Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Cloud Security Posture Management in Resource-Constrained Organizations: A Review of Azure, AWS, and Hybrid Approaches

Authors: Kenneth Nnadi; Yaw Agyekumhene Okrah; Jochebed Akoto Opoku;

Cloud Security Posture Management in Resource-Constrained Organizations: A Review of Azure, AWS, and Hybrid Approaches

Abstract

Small and resource-constrained organizations increasingly adopt public cloud platforms such as Microsoft Azure and Amazon Web Services (AWS) to gain scalability and reduce infrastructure costs. However, these organizations face persistent security challenges due to limited budgets, skills shortages, and immature governance structures. Misconfigurations in cloud environments are now among the leading causes of data breaches, yet many small teams lack the expertise and tools to manage these risks effectively. Cloud Security Posture Management (CSPM) has emerged as a key approach to address this gap by continuously monitoring configurations, enforcing compliance, and automating remediation. This review examines how CSPM is implemented in Azure, AWS, and hybrid or multi-cloud environments, focusing on its applicability to resource-constrained organizations. It analyzes native CSPM capabilities such as Microsoft Defender for Cloud, Azure Policy, AWS Security Hub, and AWS Config, and compares their coverage, automation, compliance support, and cost models. Findings indicate that while Azure and AWS offer robust posture management features, their complexity, consumption-based pricing, and skills requirements limit adoption in smaller organizations. Hybrid CSPM platforms provide unified visibility and standardized compliance but introduce additional cost and integration challenges. The paper concludes with practical recommendations and a tiered roadmap for SMEs: start with built-in CSPM tools, enforce critical policies, and gradually integrate automation and compliance frameworks. Future research should focus on lightweight CSPM patterns and usability studies to ensure these solutions close, rather than widen, the security gap for small organizations.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!