International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2

United States | Information Technology | Volume 10 Issue 2, February 2021 | Pages: 1789 - 1783


A Factual Study on Hybrid Multi-Cloud Cyber Security Threats and Mitigation Approaches

Tirumala Ashish Kumar Manne

Abstract: The rapid adoption of hybrid multi-cloud environments has transformed the modern IT landscape, offering organizations enhanced scalability, flexibility, and cost-efficiency. These benefits come with significant cybersecurity challenges. The distributed nature of hybrid multi-cloud architectures introduces complex security threats, including data breaches, misconfigurations, insecure APIs, identity and access management vulnerabilities, and advanced persistent threats (APTs). The shared responsibility model complicates security oversight, increasing the risks posed by supply chain attacks and third-party integrations. This study provides a factual analysis of the cybersecurity threats prevalent in hybrid multi-cloud ecosystems, supported by real-world case studies and industry reports. It further explores advanced mitigation approaches such as the Zero Trust Security Model, AI-driven threat detection, and Secure Access Service Edge (SASE) frameworks. Best practices in identity management, regulatory compliance, and risk assessment are also examined to enhance cloud security resilience. Critically evaluating current security strategies and emerging trends, this research aims to provide actionable insights for enterprises, government agencies, and cloud service providers to strengthen their cybersecurity posture in hybrid multi-cloud deployments. The findings highlight the need for continuous innovation, robust governance models, and adaptive security frameworks to mitigate evolving threats in an increasingly complex cloud computing environment.

Keywords: Cybersecurity Threats, Identity and Access Management (IAM), Zero Trust Architecture (ZTA), Secure Access Service Edge (SASE), AI-Driven Threat Detection



Rate This Article!



Received Comments

No approved comments available.


Top