Information Security, Rubrik. San Jose; United States of America.
International Journal of Science and Research Archive; 2025, 16(01), 781-787
Article DOI: 10.30574/ijsra.2025.16.1.2059
Received on 01 June 2025; revised on 08 July 2025; accepted on 10 July 2025
Cloud infrastructure has become foundational to modern digital services; yet recent high profile breaches have exposed critical weaknesses in cloud security design. This research addresses the problem of infrastructure level vulnerabilities that persist even when application level security is robust. Through analysis of documented breaches at Capital One; Tesla; Accenture; and Uber; this study demonstrates that misconfigurations; insufficient access controls; and inadequate monitoring are recurring factors that enable attackers to compromise sensitive data and disrupt operations.
To address these risks; this paper proposes a secure-by-design cloud architecture that integrates preventative controls at every layer. The methodology includes a comparative analysis of breach reports and security documentation; followed by the development of a reference architecture featuring web application firewalls; private subnets; IMDSv2; restrictive security groups; encrypted storage; autoscaling; centralized logging; and secret management. The design is evaluated against the root causes of the selected breaches to demonstrate its effectiveness.
The results show that implementing these preventative infrastructure controls would have directly mitigated the vulnerabilities exploited in the analyzed incidents. The research contributes to a practical; adaptable framework for organizations seeking to enhance cloud security and reliability. The conclusion emphasizes that proactive; infrastructure focused security measures are essential for defending against evolving cloud threats; and that secure design must be prioritized alongside application development from the outset.
Secure Cloud Design; IMDSv2; Storage; WAF; Security Logging
Preview Article PDF
Ranjan Kathuria. From deployment to defense: Real world strategies for enhancing cloud security through preventative infrastructure controls. International Journal of Science and Research Archive; 2025, 16(01), 781-787. Article DOI: https://doi.org/10.30574/ijsra.2025.16.1.2059.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0