Abstract:
1. Introduction and Cloud Security Landscape
1.1 Overview of Cloud Computing Adoption and Security Imperatives
Cloud computing has fundamentally transformed enterprise information technology infrastructure, enabling organizations to achieve unprecedented scalability, flexibility, and operational efficiency. However, this rapid adoption has concurrently expanded the attack surface and introduced novel security challenges that traditional security paradigms struggle to address. The expansion of cloud deployment across public, private, and hybrid models has created increasingly complex security management requirements, with organizations now responsible for protecting distributed infrastructure spanning multiple geographic regions and service providers .
The critical challenge facing cloud security teams is the inherent complexity of cloud configurations. As organizations migrate to cloud-native architectures, they often lack visibility into their own infrastructure configurations, creating silent vulnerabilities that can remain undetected for extended periods. Research indicates that misconfiguration has emerged as one of the most significant threat vectors affecting cloud security. Major security breaches, including the 2019 Capital One incident and the Toyota data exposure, have been attributed primarily to cloud misconfiguration rather than sophisticated zero-day exploits . These incidents demonstrate that configuration errors pose threats comparable to or exceeding those from advanced persistent threats, yet misconfiguration detection remains inadequately addressed by traditional security tools.


Downloads: PDF | DOI: 10.17148/IARJSET.2026.13431

How to Cite:

[1] Dr. Padmashri Rokade, Rutuja Giakwad, "Artificial Intelligence-Based Security Misconfiguration Detection in Cloud Environments: A Multi-Cloud Intelligent Risk Assessment Model," International Advanced Research Journal in Science, Engineering and Technology (IARJSET), DOI: 10.17148/IARJSET.2026.13431

Open chat