<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Y. Martseniuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Research of the Centralized Configuration Repository Efficiency for Secure Cloud Service Infrastructure Management⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yevhenii Martseniuk</string-name>
          <email>yevhenii.v.martseniuk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Partyka</string-name>
          <email>andrii.i.partyka@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Harasymchuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vyacheslav Cherevyk</string-name>
          <email>v.cherevyk@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nadiia Dovzhenko</string-name>
          <email>n.dovzhenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>With the development of cloud services on public cloud infrastructures such as AWS, GCP, or Azure, organizations sooner or later face the challenge of centralized cloud resource management. This management encompasses security standards, service metrics, and various operational indicators. The issue lies in the fact that each vendor has a unique structure for their services, which are often not interchangeable. This paper aims to analyze the challenges of configuration management using a single centralized data repository based on the study of cloud provider services and to develop recommendations and approaches for managing cloud infrastructure through a unified configuration management methodology. The paper also explores methods for organizing and managing Configuration Management Databases (CMDB) in a public cloud infrastructure environment. Particular attention is given to access management, organizational structures, subscriptions, and cloud resource inventory, aiming to optimize processes to improve overall efficiency and security. The paper presents a practical implementation of integrating the Cherwell system as a CMDB with automated data collection through the Prisma API for a commercial organization, which significantly improves data accuracy and ensures security.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cloud infrastructure</kwd>
        <kwd>configuration management</kwd>
        <kwd>CMDB</kwd>
        <kwd>security compliance</kwd>
        <kwd>security standard</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The Configuration Management Database (CMDB) is a key component in IT service management,
providing a centralized repository of information about IT assets and their configurations. In the
context of public cloud infrastructure, where resources and configurations are dynamic and
distributed, effective CMDB management is crucial for maintaining operational efficiency and
ensuring security. The purpose of this paper is to optimize configuration and resource management
in
public
cloud
environments
by
exploring
existing
methods
and
providing
practical
recommendations [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Managing Configuration Management Databases (CMDB) is a critical
aspect of IT management, as it ensures a centralized repository of information about IT assets and
their configurations. In the dynamic and distributed nature of public cloud infrastructure, effective
CMDB management is essential to maintaining operational efficiency and security.
      </p>
      <p>The main functions of a CMDB are as follows:</p>
      <p>Facilitating impact analysis: Providing information on how changes to one CI may affect
others, aiding in impact analysis and decision-making.</p>
      <p>Supporting IT service management: Enhancing IT service management practices by
providing accurate and up-to-date information about the IT environment.</p>
      <p>These CMDB functions enable effective IT infrastructure management, especially in the
complex and dynamic nature of public cloud environments.</p>
      <p>
        Scientific studies indicate that the core functions of a CMDB include storing detailed
information about Configuration Items (CIs), tracking changes, analyzing the impact of changes,
and supporting IT service management practices. For example, Ellison et al. (2018) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] emphasize
that integrating a CMDB with modern cloud platforms significantly simplifies the management of
complex workloads. Brenner and Gillmeister (2014) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] explore how well-designed CMDB data
models can reduce the complexity of IT infrastructure management while ensuring its
functionality. Herrick (2023) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] highlights the importance of assessing and improving existing
CMDBs to enhance operational efficiency.
      </p>
      <sec id="sec-1-1">
        <title>1.1. The role of CMDB in public cloud infrastructure</title>
        <p>
          In public cloud environments, the CMDB plays a key role due to the dynamic and scalable nature
of cloud resources, which continuously evolve based on organizational needs. For example, Keller
and Subramanian (2009) [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] emphasize the importance of adopting best practices when deploying a
CMDB for efficient management of large environments. They highlight that a well-structured
CMDB enables the integration of heterogeneous data sources, such as services from different cloud
providers or resources located in various geographic regions. This, in turn, provides a holistic view
of an organization’s infrastructure, simplifying management and ensuring process transparency.
        </p>
        <p>Yaici (2022) [7] proposes an innovative approach to resource availability using a peer-to-peer
architecture. This solution enables quick responses to user requests even during the temporary
unavailability of certain cloud resources. Such an approach significantly enhances the reliability of
cloud infrastructure and improves CMDB functionality, particularly in multi-cloud or distributed
environments.</p>
        <p>
          Additionally, the role of CMDB in cloud infrastructure extends to automating resource
management processes. As noted by Ellison et al. (2018) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], integrating a CMDB with automated
management systems can substantially reduce manual work, minimize human error, and ensure
data accuracy. Automation also enables faster responses to configuration changes and ensures
compliance with regulatory requirements.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Challenges in managing CMDB in cloud environments</title>
        <p>
          Managing a CMDB in public cloud environments faces several challenges due to the complexity
and dynamic nature of such systems. One of the key issues is the diversity of cloud services and
their configurations. Brenner and Gillmeister (2014) [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] point out that the large number of service
providers, each using their standards and architectures, makes maintaining a comprehensive
configuration management database extremely challenging. This creates barriers to data
integration and complicates the development of a cohesive infrastructure model.
        </p>
        <p>Visibility issues regarding resources and their interrelationships are particularly pronounced in
multi-cloud environments, where organizations work with multiple providers simultaneously. As
Yen-Jen and Chen (2023) [8] note, integrating highly available databases into virtualized cloud
platforms is a critical step toward ensuring system reliability. However, this requires significant
technical effort and careful planning to avoid performance issues or incompatibility between
different platforms.</p>
        <p>
          Ellison et al. (2018) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] also emphasize the necessity of automating processes to maintain the
accuracy and relevance of data in the CMDB. Constant changes in cloud resources and the rapid
pace of updates make manual database management increasingly difficult. Automation not only
simplifies these processes but also enables the integration of CMDB with other IT management
tools, reducing the risks of data loss or non-compliance with regulatory requirements.
Another significant challenge is ensuring data security in cloud environments. Growing regulatory
compliance demands require CMDBs to not only maintain configuration accuracy but also protect
information from potential threats. This necessitates the use of modern monitoring and analytics
tools that should be directly integrated into the CMDB infrastructure.
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>1.3. Access as a configuration Item in CMDB</title>
        <p>In public cloud environments, access to resources is not only an operational task but also a critical
configuration element that must be accounted for in a comprehensive configuration management
system (CMDB). Since access configurations directly impact the security and integrity of cloud
infrastructure, integrating access data into the CMDB is essential for ensuring a holistic approach
to cybersecurity.</p>
        <p>Access Identification via IAM: Identity and Access Management (IAM) systems are the
primary source of data on access policies, user roles, and permissions. These data should be
integrated into the CMDB as Configuration Items (CIs) [9] enabling the following:
1.
2.
3.</p>
        <sec id="sec-1-3-1">
          <title>Tracking changes to access policies with a history of modifications. Detecting potential conflicts or errors in permissions. Ensuring compliance with the principle of least privilege.</title>
          <p>Roles and Access Attributes as Configuration Parameters: Role-based access control
(RBAC) and attribute-based access control (ABAC) should be represented as configuration
parameters in the CMDB. This enables the following:
1. Establishing relationships between roles, resources, and users that reflect real dependencies
in the cloud infrastructure [10].
2. Leveraging access attributes to create conditional security policies that automatically adapt
based on context (e.g., geographic location or time of access).</p>
          <p>Access Data Integrity: Access information in the CMDB must be accurate and complete [11].
Automating the collection of access data from sources such as cloud platforms (AWS IAM, Azure
AD, Google Cloud IAM) or third-party tools (Okta, CyberArk) helps achieve the following:

</p>
        </sec>
        <sec id="sec-1-3-2">
          <title>Preventing security policy gaps due to delayed updates. Identifying potential access policy violations at early stages.</title>
          <p>The Role of Access in the Holistic Picture of Cybersecurity: Access configurations are an
integral part of the cybersecurity of cloud infrastructure. The lack of a unified approach to access
management through the CMDB can lead to:</p>
          <p>The emergence of “blind spots” where permissions or access policies remain inconsistent
across different cloud environments [12].</p>
          <p>The risk of non-compliance with regulatory requirements due to failure to adhere to
security compliance principles.</p>
        </sec>
        <sec id="sec-1-3-3">
          <title>Integrating access into the CMDB also faces the following challenges:</title>
          <p>


</p>
          <p>AScalability issues: The large number of users, roles, and access rules in large
organizations generates substantial amounts of data that require processing.
Updates automation: Ensuring data accuracy requires the implementation of automated
synchronization mechanisms between the CMDB and IAM systems.</p>
          <p>Contextual nature of data: Access data is often context-dependent, which complicates its
standardization for integration into the CMDB.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Overview of CMDB offerings in the cloud solutions market</title>
      <p>A Configuration Management Database (CMDB) is a critical component for organizations utilizing
cloud platforms. It enables centralized storage of data about resources, their configurations, and
relationships, ensuring transparency in infrastructure management [13, 14]. AWS, Azure, and GCP
offer unique capabilities for integration with CMDBs, automating resource inventory and
management. However, each platform has distinct features that influence organizational processes.</p>
      <sec id="sec-2-1">
        <title>2.1. Resource inventory features on AWS</title>
        <p>Amazon Web Services (AWS) provides tools for resource inventory and management,
characterized by a high level of automation and integration with other AWS ecosystem services. A
key solution is AWS Config, which creates a comprehensive inventory of cloud resources, tracks
changes, and ensures compliance with organizational security policies. This service enables
organizations to gain a complete view of resource status and monitor adherence to regulatory
standards.</p>
        <p>Another significant tool is AWS Systems Manager, which simplifies centralized configuration
management. This service allows resource data to be seamlessly integrated into the CMDB,
ensuring accuracy and up-to-date information. AWS’s main advantages include deep integration
within its ecosystem, which automates most resource inventory and management processes [15].
Additionally, AWS APIs provide robust capabilities for integrating with external CMDB systems,
enhancing functionality, and simplifying configuration management. However, a key limitation is
AWS’s strong focus on its ecosystem, which can pose challenges for organizations operating in
multi-cloud environments that require flexible integration with other platforms [16].</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Resource inventory features on Azure</title>
        <p>Microsoft Azure provides centralized resource management through tools like Azure Resource
Manager (ARM). ARM enables the use of templates to describe infrastructure and integrate with
CMDB, simplifying the implementation of configuration management standards. To monitor
resource status and ensure compliance with organizational standards, Azure offers Azure Monitor
and Azure Policy. These services help detect and correct configuration violations, ensuring all
resources adhere to established policies. A key advantage of Azure is its close integration with
other Microsoft enterprise solutions, such as Active Directory. This seamless integration supports
organizations utilizing hybrid environments that combine cloud and on-premises resources.
However, compared to AWS and GCP, Azure’s capabilities for multi-cloud management are less
developed, which may limit its use in more complex infrastructures [17].</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Resource inventory features on GCP</title>
        <p>Google Cloud Platform (GCP) stands out for its focus on analytics and tools for detailed resource
monitoring. The primary tool is Google Cloud Asset Inventory, which enables comprehensive
resource inventory management with integration capabilities for CMDB. This service ensures a
precise representation of configurations, changes, and dependencies among resources. For deeper
analysis and monitoring, GCP offers the Google Cloud Operations Suite (formerly Stackdriver),
which provides tools for performance monitoring, log analysis, and issue diagnostics. GCP’s
strengths lie in its analytical orientation, allowing for effective resource usage forecasting and early
problem detection. Additionally, GCP actively supports multi-cloud environments through services
like Anthos, which ensures unified resource management across multiple clouds. However,
integrating GCP tools with traditional CMDB systems can be challenging due to differences in data
modeling and configuration approaches [18].</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Comparison of CMDB solutions from cloud service providers</title>
        <sec id="sec-2-4-1">
          <title>Based on the above, the following conclusions can be drawn:</title>
          <p>


</p>
          <p>AWS, Azure, and GCP each offer unique features for resource management suitable for
different use cases.</p>
          <p>AWS provides robust tools for CMDB integration but limits flexibility in multi-cloud
environments [19].</p>
          <p>Azure is ideal for organizations with hybrid infrastructures due to its integration with other
Microsoft enterprise solutions.</p>
          <p>GCP excels in analytics and multi-cloud support but may require additional effort to
integrate with traditional CMDB systems.</p>
          <p>Table 1 highlights the specific strengths and limitations of each platform. The choice of platform
depends on an organization’s specific needs, infrastructure, and strategic goals.</p>
        </sec>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. What does the market offer for CMDB integration and resource inventory management?</title>
        <p>The modern market provides a range of tools that simplify CMDB integration with cloud platforms
and automate resource inventory and management. These solutions not only maintain
configuration data but also automate the collection, monitoring, and analysis of information from
cloud environments such as AWS, Azure, and GCP. Below are key platforms that offer a
comprehensive approach to addressing this challenge [20].</p>
        <p>ServiceNow ITOM is a leading solution for CMDB management in cloud environments. It
offers deep integration with major cloud platforms, including AWS, Azure, and GCP, through APIs.
This enables automatic resource data collection, tracking of changes, and storing this information
in the CMDB. Additionally, ServiceNow ITOM provides analytical tools to evaluate the impact of
changes on the infrastructure, allowing organizations to respond quickly to dynamic changes in
cloud environments.</p>
        <p>Cherwell ITSM is another popular choice for CMDB management. With integration via the
Prisma API, this tool ensures automated data collection on cloud resources and keeps it up to date.
Cherwell is known for its flexibility in configuring data models, making it suitable for
organizations with unique or complex infrastructures. An added benefit is the ability to configure
workflows to automate routine tasks.</p>
        <p>HashiCorp Terraform takes a unique approach to configuration management by focusing on
the Infrastructure as Code (IaC) principle. It allows for synchronizing configurations with CMDB
and ensures automated management of changes in cloud infrastructure. Terraform is also
distinguished by its multi-cloud support, making it ideal for organizations with diverse cloud
environments.</p>
        <p>BMC Helix Discovery specializes in the automatic discovery of cloud resources and their
integration with CMDB. The tool allows for rapid identification of new assets and storing them in a
centralized database. Multi-cloud support provides BMC Helix Discovery with the flexibility to
work with various platforms, enabling organizations to achieve a unified view of all their
resources.</p>
        <p>CloudHealth by VMware focuses on resource inventory, cost management, and integrating
this data with CMDB. The tool allows organizations to optimize their costs by analyzing resource
usage while automating data collection to keep information up to date.</p>
        <p>Solutions for integrating CMDB with cloud platforms, such as ServiceNow ITOM, Cherwell
ITSM, HashiCorp Terraform, BMC Helix Discovery, and CloudHealth by VMware, play a
crucial role in modern cloud infrastructure management. Each of these tools offers unique
approaches to integration, automation, and configuration management, enabling organizations to
choose a solution that fits their specific needs.</p>
        <p>ServiceNow ITOM is a powerful solution offering deep integration with major cloud platforms
(AWS, Azure, GCP) and providing analytical capabilities for change management. However, its
multi-cloud support is moderate, which may limit its effectiveness in complex infrastructures.</p>
        <p>Cherwell ITSM stands out for its flexibility and ability to integrate with numerous APIs. The
tool offers convenient customization of data models and workflow automation, making it ideal for
organizations with complex and multi-cloud environments. Cherwell also integrates a
serviceoriented approach, covering not only resource inventory but also service management, change
management, and incident handling.</p>
        <p>HashiCorp Terraform focuses on the Infrastructure as Code (IaC) approach, making it ideal
for configuration automation in multi-cloud environments. However, its functionality is more
focused on the technical aspects of resource management rather than service management.</p>
        <p>BMC Helix Discovery provides an efficient tool for automatically discovering cloud assets and
integrating them with CMDB. With multi-cloud support and rapid detection of new resources, this
solution ensures effective inventory management. However, its functionality is limited in terms of
analytics and service management capabilities.</p>
        <p>CloudHealth by VMware focuses on cost management and resource usage optimization while
integrating this data with CMDB. However, its configuration management capabilities are less
advanced compared to other tools.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6. Key aspects of choosing a system</title>
        <p>



</p>
        <p>ServiceNow ITOM is an effective solution for organizations requiring deep integration with
cloud platforms and advanced analytical tools.</p>
        <p>Cherwell ITSM is the best choice when flexibility, automation, and integration with a wide
range of services are priorities.</p>
        <p>HashiCorp Terraform is optimal for organizations adopting Infrastructure as Code (IaC)
and operating in multi-cloud environments.</p>
        <p>BMC Helix Discovery is suitable for rapid resource discovery and CMDB integration in
multi-cloud environments.</p>
        <p>CloudHealth by VMware is ideal for companies focused on cost optimization and resource
monitoring.</p>
        <p>Each system offers a unique set of features tailored to different aspects of CMDB integration
and management. Choosing the best solution depends on the organization’s specific needs, such as
infrastructure scale, automation requirements, multi-cloud support, and the prioritization of service
or analytical capabilities [21].</p>
        <p>Overall, Cherwell ITSM provides the most balanced approach, combining flexibility, ease of
configuration, and robust integration capabilities, making it a standout leader among the presented
solutions. Its versatility and adaptability make it an optimal choice for organizations aiming to
integrate CMDB effectively with cloud platforms. Cherwell enables automatic data collection via
APIs, integrates with a wide range of services, and allows data models to be easily customized to
meet specific organizational needs. Additionally, its integrated service-oriented approach facilitates
the automation of complex workflows, ensuring high efficiency in multi-cloud environments.</p>
        <p>Compared to other solutions such as ServiceNow ITOM or CloudHealth by VMware,
Cherwell ITSM offers greater flexibility in customization and provides superior multi-cloud
support. Unlike HashiCorp Terraform, which focuses on Infrastructure as Code, Cherwell
ITSM delivers a broader range of functionalities, managing both resources and services, including
change and incident integration. This makes Cherwell ITSM not only a versatile tool but also a
strategic solution for organizations aiming to maximize the value of their CMDB [22].</p>
        <p>Table 2 highlights Cherwell ITSM’s advantages over its competitors, making it the most
comprehensive option for effective cloud platform integration.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Organizational structures and subscription management: The role of CMDB in ensuring efficiency</title>
      <p>Effective resource management in public cloud environments requires a well-defined
organizational structure and subscription management strategy. CMDB, as a centralized repository
of configuration information, plays a key role in ensuring transparency, consistency, and
optimization of these processes. This section examines how organizational structures and
subscription management integrate with CMDB to achieve greater efficiency in managing cloud
resources.</p>
      <sec id="sec-3-1">
        <title>3.1. Organizational structures</title>
        <p>Large organizations using cloud platforms often face the need to manage a large number of
accounts (tenants) distributed across various projects, departments, or environments such as
development, testing, and production. In this context, a tenant is defined as a logically isolated
unit provided to users or user groups within a shared cloud platform or service. The core concept
of a tenant is to ensure the isolation of data, configurations, users, and resources of one client from
others using the same cloud platform [23].</p>
        <p>The isolation provided by tenants allows organizations to create segmented environments for
different business needs, such as testing new features without the risk of impacting production
systems. It also supports compliance with security policies and simplifies resource management in
large-scale infrastructures.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.1.1. Using CMDB for tenant management</title>
        <p>A Configuration Management Database (CMDB) can serve as a key tool for integrating and
managing tenants. In the CMDB, each tenant can be represented as a Configuration Item (CI),
enabling the efficient structuring of data about all organizational accounts. This creates a
foundation for implementing a structured approach to account management through the following
key mechanisms:

</p>
        <p>Account Segmentation: CMDB enables the organization of accounts into logical groups
according to organizational structure, projects, or environments. This segmentation
simplifies access management, resource allocation, and cost control, providing precise data
on resource usage within each group.</p>
        <p>Centralized Management: Integrating tenants into the CMDB allows for the
implementation of unified security and compliance policies across all accounts. For
example, automated monitoring can continuously verify that each tenant’s configurations
adhere to established standards and policies [24].</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.1.2. Tagging and categorization as resource organization tools</title>
        <p>In addition to account management, the CMDB supports tagging and categorization functions,
which are powerful tools for organizing and analyzing cloud resources.</p>
        <p>
</p>
        <p>Tagging enables the addition of metadata to resources, such as identifying their owner,
project, environment, or other attributes. This simplifies resource search and grouping
processes and facilitates usage analysis. For instance, the tag “Development” helps track
expenses during a specific project phase.</p>
        <p>Categorization allows resources to be logically grouped by application type, environment,
or other attributes. This creates a structured view of resources, significantly simplifying
reporting, cost management, and performance monitoring.</p>
        <p>The integration of tenants into the CMDB, complemented by tagging and categorization functions,
creates a unified management system that meets modern scalability and security requirements for
cloud infrastructure. This approach is particularly important for large organizations operating in
multi-cloud environments, where it is critical not only to control resources but also to ensure their
optimal use in terms of cost, performance, and compliance with standards [25].</p>
        <p>Through these mechanisms, the CMDB becomes more than just a repository of configuration
data—it evolves into a strategic tool that supports the effective management of the entire cloud
infrastructure.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.2. Subscription management</title>
        <p>
          Subscription management in cloud environments is a critical aspect of ensuring cost transparency
and efficient resource utilization. In this context, the Configuration Management Database
(CMDB) serves as a powerful tool for integrating subscription data, tracking expenses, and
forecasting budgets. Through its centralization and analytics capabilities, the CMDB allows
organizations to gain greater control over their cloud investments [
          <xref ref-type="bibr" rid="ref7">26</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>3.2.1. Cost control through CMDB integration</title>
        <p>Integrating subscription data with the CMDB enables organizations to perform a deeper analysis of
costs. The CMDB consolidates information on expenses at the level of individual accounts, projects,
or departments, creating a clear picture of resource allocation. For instance, an organization can
track which project or department consumes the most cloud resources, enabling the identification
of areas for optimization.</p>
        <p>
          By integrating with the CMDB, organizations can also identify opportunities for cost reduction.
Resource usage analysis helps detect underutilized or redundant subscriptions and recommends
transitions to more cost-effective models, such as reserved instances. This not only leads to
savings but also allows for more effective future resource planning [
          <xref ref-type="bibr" rid="ref8">27</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-6">
        <title>3.2.2. Budgeting and expense forecasting</title>
        <p>The CMDB plays a key role in budgeting and forecasting cloud expenses. Subscription data
integration allows for the creation of accurate budgets for projects or departments based on
historical resource usage data. For example, if a department consistently exceeds its budget, the
CMDB can help identify the root causes and provide recommendations for reducing expenses.</p>
        <p>
          Forecasting future expenses is also significantly simplified by the CMDB’s analytical
capabilities. Considering planned changes in resource configurations or usage volumes, the CMDB
can predict potential costs. This allows organizations to adjust budgets in advance and avoid
unexpected expenses. For instance, if scaling a specific service is planned, the CMDB can estimate
its impact on the organization’s overall expenses [
          <xref ref-type="bibr" rid="ref9">28</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-7">
        <title>3.2.3. Access Control in the Context of Subscription Management</title>
        <p>The CMDB can be integrated with Identity and Access Management (IAM) tools to provide
centralized control over access policies for cloud resources. This includes:


</p>
        <p>Role Analysis and Optimization: The CMDB integrates with IAM systems (e.g., AWS
IAM, Azure AD), enabling the tracking of who has access to which resources and
identifying excessive privileges.</p>
        <p>Access Management Automation: Through the automatic detection of changes in access
privileges, the CMDB can alert organizations to security policy violations or anomalous
actions requiring attention.</p>
        <p>
          Compliance with Security Policies: The CMDB stores information about IAM
configurations, facilitating regular audits and ensuring compliance with regulatory
requirements [
          <xref ref-type="bibr" rid="ref10">29</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-8">
        <title>3.2.4. Integration with security tools</title>
        <p>The CMDB works effectively in conjunction with modern security tools like Splunk, Prisma
Cloud, and Tenable to ensure a comprehensive approach to risk management and security in
cloud environments:
</p>
        <p>Splunk: Integrating the CMDB with Splunk centralizes data on configurations and security
events, creating a single source of truth for threat analysis and anomaly monitoring.</p>
        <p>Prisma Cloud: Integration with Prisma enables the automatic collection of data on cloud
resource configurations, comparison with security policies, and detection of vulnerabilities.
The CMDB stores this information and facilitates historical analysis to enhance compliance
with standards.</p>
        <p>Tenable: By leveraging CMDB data, Tenable can perform vulnerability scans with
configuration context, allowing organizations to prioritize the remediation of the most
critical threats.</p>
      </sec>
      <sec id="sec-3-9">
        <title>3.2.5. The importance of CMDB Integration in subscription management processes</title>
        <p>
          Integrating CMDB with subscription management, access control (IAM), and security tools like
Splunk, Prisma Cloud, and Tenable unlocks new opportunities for optimizing costs and
strengthening cloud infrastructure security. By combining data on subscriptions, access roles, and
security events, CMDB becomes a versatile tool that enables organizations to achieve transparency,
automation, and compliance across all aspects of cloud resource management [
          <xref ref-type="bibr" rid="ref11">30</xref>
          ].
        </p>
        <p>The advanced capabilities of CMDB not only allow for tracking costs at the project or
departmental level but also facilitate budget forecasting, identifying opportunities for savings, and
optimizing subscription usage. Integration with IAM ensures centralized access control, eliminates
excessive privileges, and enhances security through regular configuration audits. At the same time,
the use of modern security tools like Prisma Cloud and Tenable enables proactive vulnerability
monitoring and more effective risk prioritization.</p>
        <p>
          This comprehensive approach to subscription and security management not only promotes cost
savings and resource optimization but also provides a robust foundation for protecting data and
configurations in cloud environments. In the rapidly evolving world of cloud technologies, CMDB
integration with access management and security systems becomes a strategic element that allows
organizations to achieve operational excellence and mitigate risks while maintaining high
standards of performance and compliance [
          <xref ref-type="bibr" rid="ref12">31</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-10">
        <title>3.3. Using CMDB in cloud platform management</title>
        <p>
          Managing cloud platforms is a complex task requiring the integration of diverse approaches to
configuration, security, monitoring, and resource optimization. The Configuration Management
Database (CMDB) serves as a central tool, ensuring consistency and transparency across all aspects
of cloud environment management. This section explores how CMDB can be leveraged to automate
processes, ensure regulatory compliance, optimize costs, and enhance security [
          <xref ref-type="bibr" rid="ref13">32</xref>
          ].
        </p>
        <p>Organizational structures and subscription management are integrated with CMDB through
automated data collection tools, such as cloud provider APIs or specialized configuration
management solutions. This integration ensures:


</p>
        <p>A single source of truth: All data about accounts, subscriptions, and resources is
accessible in one unified system.</p>
        <p>Real-time updates: Data is refreshed instantly, reducing risks associated with outdated
information.</p>
        <p>
          Flexibility and scalability: CMDB easily adapts to changes in organizational structure or
cloud resource volume [
          <xref ref-type="bibr" rid="ref14">33</xref>
          ].
        </p>
        <p>
          Integrating organizational structures and subscriptions into CMDB creates a centralized
management platform that supports transparency, efficiency, and compliance with regulatory
requirements. This forms the foundation for effective resource management in modern cloud
environments [
          <xref ref-type="bibr" rid="ref15">34</xref>
          ].
        </p>
        <p>
          One of the key functions of CMDB is the automation of configuration management. Integration
with Infrastructure as Code (IaC) tools such as Terraform or Ansible enables the automated
creation, configuration, and management of cloud resources. CMDB stores data on current
configurations, synchronizing with automated deployment processes. This reduces the risk of
human error and accelerates the implementation of changes. In incident scenarios, CMDB provides
the necessary data for automatically restoring the infrastructure to a stable state while retaining
information on previous configurations [
          <xref ref-type="bibr" rid="ref16">35</xref>
          ].
        </p>
        <p>CMDB enables the modeling of dependencies between resources, such as databases,
applications, or network interfaces. This simplifies impact analysis for changes, reducing the risk of
conflicts and configuration incompatibilities. For instance, when updating a server environment,
CMDB can quickly assess the impact of changes on related services.</p>
        <p>
          CMDB contributes to performance optimization through integration with monitoring tools such
as AWS CloudWatch or Datadog. This allows organizations to monitor resource performance,
identify bottlenecks, and propose solutions, such as scaling or reconfiguring resources. CMDB data
is used to analyze resource utilization efficiency, helping to prevent overloads or inefficient
capacity distribution [
          <xref ref-type="bibr" rid="ref17">36</xref>
          ].
        </p>
        <p>To meet regulatory requirements, CMDB stores information about access policies, encryption
configurations, and other security aspects. Automated reporting tools enable organizations to
conduct regular audits and demonstrate compliance with standards such as GDPR, HIPAA, or PCI
DSS. This is particularly crucial for organizations handling sensitive data or operating in regulated
industries.</p>
        <p>CMDB integration with change management systems allows for analyzing the impact of
proposed changes on other resources and services. This ensures proper prioritization of changes,
supports efficient planning, and minimizes the risk of system stability disruptions.</p>
        <p>
          From a security perspective, CMDB facilitates the analysis of access policies and helps ensure
adherence to the principle of least privilege. CMDB data can identify vulnerable configurations and
enable their automatic remediation [
          <xref ref-type="bibr" rid="ref18">37</xref>
          ]. This improves the security level of cloud infrastructure
and minimizes the risk of security breaches.
        </p>
        <p>Support for multi-cloud environments is becoming increasingly relevant. A CMDB
enables the integration of data from various platforms, such as AWS, Azure, or GCP, providing a
single point of access to configuration information. This greatly simplifies the management of
complex multi-cloud environments.</p>
        <p>The integration of CMDB with DevOps processes, particularly CI/CD, ensures compliance with
configuration standards at all stages of development and deployment. Leveraging CMDB within
DevSecOps allows security considerations to be addressed from the very beginning of a resource’s
lifecycle.</p>
        <p>
          CMDB is an integral part of cloud platform management. Its use enables organizations to
automate configurations, enhance security, optimize costs, and ensure regulatory compliance. This
makes CMDB a critical tool for maintaining the efficiency and reliability of modern cloud
infrastructure [
          <xref ref-type="bibr" rid="ref19">38</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Cherwell and Prisma API: Enhancing CMDB management efficiency in cloud infrastructure</title>
      <p>Modern CMDB management in cloud environments requires a high level of automation,
integration, and flexibility. The Cherwell platform, known for its functionality and
userfriendliness, offers tools for efficient CMDB management, while integration with the Prisma API
extends its capabilities for automating cloud resource data collection. In our corporate
infrastructure, implementing Cherwell with Prisma API has resulted in significant improvements
in efficiency, accuracy, and security for cloud resource management.</p>
      <sec id="sec-4-1">
        <title>4.1. Key features of Cherwell for CMDB management</title>
        <p>
          The Cherwell platform is one of the leading tools for managing configuration management
databases (CMDB), providing centralized resource management, process automation, and support
for multi-cloud environments. Its features are designed to ensure efficiency, flexibility, and security
in the context of dynamic cloud infrastructure [
          <xref ref-type="bibr" rid="ref20">39</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.1.1. Flexible CMDB capabilities</title>
        <p>Cherwell offers a wide range of tools for tracking assets and configurations. Centralized
management enables organizations to store information about servers, applications, network
devices, and their interdependencies. This is especially important for analyzing the impact of
changes in cloud infrastructure, helping to avoid errors, and ensuring system stability.</p>
        <p>Additionally, the platform supports the customization of data models to meet specific
organizational needs. This ensures flexibility in creating unique configuration management
schemes, which is critical for enterprises operating in dynamic and complex environments.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.1.2. Access management</title>
        <p>Cherwell implements role-based access control (RBAC), allowing flexible configuration of
CMDB data access based on user roles. This ensures a high level of security while adhering to the
principle of least privilege.</p>
        <p>
          Additionally, the platform supports change logs that record all actions involving CMDB data.
This not only ensures process transparency but also enables organizations to comply with data
security regulatory requirements [
          <xref ref-type="bibr" rid="ref21">40</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.1.3. Change and incident management</title>
        <p>Cherwell integrates change and incident management processes, enabling organizations to respond
effectively to changes in cloud infrastructure. Change management includes planning, approval,
and implementation of changes while minimizing risks. The platform provides clear workflows for
coordinating these stages.</p>
        <p>Incident management ensures a rapid response to issues that arise in cloud environments.
Cherwell supports automation of this process, allowing teams to focus on resolving complex tasks.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.1.4. Service catalog and automation</title>
        <p>Cherwell offers a service catalog that serves as a centralized interface for cloud service requests.
This simplifies the processes of ordering and provisioning resources, making them more accessible
to end users.</p>
        <p>
          Workflow automation is another key advantage of the platform. This reduces the risk of human
error and minimizes manual labor. For example, the platform can automatically update asset
records or monitor changes, enhancing the efficiency of resource management [
          <xref ref-type="bibr" rid="ref22">41</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-6">
        <title>4.2. Corporate implementation: Automation with Prisma API</title>
        <p>
          The presented solution is built on the integration of the Cherwell platform as a central tool for
managing the configuration management database (CMDB) with Prisma API, as well as other
monitoring, analytics, and security systems. This architecture addresses key tasks related to
centralized management of cloud resources, process automation, and enhancement of cybersecurity
levels (Fig. 1).
One of the greatest advantages provided by Cherwell is centralized management. By
establishing a single source of truth for all organizational cloud resources, the platform facilitates
the creation of a transparent and structured management model, simplifying asset accounting and
tracking changes in a multi-cloud environment [
          <xref ref-type="bibr" rid="ref23">42</xref>
          ].
        </p>
        <p>Process automation plays a key role in minimizing the risks of human error. Through Prisma
API, data about resources—such as configurations, compute instances, databases, and services—is
collected automatically. This approach ensures real-time data accuracy, which is critical for
effectively managing dynamic cloud environments.</p>
        <p>Integration with analytical and reporting tools like Power BI and Splunk enables
organizations to perform detailed analyses of resource usage, detect anomalies, and generate
reports to support informed decision-making. This fosters cost optimization and enhances
management efficiency by providing teams with clear performance indicators.</p>
        <p>The platform also enhances security levels through integration with tools like Prisma Cloud,
Tenable, and CrowdStrike. These systems help identify and mitigate vulnerabilities, monitor
security events, and maintain compliance with regulatory requirements. Thus, the architecture
meets modern data protection standards and ensures the stability of cloud infrastructure
operations.</p>
        <p>
          Another significant advantage of this solution is its support for multi-cloud environments.
By integrating with AWS, Azure, and GCP, organizations gain a unified resource management
model that greatly simplifies coordination and administration, even in complex multi-cloud
environments [
          <xref ref-type="bibr" rid="ref24">43</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The proposed architecture integrating Cherwell with Prisma API and other analytical and security
tools demonstrates a highly effective and comprehensive approach to managing cloud
infrastructures. Using Cherwell as the central element of the solution allows organizations to
centralize all resource data, creating a powerful tool for analysis, optimization, and management.</p>
      <p>Additionally, the automation of data collection through Prisma API and integration with
systems like Power BI, Splunk, and Tenable significantly enhance the platform’s functionality.
These integrations not only optimize costs and improve efficiency but also strengthen data
protection and compliance with security standards.</p>
      <p>Thus, this solution serves as a reliable foundation for achieving operational efficiency,
minimizing risks, and reducing costs in complex multi-cloud environments. Its implementation
enables organizations to adapt their cloud strategies to modern demands and enhance
competitiveness through an innovative approach to infrastructure management.
One of the key advantages of this approach is the centralization of data in the CMDB, creating a
single source of truth for asset management. This allows organizations to track resources, analyze
their usage, and optimize costs. Additionally, integration with analytical tools like Power BI
enables data visualization and the creation of informative reports, supporting well-informed
managerial decisions.</p>
      <p>In the realm of security, the use of Prisma Cloud, Splunk, and Tenable ensures the detection and
elimination of vulnerabilities, anomaly monitoring, and compliance with regulatory standards.
These tools expand the functionality of the CMDB, transforming it into a strategic element for
protecting cloud infrastructure.</p>
      <p>The proposed architecture also highlights the importance of multi-cloud support, enabling
the integration of data from platforms like AWS, Azure, and GCP into a unified environment. This
significantly simplifies the management of complex infrastructures and facilitates effective
coordination among different cloud providers.</p>
      <p>The integration of Cherwell with Prisma API automates configuration management,
enhancing the accuracy and real-time relevance of data.</p>
      <p>Utilizing analytical and security tools like Power BI, Splunk, and Tenable combines cost
management with data protection in cloud environments.</p>
      <p>Multi-cloud support and data centralization through CMDB ensure transparency and ease
of administration, which is critical for large and complex infrastructures.</p>
      <p>This solution minimizes risks, enhances cybersecurity, and optimizes resources, enabling
organizations to meet modern demands for efficiency and security.</p>
      <p>In conclusion, the integration of CMDB with modern monitoring, security, and analytics tools is
a strategically important solution for organizations aiming to achieve high operational efficiency in
their cloud environments. This research offers a reliable approach that allows organizations not
only to adapt to current challenges but also to build a sustainable competitive advantage.
Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[7] M. Yaici, P2P-based Solution for the cloud availability, in: 2022 6th International Conference on</p>
      <p>Cloud and Big Data Computing, 2022. doi:10.1145/3555962.3555963
[8] C. Yen-Jen, W. Chen, Implementation of a high available database on virtualizing cloud
platform, in: 2023 5th International Conference on Computer Communication and the Internet
(ICCCI), 2023, 229–235. doi:10.1109/ICCCI59363.2023.10210178
[9] J. Almeida, et al., A Machine-Checked Proof of Security for AWS Key Management Service, in:
2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, 63–78.
doi:10.1145/3319535.3354228
[10] R. Banakh, A. Piskozub, Y. Stefinko, External elements of honeypot for wireless network, in:
2016 13th International Conference on Modern Problems of Radio Engineering,
Telecommunications and Computer Science, 2016, 480–482, doi:10.1109/TCSET.2016.7452093
[11] O. Deineka, et al., Information classification framework according to SOC 2 type II, in:
Cybersecurity Providing in Information and Telecommunication Systems II, vol. 3826, 2024,
182–189.
[12] Y. Martseniuk, et al., Shadow IT risk analysis in public cloud infrastructure, in: Cyber Security
and Data Protection, vol. 3800, 2024, 22–31.
[13] O. Mykhaylova, et al., Mobile application as a critical infrastructure cyberattack surface, in:
Workshop on Cybersecurity Providing in Information and Telecommunication Systems II,
CPITS-II, vol. 3550 (2023) 29–43.
[14] S. Gnatyuk, et al., Method for managing IT incidents in critical information infrastructure
facilities, in: Cybersecurity Providing in Information and Telecommunication Systems II, vol.
3826 (2024) 326–333.
[15] K. R. Muppa, Advancing cloud security with AI-enhanced AWS identity and access
management, Int. Res. J. Eng. Appl. Sci. 10(1) (2022) 25–28. doi:10.55083/irjeas.2022.v10i01005
[16] O. Mykhaylova, M. Korol, R. Kyrychok, Research and analysis of issues and challenges in
ensuring cyber security in cloud computing, in: Cybersecurity Providing in Information and
Telecommunication Systems II, vol. 3826, 2024, 30–39.
[17] A. Horpenyuk, I. Opirskyy, P. Vorobets, Analysis of problems and prospects of
implementation of post-quantum cryptographic algorithms, in: Classic, Quantum, and
PostQuantum Cryptography, vol. 3504, 2023, 39–49.
[18] Y. Martseniuk, et al., Universal centralized secret data management for automated public cloud
provisioning, in: Cybersecurity Providing in Information and Telecommunication Systems II,
vol. 3826, 2024, 72–81.
[19] P. Raj, Continuous integration for new service deployment and service validation script for
vault, Inte. J. Sci. Res. Eng. Manag. 08 (2024) 1–5. doi:10.55041/IJSREM35565
[20] D. Drogseth, R. Sturm, D. Twing, Chapter 4. CMDB system deployment stages: An eight-step
ladder to success, CMDB System Deployment Stages, 2015, 53–78.
doi:10.1016/B978-0-12801265-9.00004-4
[21] J. Wang, et al., Study on comparative performance of CL‐20/RDX‐based CMDB propellants,</p>
      <p>Propellants, Explosives, Pyrotechnics 44(9) (2019) 1175–1182. doi:10.1002/prep.201900029
[22] V. Petrivskyi, et al., Development of a modification of the method for constructing
energyefficient sensor networks using static and dynamic sensors, Eastern-European J. Enterp.</p>
      <p>Technol. 1.9(115) (2022) 15–23. doi:10.15587/1729-4061.2022.252988
[23] A. Keller, S. Subramanian, Best Practices for Deploying a CMDB in large-scale Environments,
in: 2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009, 732–
745. doi:10.1109/INM.2009.5188880
[24] S. Vasylyshyn, et al., A model of decoy system based on dynamic attributes for cybercrime
investigation, Eastern-European J. Enterp. Technol. 1.9 (121) (2023) 6–20.
doi:10.15587/17294061.2023.273363
[25] S. Enunnl, Leveraging artificial intelligence for configuration management database (CMDB)
Optimization: A Comprehensive Analysis, 2024.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Shapoval</surname>
          </string-name>
          , et al.,
          <article-title>Automation of data management processes in cloud storage</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>410</fpage>
          -
          <lpage>418</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Ilyenko</surname>
          </string-name>
          , et al.,
          <article-title>Practical aspects of using fully homomorphic encryption systems to protect cloud computing, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>226</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Ellison</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Calinescu,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Paige,
          <article-title>Evaluating cloud database migration options using workload models</article-title>
          ,
          <source>J. Cloud Comput</source>
          .
          <volume>7</volume>
          (
          <issue>2018</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          . doi:
          <volume>10</volume>
          .1186/s13677-018-0108-5
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Brenner</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
           
          <article-title>Gillmeister, Designing CMDB data models with good utility and limited complexity</article-title>
          ,
          <source>in: 2014 IEEE Network Operations and Management Symposium (NOMS)</source>
          ,
          <year>2014</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . doi:
          <volume>10</volume>
          .1109/NOMS.
          <year>2014</year>
          .6838375
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>D.</surname>
          </string-name>
           
          <article-title>Herrick, CMDB Assessment and remediation</article-title>
          ,
          <source>in: 2023 ACM SIGUCCS Annual Conference</source>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1145/3539811.3579551
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>A.</surname>
          </string-name>
           Keller, S. Subramanian,
          <article-title>Best practices for deploying a CMDB in large-scale environments</article-title>
          ,
          <source>2009 IFIP/IEEE International Symposium on Integrated Network Management</source>
          ,
          <year>2009</year>
          ,
          <fpage>732</fpage>
          -
          <lpage>745</lpage>
          . doi:
          <volume>10</volume>
          .1109/INM.
          <year>2009</year>
          .5188880
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [26]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Niewiadomski,
          <string-name>
            <surname>G.</surname>
          </string-name>
           
          <article-title>Mzyk, ML support for conformity checks in CMDB-like databases</article-title>
          ,
          <source>in: Artificial Intelligence and Soft Computing, ICAISC 2023, Lecture Notes in Computer Science</source>
          , vol.
          <volume>14126</volume>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -42508-0_
          <fpage>33</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [27]
          <string-name>
            <surname>S. </surname>
          </string-name>
          <article-title>Maes, CMDB best practices: How to successfully implement CMDB in your organization</article-title>
          ,
          <source>Ifs Blog</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [28]
          <string-name>
            <surname>S. </surname>
          </string-name>
          <article-title>Enunnl, Harnessing the synergy: Exploring the benefits of artificial intelligence and configuration management database (CMDB</article-title>
          ),
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <article-title>Automated conformity verification concept for cloud security</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [30]
          <string-name>
            <surname>J. Yin</surname>
          </string-name>
          , et al.,
          <article-title>Mechanical behaviors and failure mechanisms of CMDB propellant under wide strain rate tension loading</article-title>
          ,
          <source>Phys.: Conf. Ser</source>
          .
          <volume>2535</volume>
          (
          <year>2023</year>
          )
          <article-title>012010</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          - 6596/2535/1/012010
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>H.</given-names>
            <surname> Wei</surname>
          </string-name>
          , et al.,
          <article-title>ReaxFF molecular dynamics simulations on thermal decomposition of RDXbased CMDB propellants</article-title>
          ,
          <source>J. Mol. Modeling</source>
          <volume>28</volume>
          (
          <year>2022</year>
          ).
          <source>doi:10.1007/s00894-022-05377-4</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [32]
          <string-name>
            <surname>J. Zheng</surname>
          </string-name>
          , et al.,
          <article-title>Effects of loading rate and microstructure on dynamic fracture toughness of CMDB propellant</article-title>
          , Tuijin Jishu/J. Propuls. Technol.
          <volume>36</volume>
          (
          <year>2015</year>
          )
          <fpage>940</fpage>
          -
          <lpage>946</lpage>
          . doi:
          <volume>10</volume>
          .13675/j.cnki.tjjs.
          <year>2015</year>
          .
          <volume>06</volume>
          .019
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Vakhula</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
           
          <article-title>Opirskyy, Research on security as code approach for cloud-native applications based on Kubernetes clusters</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          , vol.
          <volume>3800</volume>
          ,
          <year>2024</year>
          ,
          <fpage>58</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Wang</surname>
          </string-name>
          , et al.,
          <article-title>Research on a cloud model intelligent computing platform for water resource management</article-title>
          ,
          <source>J. Hydroinform</source>
          .
          <volume>26</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .2166/hydro.
          <year>2024</year>
          .223
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [35]
          <string-name>
            <surname>P.</surname>
          </string-name>
           Narayanan,
          <article-title>Engineering data pipelines using Google cloud platform</article-title>
          ,
          <source>in: Data Engineering for Machine Learning Pipelines</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1007/979-8-
          <fpage>8688</fpage>
          -0602-5_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Gulati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Tyagi</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
           Goel,
          <article-title>Security automation and orchestration in the cloud</article-title>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .4018/979-8-
          <fpage>3693</fpage>
          -3249-8.
          <fpage>ch002</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Mykhaylova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Fedynyshyn</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Platonenko, Hardcoded credentials in Android apps: Service exposure and category-based vulnerability analysis</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>206</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [38]
          <string-name>
            <surname>R.</surname>
          </string-name>
           Bishukarma,
          <article-title>Optimising cloud security in multi-cloud environments: A study of best practices</article-title>
          ,
          <source>Technix Int. J. Eng. Res</source>
          .
          <volume>11</volume>
          (
          <year>2024</year>
          )
          <fpage>a590</fpage>
          -
          <lpage>a598</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [39]
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Sreerangapuri, Blockchain-enabled AI governance for scalable cloud security automation</article-title>
          .
          <source>Int. J. Comput. Eng. Technol</source>
          .
          <volume>15</volume>
          (
          <year>2024</year>
          )
          <fpage>947</fpage>
          -
          <lpage>959</lpage>
          . doi:
          <volume>10</volume>
          .5281/zenodo.13962366
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [40] V. S. Thokala,
          <article-title>Scalable cloud deployment and automation for e-commerce platforms using AWS, Heroku</article-title>
          , and Ruby on Rails,
          <source>Int. J. Adv. Res. Sci. Commun</source>
          . Technol. (
          <year>2023</year>
          )
          <fpage>349</fpage>
          -
          <lpage>362</lpage>
          . doi:
          <volume>10</volume>
          .48175/IJARSCT-13555A
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [41]
          <string-name>
            <surname>D.</surname>
          </string-name>
           Soldatenko,
          <article-title>Study of efficiency of using it-infrastructure-as-a-service for cloud computing</article-title>
          ,
          <source>Syst. Technol</source>
          .
          <volume>2</volume>
          (
          <year>2022</year>
          )
          <fpage>68</fpage>
          -
          <lpage>76</lpage>
          . doi:
          <volume>10</volume>
          .34185/
          <fpage>1562</fpage>
          -9945-2-
          <fpage>139</fpage>
          -2022-07
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>K.</given-names>
            <surname>Suram</surname>
          </string-name>
          ,
          <article-title>Innovations in infrastructure automation: Advancing IAM in cloud security</article-title>
          ,
          <source>Int. J. Sci. Res. Comput. Sci. Eng</source>
          . Inform. Tech.
          <volume>11</volume>
          (
          <year>2025</year>
          )
          <fpage>255</fpage>
          -
          <lpage>263</lpage>
          . doi:
          <volume>10</volume>
          .32628/CSEIT25111223
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>D.</given-names>
            <surname>Narayanasamy</surname>
          </string-name>
          ,
          <article-title>Transforming healthcare with secure cloud infrastructure</article-title>
          ,
          <source>Int. J. Sci. Res. Comput. Sci. Eng</source>
          . Inf. Technol.
          <volume>11</volume>
          (
          <year>2025</year>
          )
          <fpage>633</fpage>
          -
          <lpage>644</lpage>
          . doi:
          <volume>10</volume>
          .32628/CSEIT25111271
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>