Abstract
In the last few years, we have seen tremendous growth in cloud adoption and migration, especially the new emerging companies and startups in multiple domains who are embracing cloud technologies to avoid the on-premises costs of maintaining the servers. As organizations grow and invest in digital transformation every year, the cloud is becoming an ever more crucial part of the organization and getting integrated with multiple core services. It is highly recommended that they look at their cloud security components and make them secure and robust to avoid a cyber-attack. Year after year IT world has been witnessing a series of news headlines and data leaks that occurred because of cloud architecture misconfigurations. In this article, the authors demonstrated a few secured architectures on Amazon Web Services (AWS), which is one of the top cloud service providers in the world. This paper’s target is to educate and set up a guideline for a secured architecture baseline on AWS cloud adoption for new or existing customers to review their architecture and encourage them to deploy the security components on AWS. This paper provides a brief overview of the various architectures proposed and implemented that can act as a solution for handling the various issues related to cloud computing, especially cloud security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Singh T (2021) The effect of Amazon web services (AWS) on cloud-computing. Int J Eng Res Technol 10(11):480–482. https://www.ijert.org/research/the-effect-of-amazon-web-services-aws-on-cloud-computing-IJERTV10IS110188.pdf
Nath O (2021) Top 5 AWS misconfigurations that led to data leaks in 2021. https://www.spiceworks.com/it-security/cyber-risk-management/articles/aws-misconfigurations-2021/
Nath O (2021) What makes AWS buckets vulnerable to ransomware and how to mitigate the threat. https://www.spiceworks.com/it-security/cyber-risk-management/news/aws-vulnerable-to-ransomware-attacks/
Mahajan A (2021) 4 most common misconfigurations in AWS EC2 instances. https://kloudle.com/blog/4-most-common-misconfigurations-in-aws-ec2-instances
Cloudanix (2021) 15 Top Aws Rds misconfigurations to avoid in 2022. https://blog.cloudanix.com/top-15-aws-rds-misconfigurations-2022/
Lord N (2019) Data protection: data in transit vs. data at rest. https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest
AWS (2021) Shared responsibility model. https://aws.amazon.com/compliance/shared-responsibility-model/
Trend (2021) Top 10 AWS security misconfiguration. https://www.trendmicro.com/en_us/devops/21/k/top-10-aws-security-misconfigurations.html
Votiro (2021) How misconfigured Amazon S3 buckets can lead to a ransomware attack. https://securityboulevard.com/2021/04/how-misconfigured-amazon-s3-buckets-can-lead-to-a-ransomware-attack/
Gietzen S (2021) S3 Ransomware part 2: attack vector. https://rhinosecuritylabs.com/aws/s3-ransomware-part-2-prevention-and-defense/
AWS (2020) Security pillar AWS well-architected framework
Malik S (2021) Top 12 cloud security threats according to Cloud Security Alliance. https://bitbytes.io/cloud-security-threats/
Anand Mishra GK (2021) Big data analytics options on AWS. Int J Eng Res Technol 10(April):29
Patil Nikhil N, Mapari Rahul B (2014) A comprehensive survey on data integrity proving schemes in cloud storage. Ijarcce 8163–8166. https://doi.org/10.17148/ijarcce.2014.31019
Phapale A (2016) A novel approach for securing cloud data using cryptographic approach, pp 296–299
Eltayb NI, Rayis OA (2018) Cloud computing security framework privacy security. Recent Innov Trends Comput. http://www.academia.edu/download/56698026/1519625123_26-02-2018.pdf
Ujloomwale MN, Badre MR (2014) Data storage security in cloud. IOSR J Comput Eng 16(6):50–56. https://doi.org/10.9790/0661-16635056
Thomas G, Janardhanan P (2012) Intrusion tolerance: enhancement of safety in cloud computing. Ijarcce Com 1(4):238–242. http://ijarcce.com/upload/june/8-IntrusionToleranceEnhancement.pdf
Akash BV, Murugan R (2022) Authenticated transfer of files with storage and backup within a cloud environment. Int J Eng Res Technol 11(02):259–260
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Panda, S.S., Pathi, N.K., Abhi, S. (2023). Securing a SaaS Application on AWS Cloud. In: Roy, S., Sinwar, D., Dey, N., Perumal, T., Tavares, J.M.R.S. (eds) Innovations in Computational Intelligence and Computer Vision. ICICV 2022. Lecture Notes in Networks and Systems, vol 680. Springer, Singapore. https://doi.org/10.1007/978-981-99-2602-2_55
Download citation
DOI: https://doi.org/10.1007/978-981-99-2602-2_55
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2601-5
Online ISBN: 978-981-99-2602-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)