Volume 2 Issue 2 | 2025 | View PDF
Paper Id:IJMSM-V2I2P108
doi: 10.71141/30485037/V2I2P108
Securing the Public Sector: A Practical Roadmap for Mission-Critical Workloads in GovCloud
Tejas Dhanorkar, Bhaskar Yakkanti, Nithin Vunnam
Citation:
Tejas Dhanorkar, Bhaskar Yakkanti, Nithin Vunnam, "Securing the Public Sector: A Practical Roadmap for Mission-Critical Workloads in GovCloud" International Journal of Multidisciplinary on Science and Management, Vol. 2, No. 2, pp. 83-94, 2025.
Abstract:
Fast adoption of government cloud had accelerated IT modernization, becoming more scalable, cheaper, and improved the overall service delivery. However, securing mission critical workloads in environments such as AWS GovCloud, Azure Government and Google Assured Workloads are also difficult. Such cloud presents its own challenges, such as complex compliance and risk of integrating legacy systems and cybersecurity threats. This research survey the constraints to securing public sector cloud deployments and propose a proposes a pragmatic, policy-based road-map for improving the security, compliance, and operational resilience. Automation, Zero Trust Architecture (ZTA) and compliance monitoring are the key findings being needed for risk mitigation. Additionally, the research contrasts Gov-cloud security tactics with the commercial cloud world and finds that government clouds exhibit tighter identity control, accumulated data sovereignty and network segmentation. The strategic suggestions involve Traditional system modernization to DevSecOps and use of unified governance frameworks for the adoption of a secure and sustainable cloud. With these interventions, government agencies establish points of balance between innovation and security, allowing the protection of sensitive data while responding to evolving regulatory requirements.
Keywords:
Gov-cloud; public sector; cloud security; mission-critical workloads; compliance; Zero Trust; FedRAMP; data protection; government cloud.
References:
1. Md S. I. Papel et al., “Enhancing government IT infrastructure: Develop frameworks for modernizing government IT systems to improve security, efficiency, and citizen engagement,” Frontiers in Applied Engineering and Technology, vol. 1, no. 01, pp. 157–174, 2024.
2. K. R. Gade, “Migrations: Cloud migration strategies, data migration challenges, and legacy system modernization,” Journal of Computing and Information Technology, vol. 1, no. 1, 2021.
3. P. Mathur, “Cloud computing infrastructure, platforms, and software for scientific research,” in High Performance Computing in Biomimetics: Modeling, Architecture and Applications, 2024, pp. 89–127.
4. F. K. Parast et al., “Cloud computing security: A survey of service-based models,” Computers & Security, vol. 114, p. 102580, 2022.
5. V. R. Kommidi, S. Padakanti, and V. Pendyala, “Securing the cloud: A comprehensive analysis of data protection and regulatory compliance in rule-based eligibility systems,” Technology (IJRCAIT), vol. 7, no. 2, 2024.
6. Deloitte Consulting LLP, 2024 Deloitte Global Workforce Management Survey, Deloitte, 2024. [Online]. Available: https://www2.deloitte.com/content/dam/Deloitte/us/Documents/human-capital/us-2024-deloitte-global-workforce-management-survey.pdf
7. A. Odeh et al., “Navigating cloud computing security: Strategies, risks, and best practices,” in 8th IET Smart Cities Symposium (SCS 2024), vol. 2024. IET, 2024.
8. H. Rehan, “Zero-trust architecture for securing multi-cloud environments,” unpublished.
9. B. Abikoye and C. Agorbia-Atta, “Securing the cloud: Advanced solutions for government data protection,” World J. Adv. Res. Rev., vol. 23, pp. 901–905, 2024.
10. M. Al-Ruithe, E. Benkhelifa, and K. Hameed, “Key issues for embracing the cloud computing to adopt a digital transformation: A study of Saudi public sector,” Procedia Computer Science, vol. 130, pp. 1037–1043, 2018.
11. S. Daniel, S. Brightwood, and J. Oluwaseyi, “Cloud-based big data analytics (AWS, Azure, Google Cloud),” 2024, unpublished.
12. O. Babalola et al., “Policy framework for cloud computing: AI, governance, compliance and management,” Global Journal of Engineering and Technology Advances, vol. 21, no. 02, pp. 114–126, 2024.
13. D. D. Sam, The Impact of System Outages on National Critical Infrastructure Sectors: Cybersecurity Practitioners’ Perspective, Ph.D. dissertation, Marymount University, 2023.
14. A. Folorunso et al., “A governance framework model for cloud computing: Role of AI, security, compliance, and management,” 2024, unpublished.
15. R. El-Gazzar, E. Hustad, and D. H. Olsen, “Understanding cloud computing adoption issues: A Delphi study approach,” Journal of Systems and Software, vol. 118, pp. 64–84, 2016.
16. J. J. Cordes, S. E. Dudley, and L. Q. Washington, “Regulatory compliance burdens,” 2022, unpublished.
17. A. Folorunso et al., “The impact of ISO security standards on enhancing cybersecurity posture in organizations,” World Journal of Advanced Research and Reviews, vol. 24, no. 1, pp. 2582–2595, 2024.
18. S. Eeti and A. Renuka, “Strategies for migrating data from legacy systems to the cloud: Challenges and solutions,” TIJER (The International Journal of Engineering Research), vol. 8, no. 10, pp. a1–a11, 2021.
19. J. George, “Optimizing hybrid and multi-cloud architectures for real-time data streaming and analytics: Strategies for scalability and integration,” World Journal of Advanced Engineering Technology and Sciences, vol. 7, no. 1, p. 10-30574, 2022.
20. A. Annarelli et al., “The effectiveness of outsourcing cybersecurity practices: a study of the Italian context,” in Proc. Future Technologies Conf., Cham: Springer International Publishing, 2021.
21. M.-S. Pang and H. Tanriverdi, “Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of US federal government,” J. Strategic Inf. Syst., vol. 31, no. 1, p. 101707, 2022.
22. N. Ghadge, “Optimizing identity management: key strategies for effective governance and administration.”
23. V. R. Kommidi, S. Padakanti, and V. Pendyala, “Securing the Cloud: A Comprehensive Analysis of Data Protection and Regulatory Compliance in Rule-Based Eligibility Systems,” Technology (IJRCAIT), vol. 7, no. 2, 2024.
24. S. Somanathan, “Governance in Cloud Transformation Projects: Managing Security, Compliance, and Risk,” Int. J. Appl. Eng. Technol., vol. 5, 2023.
25. G. Kambala, “Designing resilient enterprise applications in the cloud: Strategies and best practices,” World J. Adv. Res. Rev., vol. 17, pp. 1078–1094, 2023.
26. S. Zhang et al., “Practical adoption of cloud computing in power systems—Drivers, challenges, guidance, and real-world use cases,” IEEE Trans. Smart Grid, vol. 13, no. 3, pp. 2390–2411, 2022.
27. R. F. Frogeri et al., “e-Government and green IT: The intersection point,” in Recent Advances in Data and Algorithms for e-Government, Cham: Springer International Publishing, 2023, pp. 103–126.
28. V. Jayasinghe, E. Erturk, and Z. Li, “Critical factors influencing cloud security posture of enterprises: An empirical analysis,” Inf. Dyn. Appl., vol. 2, no. 4, pp. 210–222, 2023.
29. A. Andronache, “Increasing security awareness through lenses of cybersecurity culture,” J. Inf. Syst. Oper. Manage., vol. 15, no. 1, 2021.
30. V. J. R. Kopparthi, “Federal cloud security: A strategic approach to FedRAMP compliance and governance,” Technology (IJRCAIT), vol. 7, no. 2, 2024.