Automated Vulnerability Scanning Tools for Securing Cloud-Based E-Commerce Supply Chains

Authors

  • Hoang Thi Ngoc Tram Truong Sa University, Department of Computer Science, Ly Thuong Kiet Street, Cam Ranh, Khanh Hoa, Vietnam. Author

Abstract

Automated vulnerability scanning tools contribute significantly to securing supply chains within cloud-based e-commerce platforms, where interconnected systems and frequent updates create potential security risks. Key supply chain components, including inventory management, payment processing, and vendor systems, benefit from the integration of these tools into cloud-native architectures and continuous integration/continuous delivery (CI/CD) pipelines. Employing techniques such as static analysis, behavioral inspection, and real-time event correlation, these tools identify and address vulnerabilities across the supply chain. Their ability to scale with varying traffic loads ensures operational continuity while supporting compliance with security standards. Features like automated patching, real-time monitoring, and risk prioritization enhance their effectiveness, enabling timely and informed responses to emerging threats. This paper examines the role of vulnerability scanning tools in identifying supply chain blind spots, their integration into e-commerce infrastructures, and strategies for optimizing their deployment to ensure secure and resilient operations.

Downloads

Published

2022-12-07

How to Cite

Automated Vulnerability Scanning Tools for Securing Cloud-Based E-Commerce Supply Chains. (2022). Journal of Applied Cybersecurity Analytics, Intelligence, and Decision-Making Systems, 12(12), 11-21. https://sciencespress.com/index.php/JACAIDMS/article/view/2022-12-07