Author
Listed:
- Balasubrahmanya Balakrishna
Abstract
Purpose: As organizations increasingly migrate to the cloud, ensuring robust data security becomes paramount. This technical paper explores the purpose, methodology, findings, and unique contributions in cloud security, focusing on AWS Systems Manager (SSM) and Secrets Manager. The objective is to provide a comprehensive guide for engineers and architects seeking to enhance data security in their cloud environments. Methodology: The comparative study conducted involves analyzing the features, capabilities, and integration possibilities of AWS SSM and Secrets Manager. Real-world use cases, best practices, and security measures associated with these services are explored through a methodology that includes hands-on exploration, case studies, and a survey of existing literature to distill critical insights. Findings: The paper uncovers a rich landscape of security measures facilitated by AWS SSM and Secrets Manager. Findings highlight the strengths and limitations of each service, emphasizing the importance of their integration for a holistic security approach. Automated rotation of credentials, encryption options, IAM policies, and monitoring strategies emerge as critical findings, contributing to the overall understanding of secure cloud data management. Unique contributor to theory, policy, and practice: This work uniquely provides a detailed comparative analysis that empowers engineers and architects to make well-informed decisions. The paper offers insights into the nuances of AWS SSM and Secrets Manager, enabling professionals to tailor their security strategies based on specific use cases and requirements. The focus on real-world scenarios and identifying best practices make this contribution practical and applicable, serving as a valuable resource for those navigating the complex landscape of cloud security engineering and architecture.
Suggested Citation
Balasubrahmanya Balakrishna, 2024.
"Strategic Implementation of AWS Security Services: A Focus on Best Practices, SSM and Secrets Manager,"
Journal of Technology and Systems, CARI Journals Limited, vol. 6(1), pages 25-35.
Handle:
RePEc:bhx:ojtjts:v:6:y:2024:i:1:p:25-35:id:1659
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojtjts:v:6:y:2024:i:1:p:25-35:id:1659. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/JTS/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.