FROM THREATS TO TRUST: SECURING CLOUD INFRASTRUCTURE THROUGH RESILIENCE AND COMPLIANCE
FROM THREATS TO TRUST: SECURING CLOUD INFRASTRUCTURE THROUGH RESILIENCE AND COMPLIANCE
Authors:
Er. Sapna
Assistant Professor
Computer Science and Engineering,
SBSSU Gurdaspur
Sapnakundal45@gmail.com
Gagandeep
Manager, Cyber Security
deep.gagi3@gmail.com
Abstract— In the evolving digital landscape, cloud computing has become a cornerstone for scalable and flexible IT infrastructure. However, the rapid adoption of cloud services introduces a wide range of security threats, compliance challenges, and operational risks. This paper, From Threats to Trust: Securing Cloud Infrastructure through Resilience and Compliance presents a comprehensive analysis of cloud security challenges and explores effective mitigation strategies to enhance resilience and regulatory adherence.
The study examines critical issues such as data breaches, insider threats, vendor lock-in, insecure interfaces, and distributed denial-of-service (DDoS) attacks within cloud environments. It further highlights the importance of robust security mechanisms, including identity and access management, encryption techniques, continuous monitoring, intrusion detection systems, and secure key management. Emphasis is also placed on compliance with global data protection regulations and the implementation of governance frameworks.
By integrating best practices with proactive risk management approaches, this paper provides a structured framework for building secure, resilient, and compliant cloud infrastructures. The findings aim to support organizations in strengthening their security posture, ensuring data integrity and availability, and fostering trust in cloud-based systems.
Keywords— Cloud Security, Cloud Computing, Identity and Access Management and Intrusion Detection Systems.