Role of DevOps in Streamlining Software Delivery: Key Practices for Seamless CI/CD,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 1, no. 2, pp. 258–267, Jan. 2021, doi: 10.48175/IJARSCT-8978C.
[15] K. Spanaki, Z. Gürgüç, C. Mulligan, and E. Lupu, “Organizational cloud security and control: a proactive approach,” Inf. Technol. People, 2019, doi: 10.1108/ITP-04-2017-0131.
[16] M. Hussain, “SECaaS : Security as a Service for Cloud-based Applications Cloud Security at Leading Providers,” Proc. Second Kuwait Conf. Eser. eSystems KCESS 11, 2011.
[17] R. Loaiza Enriquez, “Cloud Security Posture Management (CSPM) in Azure Title Number of Pages Date,” no. June, 2021.
[18] J. Y. Z. Chen, “Challenges around Information Security Management in the Public Cloud,” 2021.
[19] G. Modalavalasa, “Towards Sustainable Development Based on Machine Learning Models for Accurate and Efficient Flood Prediction,” Int. J. Res. Anal. Rev., vol. 8, no. 2, pp. 940–944, 2021.
[20] S. C. -, “Risk Management in Advanced Persistent Threats (APTs) for Critical Infrastructure in the Utility Industry,” Int. J. Multidiscip. Res., vol. 3, no. 4, Aug. 2021, doi: 10.36948/ijfmr.2021.v03i04.34396.
[21] Marshall Copeland, Cyber Security on AzureAn IT Professional’s Guide to Microsoft Azure Security Center. 2017.
[22] Palumbo, G. Aceto, A. Botta, D. Ciuonzo, V. Persico, and A. Pescapé, “Characterization and analysis of cloud-to-user latency: The case of Azure and AWS,” Comput. Networks, 2021, doi: 10.1016/j.comnet.2020.107693.
[23] O. Ali, A. Shrestha, A. Chatfield, and P. Murray, “Assessing information security risks in the cloud: A case study of Australian local government authorities,” Gov. Inf. Q., 2020, doi: 10.1016/j.giq.2019.101419.
[24] U. M. Ismail and S. Islam, “A unified framework for cloud security transparency and audit,” J. Inf. Secur. Appl., 2020, doi: 10.1016/j.jisa.2020.102594.
[25] J. Shi, L. Jin, and J. Li, “The integration of azure sphere and azure cloud services for internet of things,” Appl. Sci., 2019, doi: 10.3390/app9132746.
[26] P. R. Kumar, P. H. Raj, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing,” in Procedia Computer Science, 2018. doi: 10.1016/j.procs.2017.12.089.
Cloud Computing, Cloud Security, Microsoft Azure, Azure Security Center, Compliance Monitoring, Cloud Workload Protection.