Cloud Sec
Cloud Sec
This means that the cloud provider is responsible for the security of the underlying infrastructure
that they lease to their customers, while the customer is responsible for the security of the areas of
the cloud infrastructure over which they have control.
Middle ware – which is kind of a software which provides general services to the applications
besides those services that are provided through the OS . for example data management
application services, API management etc
Runtime component- which is more related to the developers and is kind of a software or
instruction that is built into development environment to make sure that the code executes in a
proper way
Virtualisation – is a kind of software which separates the physical computing device into one or
more virtual devices that each can be used and managed to perform various computing tasks
Storage
So when all these are managed by the company itself it is the on-premises computing
When company manages the OS, Middleware, runtime, application and data and servers,
virtualisation , networking and storage is managed by CSPs, it is considered to be IAAS
In PAAS the company only manages application and the data , rest everything is managed by CSP
And in SAAS all the components are managed by csp and the company is just the end user of the
services and do not do any processing on their site
Control –
Then review the regulations in their respective locations to ensure the compliance with
organisational requirements with regards to data privacy
It is also a good practice to specify in the contact that the cloud service provider will not move the
assets to the locaions where the regulations are not aligned with the company requirement
Another things to be ensured is that the data transferred from the company premises to the cloud
service providers should be encrypted and proper key management process is in place
Physical security – When the company moves its data to a cloud infrastructure they must still be in
compliance with the corporate policy. At the same time company data may also be accessed by
the staffs working for cloud service provider for activities like routine maintenance, backup
purposes . The risk here is there may be gap between Company and CSP physical security
requirements
Control – It can be recommended that the company requests the security policy of the cloud
service provider and reviews it for compliance with the corporate security policy
It will also be good to specify in the contract that CSP provides the evidence of independent
security reviews, audit certificate reviews that meet the corporate requirement
Data Disposal – When company chooses to stop accepting services from the CSP, CSP should
properly dispose the data before providing services to a new client to prevent unauthorised access
Control – Request CSPs technical specification and control related to data disposal to ensure they
are in compliance with the company requirements
Incident management – In a public cloud infra if one of the companies is compromised due to
some cyber attack it may expose the cloud and other companies to the attack
Hypervisor attack – Next we have hypervisor attacks. Hypervisor is a piece of software that
provides the link between the virtual machines and the underlying physical resources that are
required to run these machines by using hypercalls. If an attacker gains access to virtual machine
in the cloud he could make fake hypercalls to introduce malware or cause certain disruption in the
hypervisor behaviour
Patching/ release management – In a public cloud where one cloud may have 100 of tenants CSP
are able to introduce patches in their applications without proper approval or notification of the
clients. Here the risk would be the company could have a lack of control over the release
management process and could be subject to unexpected side effects od improper patching.