Autor: |
Reece, Morgan, Lander Jr., Theodore, Mittal, Sudip, Rastogi, Nidhi, Dykstra, Josiah, Sampson, Andy |
Rok vydání: |
2023 |
Předmět: |
|
Zdroj: |
39th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC 2023) |
Druh dokumentu: |
Working Paper |
Popis: |
As organizations increasingly use cloud services to host their IT infrastructure, there is a need to share data among these cloud hosted services and systems. A majority of IT organizations have workloads spread across different cloud service providers, growing their multi-cloud environments. When an organization grows their multi-cloud environment, the threat vectors and vulnerabilities for their cloud systems and services grow as well. The increase in the number of attack vectors creates a challenge of how to prioritize mitigations and countermeasures to best defend a multi-cloud environment against attacks. Utilizing multiple industry standard risk analysis tools, we conducted an analysis of multi-cloud threat vectors enabling calculation and prioritization for the identified mitigations and countermeasures. The prioritizations from the analysis showed that authentication and architecture are the highest risk areas of threat vectors. Armed with this data, IT managers are able to more appropriately budget cybersecurity expenditure to implement the most impactful mitigations and countermeasures. |
Databáze: |
arXiv |
Externí odkaz: |
|