Academic publishing in Europe and N. America

Archive Publication ethics Submission Payment Contacts
In the original languageTranslation into English

Navigating the Threat Landscape: A Comprehensive Analysis of Security Challenges in Multi-Cloud Environments.

Authors

Agbanwu Joshua Ojomiache, Agbanwu Jedidiah Alefia

Rubric:Informatics
109
0
Quote
109
0

Annotation

This paper provides a comprehensive analysis of the heightened security risks inherent in multi-cloud environments. While the adoption of multiple cloud providers offers strategic benefits, the core argument is that it introduces a fragmented and complex threat landscape that cannot be secured through traditional, siloed approaches. Key challenges are systematically detailed, including architectural complexity, data fragmentation and privacy gaps, inconsistent Identity and Access Management (IAM), and significant visibility and compliance burdens. The analysis is grounded in recent industry data, citing striking statistics such as a 332% increase in policy violations and a 71% higher incident frequency compared to single-cloud setups. The paper concludes that mitigating these evolving threats requires a holistic, integrated security strategy. It advocates for a shift towards adaptive frameworks that prioritize identity-centric models (like Zero Trust), unified visibility, and automated compliance monitoring to effectively protect distributed cloud ecosystems.

Keywords

Data Fragmentation
Data Privacy
Encryption Gaps
Identity and Access Management (IAM)
IAM Fragmentation
Compliance Fragmentation
Visibility Gaps
Monitoring
API Vulnerabilities
Misconfigurations
Zero Trust
STRIDE
DREAD.
Multi-Cloud Environments
Cloud Security
Security Challenges
Threat Landscape
Architectural Complexity
Expanded Attack Surface

Authors

Agbanwu Joshua Ojomiache, Agbanwu Jedidiah Alefia

Rubric:Informatics
109
0

Share

109
0

References:

Burgess, M. (2023, July 11). A Microsoft Azure bug exposed customer data for years. WIRED. https://www.wired.com/story/microsoft-azure-bug-exposed-customer-data/

Business Research Insights. (2024). Governance Risk Management and Compliance (GRC) market size, share, growth, and industry analysis, by type, by application, regional forecast by 2033.  https://www.businessresearchinsights.com/market-reports/governance-risk-management-and-compliance-grc-market-102540

Cloud Security Alliance. (2023). State of cloud security concerns: Challenges and misconfigurations.
https://cloudsecurityalliance.org/research/state-of-cloud-security-concerns/

CrowdStrike. (2024). 2024 Global Threat Report. CrowdStrike Intelligence. https://www.crowdstrike.com/global-threat-report/

Cybersecurity Asia. (2024). 2024 Thales Cloud Security Study: Cloud resources now Singapore’s biggest targets for cyberattacks. https://cybersecurityasia.net/2024-thales-cloud-security-study-released/

Fortinet. (2024). Key findings from the 2024 Cloud Security Report. https://www.fortinet.com/content/dam/fortinet/assets/reports/report-2024-cloud-security.pdf

IBM Security. (2023). Cost of a data breach report 2023. IBM Corporation. https://www.ibm.com/reports/data-breach

IBM Security. (2024). IBM X-Force Threat Intelligence Index 2024. IBM Security Research.
https://www.ibm.com/reports/threat-intelligence

Isbitski, M. (2023). Sysdig 2023 cloud-native security and usage report. Sysdig Research.
https://sysdig.com/blog/2023-cloud-native-security-usage-report/

Jada, I., & Mayayise, T. O. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8(2), 100063. https://doi.org/10.1016/j.dim.2024.100063

Joshi, H. (2025). Emerging technologies driving Zero Trust maturity across industries. IEEE Open Journal of the Computer Society, 6, 25–34. https://doi.org/10.1109/OJCS.2024.3503056

Khan, R. S. (2025). Security challenges and mitigation strategies in multi-cloud environments: A comprehensive analysis. World Journal of Advanced Research and Reviews, 26(01), 3725–3731. https://doi.org/10.30574/wjarr.2025.26.1.1502

Krebs, B. (2022, June 10). Oracle bug allowed anyone to hijack any AWS account. Krebs on Security. https://krebsonsecurity.com/2022/06/oracle-bug-allowed-anyone-to-hijack-any-aws-account/

Markets and Markets. (2024).Cloud Security Posture Management Market by Component (Solutions and Services), Cloud Model (IaaS, PaaS, and SaaS), Vertical (BFSI, Healthcare, Retail & eCommerce, IT & ITeS, Government, and Education) and Region  Global Forecast to 2027.

https://www.marketsandmarkets.com/Market-Reports/cloud-security-posture-management-market-71228949.html

Microsoft. (2023). 2023 State of Cloud Permissions Risks report. Microsoft Entra.

https://www.microsoft.com/entra/cloud-permissions-risk-report

Microsoft. (2024). Microsoft Digital Defense Report 2024. Microsoft Security Insider.

https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024 

Orca Security. (2024). What is multi-cloud compliance? Orca Security Research.

https://orca.security/resources/blog/what-is-multi-cloud-compliance/

Palo Alto Networks Unit 42. (2023). Cloud Threat Report, Vol. 7. Palo Alto Networks, Inc.

https://www.paloaltonetworks.com/unit42/cloud-threat-report-vol-7

Potla, S. (2025). Securing multi-cloud environments: Challenges and solutions. Journal of Computer Science and Technology Studies, 7(4), 780–785. https://doi.org/10.32996/jcsts.2025.7.4.90

Reece, M., Lander Jr., T. E., Mittal, S., Rastogi, N., Dykstra, J., & Sampson, A. (2023). Systemic risk and vulnerability analysis of multi-cloud environments. arXiv preprint arXiv:2306.01862.

Shackleford, D. (2024). Multi-cloud security challenges and best practices. TechTarget SearchSecurity.

https://www.techtarget.com/searchsecurity/tip/Multi-cloud-security-challenges-and-best-practices

StrongDM. (2024). The State of Zero Trust Security in the Cloud Report. StrongDM Research.

https://www.strongdm.com/blog/state-of-zero-trust-security-cloud

Thales Group. (2023). Data Threat Report 2023 – Pathways to Sovereignty. Thales Cloud Security Research.

https://cpl.thalesgroup.com/2023/data-threat-report

Thales Group. (2024). 2024 Cloud Security Study. Thales Group. https://cpl.thalesgroup.com/cloud-security-research

Wiz. (2024). Cloud Security Report 2024.

https://www.wiz.io/cloud-security-report-2024

 

Other articles of the issue

Bykov Pavel Risk analysis in the field of international furniture trade: how to minimize losses when interacting with China
Download article in PDF192 views
cc-license
About us Journals Books
Publication ethics Terms of use of services Privacy policy
Copyright 2013-2025 Premier Publishing s.r.o.
Praha 8 - Karlín, Lyčkovo nám. 508/7, PSČ 18600, Czech Republic pub@ppublishing.org