Cloud Sec Assignment 1
Cloud Sec Assignment 1
ASSIGNMENT-3
Shubham Mishra
2016014585
CSE - I
Q1. What do you mean by cloud computing? Explain different types of cloud
computing models?
In the simplest terms, cloud computing means storing and accessing data and
programs over the Internet instead of your computer's hard drive. It is the practice
of the practice of using a network of remote servers hosted on the Internet to store,
manage, and process data, rather than a local server or a personal computer.
Software as a Service (SaaS): The SaaS model allows your business to quickly access
cloud-based web applications without committing to installing new infrastructure.
The applications run on the vendor's cloud, which they, of course, control and
maintain. The applications are available for use with a paid licensed subscription, or
for free with limited access. SaaS does not require any installations or downloads in
your existing infrastructure, which in turn eliminates the need to install, maintain,
and update applications on each of your computers.
Platform as a Service (PaaS): With this model, a third-party vendor provides your
business with a platform upon which your business can develop and run applications.
Because the vendor is hosting the cloud infrastructure which supports the platform,
PaaS eliminates your need to install in-house hardware or software. Your business
would not manage or control the underlying cloud infrastructure, but you would
maintain control over the deployed applications (unlike with SaaS).
Infrastructure as a Service (IaaS): IaaS, as the most flexible of the cloud models,
allows your business to have complete, scalable control over the management and
customization of your infrastructure. In the IaaS model, the cloud provider hosts
your infrastructure components that would traditionally be present in an on-site
data center (such as servers, storage and networking hardware). Your business,
however, would maintain control over operating systems, storage, deployed
applications, and possibly limited control of select networking components (e.g. host
firewalls).
Software Virtualization: It provides the ability to the main computer to run and
create one or more virtual environments. It is used to enable a complete computer
system in order to allow a guest OS to run. For instance letting Linux run as a guest
that is natively running a Microsoft Windows OS (or vice versa, running Windows as
a guest on Linux).
Private Cloud: A private cloud solution will host your data on a dedicated server with
access and management limited to your business only. The network is protected by a
secure firewall and offers high performance due to its single usage. Customers can
customize the control and maintenance of their service. This means you can tailor
your infrastructure to meet your business needs and to suit any security or
infrastructure requirements you have.
Public Cloud: A public cloud solution stores your information off-site on a shared
server managed and maintained by the service provider. Support and updates are
handled by the Cloud Service Provider and services are paid for on a subscription
basis, reducing the need to invest large amounts of capital and freeing up your in-
house IT resources.
The SaaS model allows your business to quickly access cloud-based web applications
without committing to installing new infrastructure. The applications run on the
vendor's cloud, which they, of course, control and maintain. The applications are
available for use with a paid licensed subscription, or for free with limited access.
SaaS does not require any installations or downloads in your existing infrastructure,
which in turn eliminates the need to install, maintain, and update applications on
each of your computers.
One of the key steps in securing the hypervisor is to monitor your virtual
environment for malicious activities. You need to be monitoring constantly and using
automation to ensure security configurations do not lapse. Always check the
configuration and settings of the hypervisor to minimize threats.
Q6. Explain all virtualization security concerns.
Managing oversight and responsibility: The overarching issue with virtual servers is
responsibility. Unlike physical servers, which are the direct responsibility of the data-
center or IT managers in whose physical domain they sit, responsibility for virtual
servers is often left up in the air.
Patching and maintenance: The most tangible risk that can come out of a lack of
responsibility is the failure to keep up with the constant, labor-intensive process of
patching, maintaining and securing each virtual server in a company. Unlike the
physical servers on which they sit, which are launched and configured by hands-on IT
managers who also install the latest patches, virtual machines tend to be launched
from server images that may have been created, configured and patched weeks or
months before.
Visibility and compliance: Virtual servers are designed to be, if not invisible, then at
least very low profile, at least within the data center. All the storage or bandwidth or
floor space or electricity they need comes from the physical server on which they sit.
To data-center managers not specifically tasked with monitoring all the minute
interactions of the VMs inside each host, a set of virtual servers becomes an invisible
network within which there are few controls.
Managing Virtual Appliances: One of the very best things about virtual
infrastructures is the ability to buy or test a product from a third-party vendor and
have it up and running in minutes, rather than having to clear space on a test server,
install the software, get it to talk to the operating system and the network and then,
hours later, see whether it does what it's supposed to, MacDonald says.
With this model, a third-party vendor provides your business with a platform upon
which your business can develop and run applications. Because the vendor is hosting
the cloud infrastructure which supports the platform, PaaS eliminates your need to
install in-house hardware or software. Your business would not manage or control
the underlying cloud infrastructure, but you would maintain control over the
deployed applications (unlike with SaaS).