Analysis of open-source tools for protecting resources in cloud environments
DOI:
https://doi.org/10.34185/1562-9945-1-156-2025-04Keywords:
cloud environments, cybersecurity, software, open source software, distributed systems, Checkov, Falco, CSPM, CWPP.Abstract
Cloud environments are becoming an integral part of the infrastructure of many com-panies due to their flexibility, accessibility and efficiency. However, due to their dynamic na-ture, they create new threats to data security, therefore, they require separate tools to combat them. The article compares existing open source tools for protecting cloud environments: Checkov, Falco, Keycloak. According to the article, the main benefits of open source software are: price, stability and community support. For each of the tools some flaws are found which make these tools vulnerable to mali-cious actors: Checkov implements CSPM process which does not monitor the runtime environment, so it cannot identify suspicious behavior, such as an unexplained spike in network activity. Falco is hard to integrate into existing systems as it requires agents to be added to each component. Also it does not has any information on the control pane so it does not view on the entirety of the cloud which allows attacks to target underlying infrastructure instead of workloads Keycloak has issues with scalability and can be difficult to configure and customize to integrate with some systems. Some systems might require some custom solutions to make integration possible and these solutions can lead to new vulnerabilities being introduced into the system. Also clients’ credentials might get compromised which can allow bad actors to access the system. These flaws make these tools not universal, so it creates the need to deploy and support several tools at once to protect the cloud, which leads to the complexity of the systems as a whole and increases their costs. Also, the complexity of the system can create new, non-obvious attack vectors. This demonstrates the need to create more advanced and universal tools that can simplify the process of protecting cloud environments.
References
R. Kumar and R. Goyal, “On cloud security requirements, threats, vulnerabilities and countermeasures: A survey,” Computer Science Review, vol. 33, pp. 1–48, 2019.
Hassan Takabi and James B.D. Joshi, University of Pittsburgh, Gail –Joon and Ahn Arizona State University, “Security and Privacy Challenges in Cloud Computing Environments”, IEEE security and privacy, www.computer.org/security, 2010, pp. 24 – 31
The Latest 2024 Cyber Crime Statistics [Електронний ресурс] - 2024. - Режим доступу до ресурсу: https://aag-it.com/the-latest-cyber-crime-statistics/
Chauhan, Milan & Shiaeles, Stavros. (2023). An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network. 3. 422-450. 10.3390/network3030018.
Mogos, Gabriela. (2019). Cloud Security. Critical analysis. International Journal of Computer Science and Information Security,. 17. 51-54.
Singh, Chetanpal & Thakkar, Rahul & Warraich, Jatinder. (2023). IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations. European Journal of Engineering and Technology Research. 8. 30-38. 10.24018/ejeng.2023.8.4.3074.
Doinea, Mihai. (2010). Open Source Security Tools. Open Source Science Journal. 2.
International Journal of Scientific Research in Computer Science, E., & IJSRCSEIT, I. T. (2020). CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment). International Journal of Scientific Research in Computer Science, Engineering and Information Technology. https://doi.org/10.32628/CSEIT206268
Yadav, Baleshwar & Sharma, Mansi. (2023). Cloud Workload Protection Platform Market.
D., Divyabharathi & Cholli, Nagaraj. (2020). A Review on Identity and Access Management Server (KeyCloak). International Journal of Security and Privacy in Pervasive Computing. 12. 46-53. 10.4018/IJSPPC.2020070104.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 System technologies

This work is licensed under a Creative Commons Attribution 4.0 International License.