264
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cloud Security Governance Guidelines

      Preprint
      In review
      research-article
      Bookmark

            Abstract

            Cloud computing is a widely adopted technology thatoffers many benefits, including cost-effectiveness,scalability, and flexibility. However, the use of cloudcomputing also poses significant challenges related todata security and privacy. Cloud security governance isa critical component of managing these challenges.This research paper aims to provide an in-depthanalysis of cloud security governance, its importance,challenges, and best practices for implementation.Study findings indicate that cloud security governanceis critical in protecting organizational assets andreputation, especially in regulated industries. The studyresults also highlight the importance of proactive riskmanagement, employee training, and continuousmonitoring as essential elements of cloud securitygovernance.This research paper offers practical insights andrecommendations for organizations seeking to improvetheir cloud security governance practices. This articleemphasizes the importance of effective cloud securitygovernance. It provides a valuable framework fordeveloping tailored security policies and proceduresthat align with the unique requirements of the cloudenvironment

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            11 April 2023
            Affiliations
            [1 ] Joshua Ugochukwu Amah received his bachelor’s degree in Electronics and Computer Engineering from Nnamdi Azikiwe University, Awka, Anambra State, Nigeria, in 2015 and his master’s degree in computer science from Lamar University, Beaumont, Texas, in 2022. He has worked for four years in the information technology industry as Cloud Engineer and currently works with one of the top IT firms in the United States. His research interest includes Cybersecurity, Cloud computing, Machine learning, and Artificial intelligence. Joshua is active in different scientific societies, such as Member of the National Society of Professional Engineers, The Nonprofit Technology Enterprise Network, and the National Society of Black Engineers.;
            [2 ] Joseph Mart obtained his Electrical and Electronic Engineering bachelor's degree from the University of Benin, Benin City, Nigeria. He has four years of technical experience across various IT domains. He obtained his master’s degree in computer science in 2022 from Austin Peay State University, Clarksville, Tennessee State. Joseph has multiple certifications with giant IT industries such as Amazon Web Services, Cisco, IBM, CompTIA, Juniper Networks, and HarshiCorps Inc. He is an active member of multiple scientific organizations such as IEEE, the National Society of Professional Engineers, the Nonprofit Technology Enterprise Network, and the National Society of Black Engineers. His research interest includes Artificial Intelligence and Machine learning, Cloud Computing, and Cybersecurity IoT.;
            [3 ] Amos Oyetoro obtained his M.s in Computer Science from Austin Peay State University, Clarksville, Tennessee, United States. He had his bachelor’s degree in computer engineering from Nigeria in 2012. Over the past eight years, Amos has held various positions in the Information Technology industry, from System development to system design and implementation. He has a strong background in Cloud computing and cyber security, Application and system architecture, database design, web application development, and system analysis. He possesses an active member of multiple scientific organizations such as IEEE, the National Society of Professional Engineers, The Nonprofit Technology Enterprise Network, and the National Society of Black Engineers. His primary interest includes Cloud computing, Network and security, Data Analysis and performance, machine learning, Artificial Intelligence, and Information Technologies.;
            Author notes
            Author information
            https://orcid.org/0009-0002-3955-170X
            https://orcid.org/0009-0000-9832-879X
            https://orcid.org/0009-0002-8627-2105
            Article
            10.14293/PR2199.000062.v1
            e4f57d9c-4d5b-44de-9dcc-49ef4816032d

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 11 April 2023
            Categories

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Computer science,Security & Cryptology
            Cloud Security, Security Governance, NIST, Amazon Web Services, Microsoft Azure, Google Cloud

            Comments

            Comment on this article