IFS Chapter 4
IFS Chapter 4
Cloud Security
m
Cloud Security Risks and Countermeasures,
Data Protection in Cloud, Cloud Application Security, Cloud Identity and Access Management, Cloud Securify
as a Service.
Self-Learning Topics: Metasploit, Ettercap.
• Chapter Ends ................... ··.. ·.. ··..... ···.. ···.. ····..... ···.... ,................................................................................................ 4-22
(MU- New Syllabus w.e.f academic year 22-23) (M7-66) Ii] Tech-Neo Publications ...A SACHIN SHAH Venture
~~~ ~~~ ~~~ £~
~~Se:.;;c;.u""ri~ty_,(_M_u_-s_e_m=.7--1-T-=)=== === === === === ==~
,ructure
1nfras ~
y - - - ----: -:-::= -=::- =-::: ----- -- without having to keep the bulk of tha t syste m on
~ INTRO DUCT ION TO CLOUD
~ 4• coMP UTJN G . their own computers.
---------Define
----- - Cloud
---- ---- ----
Compu ting. . its, ,:
Explain
. In fact, most people already use a variety of cloud
computing_ services withou t even realizi ng it.
: GQ• characteristics.. , , ,, •.. />'~/ ;{: \ :,: Gmail, Google Drive, TurboT ax, and even
: GQ, Explain cloud c~mputi9g,: ,5e,cyi5,,,irn ?d~J~~ij~cf ! Facebo ok and Instagr am are all cloud- based
:_ - - - - ~':p~O__Y~:~t -~O~=':,"' -~_
,.~j :;tU'.( :~~:~. t ;:Z:,z: applications.
, Cloud computing is an evolvi ng paradig m. • For all of these services, users are sendin g their
, Cloud computing is a term that has gained personal data to a cloud- hosted server that stores
widespread use over the last few years. the information for later access.
With the expone ntial increas e in data use that has • And as useful as these applica tions are for
accomp anied society 's transit ion into the digital personal use, they're even more valuab le for
st
21 century, it is becom ing more and more businesses that need to be able to access large
difficult for individ uals and organi zations to keep amounts of data over a secure , online netwo rk
all of their vital inform ation, programs, and connection.
systems up and runnin g on in-hou se computer • The NIST Definition of Cloud Compu ting:
servers. "Cloud computing is a model for enabli ng
• The solution to this proble m is one that has been ubiquitous, convenient, on-dem and netwo rk
around for nearly as long as the interne t, but that access to a shared pool of config urable compu ting
has only recently gained widesp read application resources (e.g., networks, servers , storag e,
for businesses. applications, and services) that can be rapidly
provisioned and released with minim al
• Cloud computing operat es on a similar principle
management effort or service provid er
as web-based email clients , allowin g users to
interaction".
access all of the feature s and files of the system
three service models, and four deploy ment
• This cloud model is compo sed of five essential characteristics,
models as shown in Fig. 4.1.1.
Rapid
Electricity Essential
Characteristics
Service Models
Deployment Models
(tviu N
66
- ew Syllabus w.e.f academic year 22 -23) (M 7 - )
li1 Tech-N eo Publica tions ...A SACHIN SHAH V enture
,
Infrastructure Securit (MU-Sern.7-IT) Cloud Securi
s.
►
'a.. 4. 1 . 1 Characteristics of Cloud Measured service
• This capability does not necessarily preclude the Fig. 4.1.2 : Private Cloud
use of compatible programming languages,
libraries, services, and tools from other sources. ► 2. Community cloud
~
MU-Sem.7-IT
CL.OUD SECURITY RISKS AND ~ :
► 3. Public cloud d COUNTERMEASURES
• The cloud infrastructure is provisioned for open
use by the general public .
•
business, academic, or government organization, There are various security risks in the cloud. Some
or some combination of them. It exists on_ the of the major potential risks to the security of cloud
premises of the cloud provider. systems with efficient countermeasures for them are
given below.
I@" Risk 1 - oata Breaches
~
Fig. 4.1.4: Public Cloud
~ Countermeasure s
_,,1
security measur~.
•
the consumeJ
-
Encryption is the process of encoding the
information in a such way that only authorized
parties can read messages. Still, encryption does
not - avoid interception, but it denies any
unauthorized access to sensitive informatiod.
-._,J
(MU-New Syllabus w.e.f academic year 22-23) (M7-66) [i1 Tech-Nee Publications...A SACHIN SHAH venture
securi (MU-Sem. 7-IT)
r\lcture
~¢ . vulnerabilities with in the components ~~ Cloud Securi .... Pa e no. 4-6
~~ . .
, ting syste m like the syste m kerne l , libranes
0pera . . , be monitored and traceable to the actual owne r of
application tools , put the secur ity of an the account.
. ifi1cant risk.
and . es and data at sign
servic ~ · Risk 4 - Permanent Data Loss
it cou
nterm easu res •
Permanent data loss because of cloud servi ce
tern vulne rabil ities. can be hand led by the providerS' fault is a very rare incident.
' sys .
adrninistrat10n of basic IT proce sses. Such as • But still, there is a little bit chanc e of perm anen t
regular vulne rabil ity scann ing, prom pt patch data loss in the cloud because of some uneth ical
management, and a quic k follo w-up on reported hackers that try to delete cloud data perm anen tly
system threats. to harm businesses and any sudden, unex pecte d
natural calamities can destroy cloud data cente rs.
, . Vulnerability scan ning is the autom ated process of
those ident ifyin g secu rity vulne rabili ties of · ~
Coun term easu res
computing syste ms in a netw ork. • Users can encrypt data before uploading into the
, A patch is a piece of softw are that update
a cloud, and then users must carefully prote ct the
computer prog ram and its supp ortin g data to fix or encryption key because, once the key is lost, so
the data is also lost.
improve it. This inclu des fixin g security
vulnerabilities and othe r bugs . • Some cloud providers distribute data and
rally calle d bug fixes or bug applications across multiple zones for more
, Such patch es are gene
protection.
fixes, and impr ove usab ility or perfo rman ce.
• Apply various data backup measures and disas ter
Ii' Risk 3 - Acco unt Hija ckin g recovery models.
• It is an old meth od in whic h credentials and • Daily data backup and off-site storage play a vital
passwords are reuse d, to incre ase the impact of role to avoid permanent data loss.
such attacks. of Serv ice (DoS )
~ Risk 5 - Deni al
• In this attacker intru des into the user's credentials,
· · · and • It is the most common attack in which autho rized
the attacker then eave sdrop s user's act1vities
users can not able to access their data or their
transactions, whic h allow s the attacker to
applications.
manipulate the user' s data, return falsified
infonnation, and redir ect clien ts of users to • When the cloud faces a DoS attack, the targeted
illegitimate sites. cloud service consumes inordinate amou nts of
~ finite system resources such as processor power,
Coun term easu res
memory, disk space, or network bandwidth.
• The organization shou ld avoid the sharing of This causes an intolerable system slow down and
account crede ntials betw een the users and •
leaves all authorized service users confu sed and
services.
angry as to why the service is not responding.
• A.p P1Y two-f actor authe ntica tion tee hniques where
proce ssing
ever Possible. • DoS attacks utilize large amounts of
coun t shoul d power, a bill the user, unfortunately, has to pay.
' A.II
'--------acco unts and activ ities of the ac --- --- --;
::: ;;- --- ~~ ~- ~- =- ~- --- --
(~U-N~ - (M7-6 6) ~ Tech-Neo Publications...A SACHIN SHAH Venture
Syllabus w.e.f acade mic year 22- 23)
Cloud Securi .... Pa e no. 4-
Infrastructure Securi MU-Sem.?-IT
software user interfaces (Uls) or applica::
~ Countermeasures
programming interfaces (APis) that customers use
• No way can completely prevent DoS attacks but to manage and interact with cloud services.
some measures can reduce the risk of DoS attacks
• Provisioning, management, orchestration and
in the cloud.
monitoring are all performed
. with these interfacel
• Use DoS attack detection technology .
• The security and availability of general cloud
• Intrusion prevention systems and firewall services are dependent on the security of these
manufacturers now offer DoS protection
basic APis.
technologies that include signature detection and
connection verification techniques to limit the • From authentication and access control to
success of Dos attacks. encryption and activity monitoring, these
interfaces must be designed to protect against both
• Use throttling and rate-limiting technologies that
accidental and malicious attempts to circumvent
can reduce the effects of a Dos attack.
policy.
~ Risk 6 - Malicious Insiders
• Organizations and third parties may build on these
• CERN says "an insider threat to an organization is interfaces to offer value-added services to their
a current or former employee, contractor, or other customers.
business partner who has or had authorized access
• Thus, this introduces the complexity of the new
to an organization's data or network, syst~m, and
layered API; which also increases risk, because _
intentionally exceeded or misused that access in a
organizations may be required to relinquish their
manner that negatively affected the
credentials to third parties in order to enable their
confidentiality, integrity, or availability of the
agency.
organization's information or information
systems." • Therefore, /<\.Pis and _Uls are generally the most
exposed part of a system,_perhaps the only asset
• It's easy to misunderstand a bungling attempt to
with an IP address available outside the _trusted
perform a routine job as "malicious" insider
organizational boundary.
activity. For example, an administrator can
accidentally copy a sensitive customer database to • These assets will be the target of heavy attack, and
a publicly accessible server. adequate controls protecting them from the
Internet are the first line of defense and detection.
~ Countermeasures
• It's recommended that organizations should ~ Countermeasures
control the encryption process and keys, • Security-focused code reviews and rigorous
segregating duties and minimizing access given to penetration testing, so far, are the two reliable
users. countenrteasures to this type of attack.
• Effective logging, monitoring, and auditing • Security code review is the process of auditing the
administrator activities are also critical. source code for an application to verify that the
~ Risk 7 - Insecure Interfaces and APis pr~per security controls are present, and they work
as mtended and that they have been invoked in all
• Providers of cloud computing exhibit a set of the right places.
(MU-New Syllabus w.e.f academic year 22-23) (M7-66) Iii Tech-Neo Publications ...A SACHIN SHAH Venture
re security (MU-Sem.7-IT) ,_ no. (4-81
s~ltl . (Cloud Security)., ..P811- • -
appropriate to the user's job role. • ~fore using the cloud, users must explicitly
• Importantly, they sometimes forget to remove user identify the data objects that need to be protected,
access when a job function changes or when a user classify the data according to how it affects
leaves the organization. · security, and then specify the security policy for
• The system must scale to handle lifecycle data protection as well as the means for enforcing
lllanagement for the huge number of its users. the polic~
1d
• entity management systems must support • @ata objects for the majority of applications
illlinediate de-provisioning of access to re~our~es would contain not just massive amounts of data
When personnel changes, such as job termmation stored in cloud servers (such as user databases
or role change, occurred. and/or file systems), but also data that is being
th transferred between the cloud and the user (s) and
• Organizations planning to unify identity wi a
clouct
th provider need to know the security measures may be done so over the lnternet or using mobile
e cloud provider uses to protect the identity mediiJ
Platfo~rm~·:.....___ _ _ _ _ _ _ _ _ __ _ _ ___J_ _ _ ~::J,---~~~-- -------- -
I (l.1u.New Syllabus w.e.f academic year 22-23) (M7-GG) ~ Tech-Neo Publications...A SACHIN SHAH Venture
~
Infrastructure Securi MU-Sem.7-IT Cloud Securi .... Pa e no. 4-
9
• In many cases, it would be more affordable and • The inherent properties of cloud computing lllake
practical to migrate huge amounts of data to the the problem of data security more challenging.
cloud via portable media, such as archive tapes, There would need to be a number of security
rather than sending it over the Intern~
•
services i~ place before pote1:1tial cloud users
• T!Ie user identity data produced by the user could migrate their applications and data safely to
management model, the service audit data the cloud.
produced by the auditing model, the service These services include the following, however not
profile data used to describe the service
•
all may be required for every application :
instance(s), the temporary runtime data produced
by the instance(s), and many other application ► 1. Data Confidentiality Assurance
data are examples of data object0 • This service protects against the disclosure of
information to unauthorized parties.
• @ ifferent data types would have varied economic
value, and hence, different security implications • Data confidentiality is a fundamental security
for cloud user~ measure that must be in place in cloud computing.
This security service might be relevant to all data
• For instance, a user database that is stored at rest
objects discussed above, notwithstanding · the
on cloud servers may be a key asset for cloud
possibility that various applications may have
users, necessitating strong security measures to
varied needs about the types of data that require
ensure the privacy, availability, and integrity of
confidentiality protection.
the data.
• User privacy may be impacted by user identify ► 2. Data Integrity Protection
information, which may include Personally • This service protects against malicious data
Identifiable Information (PII). Therefore, access to alteration.
user identifying information should only be • Cloud customers must have a mechanism to verify
permitted for authorized users. that the data they have outsourced to remote cloud
servers is secure both while it is at rest and while
• D ata from service audits serve as proof of
compliance with and rulfilment of Service Level it is in transit. For users of the cloud, a security
Agreements (SLA) and should not be maliciously solution like this would be essential.
alter~ • Since the audit data would raise legal issues, it is
• ~ formation about a service's profile should be essential to ensure their authenticity while
well-protected because it could be used by examining cloud services. This security service is
attackers to find and identify service instanceD also applicable to other data objects discussed
• · C ritical user business data may be present in above.
temporary runtime data, which should be
► 3. Guarantee of Data Availability
separated during runtime and securely disposed of
after runtim§ _
• This service guarantees that all user requests for
data retrieval from the cloud will be met.
• r.nie basic security services for information
security provide data assurance of data that • In relation to the fulfilment of Service 1,evel
include: Confidentiality, Integrity, and Agreements, this service is extremely vital for
Availability (CIA). data that is at rest on cloud servers.
1nfr11;::::;;=:::::~~:::~:::::ii=======d~~~~~!,;,=~~~~~l1},
pata availability assurance is extre
for long-term data storage services d
.
me1y unportan
t • The system can easily be audited in the event of
lih d ue to the
growing like oo of data loss d local storage. However, in cloud computing, the
or egradation
over time. service provider must ensure reliable transparency
►
of data access.
4. secure Data Access
The purpose of -this security service · .
1s to restrict
access to data content to users who are th .
au onzed.
In real-world scenarios, exposing appli·.cat·10n data
•
to unauthorized users could jeopardize a cloud
user's business objectives.
, Legal issues may arise when sensitive information • Cloud application security is defined as a set of
is improperly disclosed in mission-critical policies, governance, tools and processes used to
systems. govern and secure information exchanged within
collaborative cloud environments and applications
, Users of the cloud may require fine-grained data deployed to the cloud.
access control in the sense that different users may
• Cloud solutions are ubiquitous in modem
have access to distinct sets of data in order to enterprises. As a result, cloud security is now front
protect sensitive data more effectively. and center for optimizing enterprise security
• -The majority of the data elements mentioned posture.
above are suitable to this security service. • Modem enterprise workloads are spread across a
· wide variety of cloud platforms ranging from
► 5. Regulations and Compliance
suites of Saas products like Google Workspaces
• Storage and access to sensitive data may need to and Microsoft 365 to custom cloud-native
adhere to specific compliance in real-:- world applications running across multiple hyper-scale
application circumstances. cloud service providers.
• The Health Insurance Portability and As a result, network perimeters are more dynamic
•
• Accountability (HIP AA) Act, for instance, may than ever and critical data and workloads face
place restrictions on the publication of medical threats that simply didn't exist a decade ago.
records. In addition, the location of the data would • Enterprises must be able to ensure workloads are
th protected wherever they run. Additionally, cloud
frequently be a concern due to problems wi
export-law violations. Before transferring th eir computing adds a new wrinkle to data sovereignty
data to the cloud customers of the service should and data governance that can complicate
carefully cons~der these regulatory and compliance.
compliance concerns. • Individual cloud service providers often offer
► 6 security solutions for their platforms, but in a
• Service Audition
lnis service, which is essential for co~liance world where multi-cloud is the norm, solutions
enr echarusm to that can protect an enterprise end-to-end across all
orcement, gives cloud users a m
keep track of how their data is accessed. platforms are needed.
r~\J-N (M7-66)
lil Tech-Neo Publications .. A SACHIN SHAH Venture
ew Syllabus w.e.f academic year 22 - 23 )
· Cloud securi ) .... Pa e no. 4-1,
Infrastructure Securi MU-Sem .7-IT . n . one of the most conun0
Misconfigurat10 •
~ :-1 Cloud Appllcad~a,,Securlty • . • , n
t breach es 1s misconfigurations
d
reasons for a a .
~ -r" Threats ( p. r- J ) )
The frequency o
• ·
f misconfigurat10n m the cloud i~
. . .
. art to the compl exity mvolved in
Follow ing are the threats to cloud application due m large P .
. . manag ement (which leads to
security: configuration
. . . .d· anual proces ses) and access control
• Account hijacking : Y! eak passwords and data disJomte m ·
breaches often lead to legitimate accounts being across cloud providers.
compromised. If an attacker compromises an Phisbing and social engineering : Phishing and
account, they can gain ·access to sensitive data and
•
social engineering attacks that exploi t the human
completely control cloud assets] 'd
Si e ·Of enterpr ise . securit y are one of the most
,
• Credential exposure : ~ corollary to account frequently exploit ed attack vector s.
hijacking is credential exposure. Exposing Complexity and lack of visibility : Because
credentials in the cloud (GitHub, for example) can •
many enterpris~ enviro nments are multi-cloud, the
lead to account hijacking and a wide range of
complexity of config uration management,
sophisticated long-term attackQ
. .., granular monitoring across platfor ms, and access
• Bots and automated attacks !Bots and control often lead. to disjoin ted workfl ows that
malicious scanners are an unfortunate'-reality of involve manual config uration and limit visibility
exposing any service to the Internet. As a result,
which further exacer bates cloud security
any cloud service or web-facing application must
challenges.
account for the threats posed by automated
attacks] a. 4.4.2 Types of Cloud Application
•
----
Insecure APis : /APis are one of the most
common mechanisms for sharing data, both
Security Solution
There is no shortage of securit y solutio ns designed
internally and externally, in modern cloud
to help enterprises mitigate cloud applic ation security
environments. However, because APis are often
threats. Some of them are describ ed below :
both feature and data- rich, they are a popular
attack surface for hackersl_, ► 1. Cloud Acces s Secur ity Broke r (CASS )
reputationa1 damage, and Joss of revenue. security scanning tooling with existing developer
workflows can enable the "shifting left" of cloud
Thre at Moni torin g
► 3.
application security.
• After applications are deployed to the cloud, it's
crucial to continuously monitor for cyber threats
• Shifting left testing can dramatica11y reduce the
•'""'""' 14
r~._s
~ o MANAGEMENT
U D IDENTITY AND ACC~>
<CLou~_1411 ~
·T-------........--~r!·"'!:.!~"'~·1;;:o":"'.ur!!:1L~le.~
no ~+...,_.·
,,. 4 ,S. 1
----- - -- --- -----
(
-----.
wn
-t; a note on: Cloud ldu11t1t -
u~,: ..A...... - '
u <:cos~ t
Ft.,tor,1 of Cloud 1AM
I AM typ 1r ,ti I y In, I urk >11 !h('
'vQ· Managem~n~ - - - - - ...... - -
---- - .. - .. . . __ __ _ _,
• : ( r1 l1 0WHlll
l
,f them is through ide ntity and accc,,,<•s_ clear and stnndord accc <:<i cot1trn l ,nrc rf,Jt.C Alt
·\C:t'lllt'lll (1AM).
1n:lll, ~ cloud service., can he occe<; <,cd through the 111 -• me::-
intcrfacc.
.\l'l_ -~in•'
(l l U e
t0 Gartner, Identity and Ace ess
2.
' ~t:magement (1AM) is the security discipline that Enhanced Security : You can de fin e ,ncrc., .. cd
~ables the right individuals to access the right securi ty for critical applications .
3.
resources at the right times for the right reasons. Resource-level Access Control : Use rs ca n tie
I.AM addresses the mission-critical need to ensure given permissions to access resources ar various
granularity levels by way of roles that you can
appropriate access to resources across increasingly
define.
heterogeneous technology environments.
&. 4.5.2 Need of Cloud 1AM
, Enterprises traditionally used on-premises 1AM
software to manage identity and access policies, • To initiate. capture. record. and mannge user
but nowadays, as companies .add more cloud identities and associated access rights, identity and
services· to their environments, the process of access management technology cun be utilized .
managing identities is getting more complex. According to policies and roles. all users are
Therefore, adopting cloud-based Identity-as-a- authenticated. authorized. and evaluated.
Service (IDaaS) and cloud IAM solutions • If 1AM operations arc not properly regulated. the
becomes a logical step. organization may not be in compliance with
regulations, and management may not be able to
• Cloud Identity and Access Management
prove that company data is not at risk of being
(Cloud IAM) lets administrators authorize who
exploited in the event of an audit.
· · full
can take action on specific resources, g1vmg
~ 4.5.3 Benefits of Cloud 1AM
control and visibility to manage Google Cloud
resources centrally. A company may find it difficult to adopt cloud
• For enterpnses
. .h
wit compIe x organizational Identity and Access Management solutions since they
structures, hundreds of workgroups, an ct· many don't directly increase profitability, and ceding control
. over infras truc ture is difficult. An 1AM solution,
ProJects, 1AM provides a u nif'ied view. into
.
however, has several advantages, including the
sec unty
·policy across your entire organizat.J.on,
. h built-in auditing to ease compliance following:
Wit
Processes. B relying on the centralized trust model.
• y
enterprise security costs
f
or
th'rd
• -party
applications can be reduced.
• Regardless of where your users are located, they • Granular permissions : By using this granular
can access the solution from any device. permission, you are able to grant ·the permissions
• Through Single Sign-On, you can give users for different according to their resources. By
access to all your applications. considering an example, you can give the whole
access to Amazon EC2, S3 (Amazon simple
• Multifactor Authentication can be used to protect
storage services) as well as to remaining AWs
mission-critical apps and sensitive data.
services. While the other users can allow getting
• In addition, it promotes compliance with
the read-only access along with the administrator
procedures and processes.
EC2 instances in order to access the process of
• Typical problems include people being granted billing information .
permissions based on their needs and tasks and
not revoking them when they are no longer
' . Secured access to AWS sources : This 1AM
feature at AWS will be used to secure all the login
needed, leading to users having lots of privileges
credentials which can succeed on the EC2
they don't need.
instances. You can also offer them the permissions
"a.. 4.5.4 Identity and Access Management in order to access your application with respect to
from Major Cloud Providers the AWS services.
• Amazon Web Services (AWS) cloud provides the MFA you can easily add the two-factor
users with a secure virtual platform to deploy their authentication not only for your account but also
applications. It offers high-level data protection for the individual users for more security. Either
when compared to an on-premises environment, at you are . your user can provide an access key or
a lower cost. password in order to work with your account with
• Among various AWS security services, Identity the help of a cod~ that is specifically configured
and Access Management (1AM) is the most by the device.
widely used .one. It enables secure control access • Identity Federation : The identity federation at
to AWS resources and services for the users. Also, 1AM will allow the users who already have their
it helps to create and manage AWS users as well passwords. For example, let us consider an X
as groups and provides necessary permissions to
corporate network or else an internet provider in
allow or deny access to AWS resources.
order to get temporary access to your current
llF Features of 1AM at AWS AWS account.
IAM at Amazon Web Services will offer you the • Identity information for assurance : Are you
following features : using the Cloud Trail option for your AWS
• Shared access to your AWS account : Without account, then you will definitely get the log
sharing your password, you are eligible to access records that contain all the information that is
the other permission with respect to the made according to the resources in your account.
administrator as well as the resources from your All those information are generally named as tbe
current AWS account. 1AM identities.
Audit trail : A full audit trail is provided without • Quickly and easily assign access for a group of
addi · users, service IDs, or trusted profiles that are
► honal cost
l. 18t,,t organized in an access group by assigning access
to the group, and then add or remove identities as
enabl:BM Identity and access management (1AM) needed to grant or deny access to account
les y 1 tfonn
Serv·1 ou to securely authenticate users for P a resources.
Ces · ntly
~ trol access to resources constste
from your organization or an external IdP. By • Security-as-a-service model focu ses on secur
ity
using your IdP, you can provide a way for users in provided as cloud services; i.e., security delivered
your company to use single sign-on (SSO). through the cloud instead of on-p remi se secur
ity
► 6. Com pute reso urce s solutions.
• By using trusted profiles, you can define fine- • The security-as-a-service mod el can also enhan
ce
grained authorization for all applications that are ~unctionality of exis ting on-premise
running in a compute resource without creating
implementations by work ing as a hybr id solution.
service IDs or managing the API key lifecycle for
• Cloud Security as a Service, also known
applications. as
Security as a Service (SEC aaS) is a Cloud-ba
The trusted profiles provide better control for sed
• solution that d r '
e ivers outs ourc ed cyber secun•t)'
granting access to compute resources. services.
implement an Intrusi on Manag ement sySlem, (vi) Intrusion Management : Intrusio n Manag ement
something that many Cloud securit y provide rs is the process of intrusion detecti on / preven tion
offer. using signature or anomal y-based approa ch to
' lntru s10
· n Manag ement respond to unusua l events.
refers to. the posst'bTty
11 of
(vii) Security InformatioJ} and Event Management
identifying in real-tim e who bas access to your
(SIEM) : SIEM analyse s and correla tes logs and
. network throug h the use of Jntn1sion Detecti on
event information related ~o securit y issues to
Systems (IDS) and Intrusi on Preven tion System s
provide real-time reporti ng and alerts on securit y
(lPS).
incidents / events that may require attentio n .
• l:Iavin . ·
g clear mform ation on who ·th e Perpetra tor (viii) Encryption : It is the process of provid ing
of a
system is can help manag e secun·cy threats. private and public key cryptog raphic algorit hms
lbus th . ·d tifying and for security of data at rest, in motion and in use
' ese tools are very useful 1Il 1 en
Prevenr both in the cloud and on premises.
ing cyber-a ttacks.
• For anti-virus tools to be effective and useful, they • Instead, you can replace the upfront capital with
need to work with the latest virus definitions, variable operating expense, usually at a discounted
allowing them to stomp out threats, even the rate compared to the upfront costs.
•
newest ones.
With security as a service, you're always using
-
tools that are updated with the latest threats and ► 1. Metasploit
options. This means no more worrying that your •
users are not updating their anti-virus software and The Metasploit framework is a very powerfu l tool
keeping other software up to date to ensure the which can be used by cybercriminals as well as
latest security patches are in use. ethical hackers to probe systematic vulnerabilities
on networks and servers .
1nfra~;::;:~:;:"'~":'::::=::::7--------~~~~::::!l\:l.-!::ll:.:;~1,!~!i
tructure Securi MU-Sem. 7-IT
.
It is owned by Rapid7, a US-based cyber security (v) Payloarl modules : Provide shell code that run s
, f
. .
flflll. A notable subproject of MetasplOit a ter the tester succeeds in penetrating· a system.
· 1s the
open-source Metasploit Framewor k a tool used to Payloads can be static scripts, or can use
M
develop and run exploit code on remot target eterpreter, an advanced payload method that Jet~
. e t t
systems. · es ers write their own DLLs or create new exploit
capabilities.
, The Metasploit project includes anti-forensics and
. (vi) No Operation (NOPS) generator : Produces
remediation too1s, some of which are built into the random bytes that can pad buffers, with the
Metasploit Framewor k.
objective of bypassing intrusion detection and
, Metasploit comes pre-install ed on the Kali Linux prevention (IDS/IPS) systems.
operating system. (
vii) Datastore : It is a central configuration that lets
• The Metasploit Framewor k contains a large testers define how Metasploit components behave.
number of tools that enable penetration testers to It also enables setting dynamic parameters and
identify security vulnerabil ities, carry out attacks, variables and reuse them between modules and
and evade detection. payloads. Metasploit has a global datastore and a
specific datastore for each module.
• Many of the tools are organized as customizable
modules. Here are some of the most commonly • Metasploit integrates with almost any
used tools : reconnaissance tool, allowing you to identify the
N~on~e~--~✓~ADS·:
9
- : : :: :: := == =~ -::~ :-:- ::--- ' -
-- i(c~)~B~ot~
b - -~(~d~) ()
(M U-New Syllabu s w.e.f academ ic year 22-23) (M7-66)
!i1 Tech- Neo Public ations ... A SACHI N SHAH venture
r
tra
10
-~~u~
securi
c1oud providers.
.
(MU-Sem .7-IT)
must enable
. •
.
ly appropna tely with these regulations.
• to
their customers
Cloud Securi
mapping those to contro ls that e xi st in yo ur
Q4,11
· cornP chosen cloud service pro vider.
payment Card Industry Data Security
(d) Data should be trarn1ferrcd and stored in an
(a) Standard (PCI)
encrypted format for security purpose.
) Health Insurance Portability and ✓Ans.: (a)
(b Accounta bility Act (HIP AA)
Q. 4.18 The characteristic of something having ~n
(c) Sarbanes- Oxley Act (SOA)
provided by an authorized source in the context o f
(d) All of the above ✓Ans.: (d)
security is known as _ _ _ _ _ __
Do not put confident ial informatio n, including (a) Integrity (b) Confident iality
Q,4.12
personally identifiab le informati on (PII), into the (c) Authenticity (d) Availabili ty ✓Ans.: (c)
Cloud. Q. 4.19 In _ _ _ _ cloud, an organizati on rents cloud
(a) True (b) False ✓ Ans. : (a)
services from cloud providers on demand basis.
Q. 4,13 Compared to in-house hosting, cloud-based (a) Public (b) Private
hosting _ _ __ (c) Protected (d) Hybrid ✓ Ans. : (a)
(a) Provides better visibility of security and Q. 4.20 Which of the iollowing mechanis m addresses the
disaster preparedn ess capabiliti es challenge of propagating the authentic ation and
(b) Minimize s the risk of investing in technology authorization information for a cloud service
that will soon become obsolete consumer across multiple cloud services?
(c) Provides greater control over the location of. (a) Hashing
data (b) Single Sign-on
(d) Requires a significan t amount of capital (c) Digital Signatures
✓Ans.: (b) ✓Ans.: (b)
(d) Public Key cryptography
Q, 4.14 Which of the following is not a type of cloud?
(a) Public (b ). Private
(c) Protected (d) Hybrid ✓Ans. : (c)
Q. 4.15 Which of the following mechanis ms are contained Q.1 Define cloud computing. List and explain the
. ?
by cloud API for accessing cloud services• characteristics of cloud computing.
(a) Abstraction (b) Authentic ation Explain different service models and deployme nt
Q.2
(c) Replicatio n (d) Segmenta tion ✓Ans.: (b) models in cloud computing.
Q. 4·16 Which of the following Cloud security Q.3 Describe in brief different risks and their
characteristic states that the data have not been countermeasures for cloud security.
altered by an unauthori zed party? Q.4 Write a note on: Data Protection in Cloud
(a) Integrity (b) Confident iality Explain different threats to cloud applicatio n security.
✓ Ans. : (a) Q.5
(c) A uthenticity (d) Avat·1ab"l'ty
11 Also explain the strategies that can be _used as a
Q,4,17 solution to cloud application security.
Point out the incorrect statement .
'd similar Write a note on: Cloud Identity and Access
(a) All deployme nt models provi e Q.6
security services. • Management
(b fm g service
) Different types of cloud compu rity a. 1 Explain Cloud Security as a service. Also state its
els of secu
models provide different lev benefits.
services.
() ms to a cloud
c Adapting your on-premis es sySte . what
deternune
. d and
mo del requires that you
security mechanis ms are requlfe ~J-- ----- ----- ----- =~-- -=-- -
Chapter Ends ...
□□ o