
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
April-June 2025
Indexing Partners



















SOX Considerations for Cloud Data Architecture: A Comprehensive Literature Review
Author(s) | Suhas Hanumanthaiah |
---|---|
Country | United States |
Abstract | In an increasingly digitized and interconnected global environment, cybersecurity auditing has become a critical pillar in safeguarding organizational assets and ensuring regulatory compliance. This comprehensive review critically analyzes emerging methodologies for cybersecurity auditing, focusing on their alignment with key regulatory frameworks such as the Sarbanes-Oxley Act (SOX), the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and the General Data Protection Regulation (GDPR). The study identifies a significant shift from traditional, reactive auditing approaches toward proactive, real-time, and risk-based methodologies supported by artificial intelligence, machine learning, and automation. These innovations enhance audit efficiency, enable continuous control monitoring, and support the identification of advanced persistent threats (APTs). The review evaluates leading cybersecurity audit frameworks, including Control Objectives for Information and Related Technologies (COBIT), ISO/IEC 27001, and NIST SP 800-53, and explores how they are being adapted to assess cloud environments, third-party risks, and remote work infrastructures. It further examines how emerging frameworks incorporate regulatory expectations, emphasizing transparency, accountability, and data minimization in line with GDPR, financial reporting integrity under SOX, and the five core functions of the NIST Framework—Identify, Protect, Detect, Respond, and Recover. The analysis reveals that while current methodologies offer improved standardization and scalability, they also present challenges, including audit fatigue, fragmented toolsets, and insufficient integration across enterprise risk management systems. Moreover, the paper underscores the growing need for auditor upskilling, the ethical handling of personal data, and continuous assurance mechanisms that go beyond periodic assessments. It proposes a holistic model that integrates technical assessments with governance, risk, and compliance (GRC) strategies to enhance cybersecurity audit effectiveness. Ultimately, this review highlights the urgency for organizations to adopt agile and adaptive auditing approaches that align with evolving digital threats and compliance mandates. It offers critical insights for regulators, auditors, and organizational leaders striving to build cyber-resilient ecosystems in an era marked by data proliferation, increasing regulatory scrutiny, and sophisticated cyberattacks. |
Field | Engineering |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-04-20 |
DOI | https://doi.org/10.71097/IJSAT.v16.i2.6482 |
Short DOI | https://doi.org/g9q4b8 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
