Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
  • Past Issues

From deployment to defense: Real world strategies for enhancing cloud security through preventative infrastructure controls

Breadcrumb

  • Home
  • From deployment to defense: Real world strategies for enhancing cloud security through preventative infrastructure controls

Ranjan Kathuria *

Information Security, Rubrik. San Jose; United States of America.

Research Article

International Journal of Science and Research Archive; 2025, 16(01), 781-787

Article DOI: 10.30574/ijsra.2025.16.1.2059

DOI url: https://doi.org/10.30574/ijsra.2025.16.1.2059

Received on 01 June 2025; revised on 08 July 2025; accepted on 10 July 2025

Cloud infrastructure has become foundational to modern digital services; yet recent high profile breaches have exposed critical weaknesses in cloud security design. This research addresses the problem of infrastructure level vulnerabilities that persist even when application level security is robust. Through analysis of documented breaches at Capital One; Tesla; Accenture; and Uber; this study demonstrates that misconfigurations; insufficient access controls; and inadequate monitoring are recurring factors that enable attackers to compromise sensitive data and disrupt operations.

To address these risks; this paper proposes a secure-by-design cloud architecture that integrates preventative controls at every layer. The methodology includes a comparative analysis of breach reports and security documentation; followed by the development of a reference architecture featuring web application firewalls; private subnets; IMDSv2; restrictive security groups; encrypted storage; autoscaling; centralized logging; and secret management. The design is evaluated against the root causes of the selected breaches to demonstrate its effectiveness.

The results show that implementing these preventative infrastructure controls would have directly mitigated the vulnerabilities exploited in the analyzed incidents. The research contributes to a practical; adaptable framework for organizations seeking to enhance cloud security and reliability. The conclusion emphasizes that proactive; infrastructure focused security measures are essential for defending against evolving cloud threats; and that secure design must be prioritized alongside application development from the outset.

Secure Cloud Design; IMDSv2; Storage; WAF; Security Logging

https://journalijsra.com/sites/default/files/fulltext_pdf/IJSRA-2025-2059.pdf

Preview Article PDF

Ranjan Kathuria. From deployment to defense: Real world strategies for enhancing cloud security through preventative infrastructure controls. International Journal of Science and Research Archive; 2025, 16(01), 781-787. Article DOI: https://doi.org/10.30574/ijsra.2025.16.1.2059.

Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0

Footer menu

  • Contact

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution