Cyber-security presents a serious challenge. Cyber- security in the cloud presents a far more serious challenge, due to the multi-tenant nature of cloud relationships and the transitory nature of cloud instances.We have identified a fundamental weakness when undertaking cloud audit, namely the misconceptions surrounding the purpose of audit, what comprises a proper audit trail, what should be included, and how it should be achieved and maintained. A properly specified audit trail can provide a powerful tool in the armoury against cyber-crime, yet it is all too easy to throw away the benefits offered by this simple tool through lack of understanding, incompetence, mis-configuration or sheer laziness. A major weakness is the need to ensure the audit trail is properly preserved. We propose that some simple changes in approach are undertaken, which can considerably improve the status quo, while radically improving the ability to conduct forensic examination in the event of a breach, but of course, merely having an effective audit trail is not enough — we actually have to analyse it regularly to realise the potential benefits it offers.
|Number of pages||15|
|Journal||International Journal on Advances in Security|
|Issue number||3 & 4|
|Publication status||Published - 31 Dec 2016|
- cloud cyber security
- audit trail
Duncan, R. A. K., & Whittington, M. (2016). Cloud cyber-security: Empowering the audit trail. International Journal on Advances in Security, 9(3 & 4), 169-183. . https://www.iariajournals.org/security/tocv9n34.html