“…Limited control in cloud services restricts users from monitoring and modifying certain infrastructure components, potentially hindering their ability to implement necessary security measures and leaving them reliant on the provider's security protocols. Misconfigurations, often stemming from users incorrectly setting security parameters, pose significant risks in the Infrastructure as a Service (IaaS) model, potentially resulting in sensitive data leaks, unauthorized access, and other security incidents that compromise the integrity of cloud-based systems (Jones, 2023;Alouffi et al, 2021, Zhang et al, 2019GhasemiGol, 2019).…”