Azure Cloud Infrastructure Hardening: A Survey

  • Neha Chandrima Oriental University, Indore Madhya Pradesh, India
  • Monika Bhatnagar Oriental University, Indore Madhya Pradesh, India
  • Rajesh Kumar Nigam Oriental University, Indore Madhya Pradesh, India
Keywords: Cloud Security, Azure Cloud, Cloud Infrastructure, Security Hardening, Security, Effective Identity and Access Managem

Abstract

In today’s rapidly evolving digital landscape, cloud computing platforms like Microsoft Azure have become integral to business operations. However, with the increasing reliance on cloud services, there is an escalating need to implement rigorous security practices to protect cloud resources from malicious attacks, data breaches, and compliance violations. Azure cloud infrastructure can be hardened by secure design, deployment and management practices. Comprehensive strategies for hardening Azure cloud infrastructure by identifying vulnerabilities, evaluating security tools, and applying best practices to mitigate risks associated with cloud-based environments have become demands of the day for providing secure cloud infrastructure. This ensures that Azure resources such as virtual machines, storage, identity management, and networking are configured, managed, and monitored with the highest standards of security. A rigorous literature review reveals that the significance of understanding the shared responsibility model in designing secure cloud infrastructures is the main challenge and has become an important thrust area of research in cloud security. Effective Identity and Access Management (IAM) is a cornerstone of cloud infrastructure hardening. Network segmentation and firewall management are also essential tasks for securing Azure resources effectively. Providing both theoretical frameworks and practical insights into securing Azure cloud environments to prevent cyberattacks, data breaches, and unauthorised access is essential. It has become a new thrust area of research for researchers working in the field of cloud infrastructure hardening.

Downloads

Download data is not yet available.

References

[1]. Armbrust, M., et al. “A View of Cloud Computing”. Communications of the ACM, vol. 53 no.4, pp 50-58, 2010.
[2]. Zissis and Lekkas “Addressing cloud computing security issues”, International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.1, No.4, pp. 172~175, 2012
[3]. Harris, S., et al. “CISSP: Certified Information Systems Security Professional Exam Guide”. McGraw-Hill, 2020.
[4]. Cloud Security Alliance (CSA) “, Cloud Security Alliance: Cloud Control Matrix” Cloud Security Alliance, 2017.
[5]. Chavez et al. “Econometrics Pedagogy and Cloud Computing: Training the Next Generation of Economists and Data Scientists”, Journal of Econometric Methods, 2021
[6]. Liu et al. “Service-oriented industrial Internet of things gateway for cloud manufacturing”, Elsevier, 2022
[7]. Parker et al. “Open-source serverless architectures: an evaluation of Apache open whisk”, ieeexplore.ieee.org, 2020
[8]. Zaeem, F., et al. “Network Security in Cloud: Leveraging Azure Tools for Better Protection” Proceedings of the International Conference on Cloud Computing and Big Data, pp 238-249, 2019.
[9]. Qi, “Optimisation of cloud computing task execution time and user QoS utility by improved particle swarm optimisation”, Elsevier,2021
[10]. Anderson, R., et al.” Data Security and Cloud Computing: A Survey.” Springer, 2016.
[11]. Liang et al. “A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud”, ieeexplore.ieee.org, 2020
[12]. Shrestha et al. “Challenges of future VANET and cloud‐based approaches” Wiley Online Library, 2018
[13]. Chen, Y., & Zhao, K. “Cloud Security Monitoring and Detection Approaches: A Survey” Journal of Cloud Computing: Advances, Systems, and Applications, vol. 8, no. 1, pp 1-19, 2019.
[14]. Goh et al. “Conceptual design of cloud-based data pipeline for smart factory”, Springer, 2021
[15]. Zhang et al., “Integration of on-premises and cloud-based software: the product bundling perspective”, aisel.aisnet.org, 2020
[16]. Liu, Y., et al. “Compliance and Governance in Azure Cloud”, International Journal of Cloud Computing and Services Science, vol. 7 no.5, pp 345-359,2019.
[17]. Liu et al. “A cloud-edge collaboration framework for cognitive service”, ieeexplore.ieee.org, 2020
[18]. Jones, M., et al. “Challenges in Cloud Security Configuration: A Review”. International Journal of Information Security, vol.19, no.3, pp 345-358, 2020.
[19]. Wang et al., “Distributed group coordination of multiagent systems in cloud computing systems using a model-free adaptive predictive control strategy”, ieeexplore.ieee.org, 2021
[20]. Hamed et al. “A survey on security challenges in cloud computing: issues, threats, and solutions”, The Journal of Supercomputing vol 76: pp 9493–9532, Springer, 2020
[21]. Borra, P. (2024). Securing Cloud Infrastructure: An In-Depth Analysis of Microsoft Azure Security. International Journal of Advanced Research in Science Communication and Technology, 4(2), 549-555. Link
[22]. Center for Internet Security (CIS). (2024). CIS Microsoft Azure Benchmarks. Link
[23]. Microsoft. (2024). Mapping of Azure Security Benchmark v2 and CIS Microsoft Azure Foundations Benchmark. Link
[24]. Microsoft. (2023). Recommendations for Hardening Resources. Link
[25]. Microsoft. (2024). Overview of the Azure Security Benchmark v3. Link
[26]. Haq, W. (2021). CIS Hardened Images on Microsoft Azure. Link
[27]. Torkura, K. A., Meinel, C., & Kratzke, N. (2019). Don’t Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses. Link
[28]. Verdet, A., Hamdaqa, M., Da Silva, L., & Khomh, F. (2023). Exploring Security Practices in Infrastructure as Code: An Empirical Study.
Published
2025-01-30
How to Cite
Chandrima, N., Bhatnagar, M., & Nigam, R. (2025). Azure Cloud Infrastructure Hardening: A Survey. International Journal of Advanced Computer Technology, 13(6), 01-08. Retrieved from http://ijact.org/index.php/ijact/article/view/153