This literature review explores various techniques and technologies for implementing an automated secure monitoring system for CSU. It examines the strengths and weaknesses of different solutions, including two-factor authentication, cloud computing, and authorization, based on research papers from reputable journals. The review analyzes the components, processes, and impact factors of each solution, highlighting their potential benefits and limitations in securing CSU's resources. It also identifies areas for further research and development to enhance the effectiveness and efficiency of the automated secure monitoring system.