Unit IV Part IV PDF
Unit IV Part IV PDF
UNIT - IV
• Data is more secure on the cloud. Cloud has professionals who know more
about security than us.
• But every time our data is exposed to the internet, security is a big concern.
Anything communicating via a network is vulnerable to attack
• 3 areas of concern
– Secure data that you move to the cloud
– Secure access to VMS and containers u create
– Use software services in a secure manner
• The cloud provider manages the security OF the cloud, you manage the
security of the data IN the cloud.
• you are the one who defines the security mechanisms that you deploy to protect
your own content, platform, applications, systems, and networks
THINKING ABOUT SECURITY IN THE CLOUD
THINKING ABOUT SECURITY IN THE CLOUD
✓ Amazon manages your keys, encrypting object with unique key and encrypting that key
with a master key
✓ you can obtain access to an audit trail of when your key was used and by whom
– Azure provided services:
✓ Done by Azure Storage Service Encryption
– Google provided services
✓ done by Google Cloud Datastore
– Amazon allows the user to require that all data uploaded to container be encrypted; however,
the encryption request must still be made on individual uploads, as indicated previously. (An
attempt to upload data without the encryption parameter then raises an error.)
– Azure allows the user to enable encryption at the level of a storage account; once enabled, all
data uploaded to that account are encrypted.
– Google Cloud Datastore always encrypts.
SECURE DATA IN A CLOUD
• Client-side Encryption:
– useful when you want to ensure that the cloud provider never has access to
your unencrypted data.
– Amazon and Azure both provide tools that you can use to encrypt data before
they are sent over the wire. You might use these tools, for example, to create a
secure backup of data otherwise maintained in on-premises storage,
particularly if regulatory requirements prevent unencrypted data from leaving
your premises.
– But note that you are responsible for preserving the keys (as you are with
server-side encryption, if you provide the keys): if you lose a key, the data that
it encrypted are also lost.
SECURE DATA IN A CLOUD
C) Intercepted Communications
• Best way to prevent this is remove them from the internet and place them on
VPN (Virtual Private Network). A VPN carries its own IP addresses and
subnets that are not recognized as being part of the Internet.
• You can set up a VPN in a number of ways; the choice depends on the network
you need to create. Each public cloud allows you to use their cloud portal to
create a VPN that solves your specific problem
SECURE YOUR VMS AND CONTAINERS
• Issue - how to control access to the services that you create for others and host in
the cloud.
• How can you authorize the software for customers.
• In developing such mechanisms, SSL and HTTPS are certainly important, as are
passwords.
• You can create access control lists that can add some protection if you have a way
to authenticate your users.
• Another solution to the authentication problem is to use a third-party
authentication system.
• The Azure app service provides a simple tool that you can use to enable Facebook,
Google, or Microsoft as the authentication provider for your service.
• The Globus tools can also help with authentication and authorization.
THANK YOU