CS&M Lab1
CS&M Lab1
Dehradun
Submitted by:
Name- Vikash kumar
SAP: 500087705
batch: B4.CCVT
2. Rubrik
Working principle:
-Rubrik delivers advanced data protection features with its snapshot-centric backup and recovery
solutions. By combining the benefits of short-term snapshots and creating full backups of those
snapshots, you get fast, reliable recovery down to a granularity of single-file restore.
Features:
-- Secure data backup ensuring nothing is lost and quickly restored in case of a disaster
-- Protected backups which make it useless to even attempt to destroy them thanks to immutable
storage
-Works well with complex cloud architecture, as well as legacy and next-gen application
environments
-- Rubrik offers such a solution: it backs up and recovers data center and cloud data and features
automatic recovery from failure. It has in-depth reporting capabilities and it is also highly scalable.
-- Administrators can search and recover the precise data that is needed, instead of having to restore
the whole database. There is no need to be concerned about data loss or theft because Rubrik
protects the data from ransomware attacks – even after it has been stored in backup – with the help
of immutable storage.
-- Rubrik also makes it easy for backup and recovery processes in a hybrid cloud environment. In
fact, it can be used to get rid of complex, legacy backup/restore processes – that don’t even
guarantee recovery. Instead, this tool replaces them with a software solution that bridges legacy
and next-gen applications.
Advantage
--Offers unified cloud backups – a great BDR alternative
-- Supports physical, virtual, and hybrid environments
-- image-based and incremental backup/recovery
--Supports the full lifecycle of data management
Disadvantage
--Must contact sales for pricing
Applications
--Ransomware Monitoring & Investigation.
--Sensitive Data Monitoring & Management.
--Threat Monitoring & Hunting.
--Data Security Command Center.
Advantages:
--Google Cloud IAM provides a simple and flexible way to manage access to Google Cloud
resources, allowing for granular control over user access and permissions. It also integrates
with other Google Cloud services, such as Google Cloud Storage and Google Compute Engine,
to provide an integrated security solution.
Disadvantages:
--Google Cloud IAM can be complex to set up and manage, and may require significant
knowledge of Google Cloud services and permissions. Additionally, it may be difficult to
manage access across multiple Google Cloud projects or regions.
Limitations:
--Google Cloud IAM only applies to resources within the Google Cloud ecosystem, and does
not provide protection for resources outside of Google Cloud.
Applications:
--Google Cloud IAM is commonly used in cloud-based infrastructure and development
environments, and can be used to manage access for both internal and external users.
Advantages:
--Azure AD integrates with other Azure services, such as Azure SQL and Azure VMs, to
provide an integrated security solution.
--It also allows for single sign-on (SSO) across multiple applications, reducing the need for
users to remember multiple sets of login credentials.
Disadvantages:
--Azure AD may be complex to set up and manage, and may require significant knowledge of
Azure services and permissions.
-- Additionally, it may be difficult to manage access across multiple Azure accounts or regions.
Limitations:
--Azure AD only applies to resources within the Azure ecosystem, and does not provide
protection for resources outside of Azure.
Applications:
--Azure AD is commonly used in cloud-based infrastructure and development environments,
and can be used to manage access for both internal and external users.
7. Zscalar
Suite of cloud-based security tools ideal for protecting users of on-demand software; can work
as a gateway as well as a tunnel for private usage (better than a VPN), for an enhanced UX.
Working Principle:
--Zscaler is a cloud-based information security platform delivered through more than 100
global data centres. To use Zscaler, Internet traffic from fixed locations such as branch offices
or factories, roaming devices and mobile devices is routed through Zscaler points of presence
before going on to the public Internet. The Zscaler Zero Trust Exchange™ is a cloud native
platform built on zero trust. Based on the principle of least privilege, it establishes trust through
context, such as a user's location, their device's security posture, the content being exchanged,
and the application being requested.
Advantages:
● Reduces IT cost and complexity.
● Reduces risk.
● Products / Services.
● “Instead of forcing.
● Zscaler, Inc.
● A cloud-first architecture.
Limitations:
● Zscaler SCIM servers have a rate limit of 5 requests per second. In order to avoid retries,
reduce the number of threads in the PingFederate channel configuration. For more information,
see Specifying channel information in the PingFederate documentation and SCIM API
Examples in the Zscaler documentation.
● When provisioning users to a group, all users must be set to active. If an inactive user is
present, the active users and group will be provisioned but no users will be added to the group.
● Rate limiting can prevent the connector from provisioning users to groups. If rate limiting
forces a retry, and a user is created on the retry, the user's group memberships are applied the
next time the relevant groups are updated.
Applications:
--Zscaler Client Connector
--Zscaler Executive Files
8. CloudFlare Access
Working principle:
--CloudFlare Access is a cloud-based identity and access management solution that allows
administrators to manage users and their access levels across CloudFlare and other services.
--This includes the ability to create and manage access keys, permissions, and policies for users
and resources.
Advantages:
--CloudFlare Access integrates with other CloudFlare services, such as CloudFlare Gateway, to
provide an integrated security solution.
-- It also allows for single sign-on (SSO) across multiple applications, reducing the need for
users to remember multiple sets of login credentials. It also provides end-to-end encryption,
ensuring that data is secure while in transit and at rest.
Disadvantages:
-- CloudFlare Access may not be supported by all applications, and may require additional
configuration to integrate with certain services.
-- Additionally, the service may require a CloudFlare account and additional cost to use.
Limitations:
-- CloudFlare Access only applies to resources within the CloudFlare ecosystem, and does not
provide protection for resources outside of CloudFlare.
Applications:
--CloudFlare Access is commonly used to secure internal applications and resources, such as
corporate websites and web-based applications
Introduction to different cloud security tools with their advantages,
disadvantages, limitations and applications
1. AWS Identity and Works on the --integrated with --requires --only applicable --create access
Access principle of creating AWS services in knowledge of to AWS and its roles and
Management (IAM) access roles, where order to provide AWS access roles, services groups as
administrator security solutions. policies . assigned by
creates roles for administrator
accessing resources --provide multi- --can be difficult
or services using level control of to maintain
policies, groups and resources across multiple
roles. AWS account.
2. Rubrik core principle of --Offers unified --high pricing --Limited Platform ----Ransomware
Rubrik's platform is cloud backups. Support. Monitoring &
to provide a single, Investigation.
unified view of an --snapshot based --scale and
organization's data, recovery. complexity of data --Sensitive Data
regardless of where Monitoring &
it is stored and Management.
provide a distributed
architecture and
advanced data
indexing to allow for
fast and efficient
data management,
search, and recovery.
3. CrowdStrike The core principle of --Advanced Threat --CrowdStrike --CrowdStrike -- Falcon can be
Falcon CrowdStrike Falcon is Intelligence. Falcon can be Falcon can be used to protect
to provide real-time relatively integrated with an
visibility and --providing expensive, and its other security organization's
protection for an visibility into the pricing model solutions, but it endpoints, such
organization's activity on may not be may not be as laptops,
endpoints by using endpoints and suitable for all compatible with desktops,
advanced threat helping to speed organizations, all systems or servers, and
intelligence and incident response. particularly those applications. mobile devices,
machine learning to with limited from a wide
detect and prevent --lightweight budgets. -- CrowdStrike range of cyber
cyberattacks on an agent. Falcon is an agent- threats,
organization's based solution, including
network. which means that malware,
the agent needs to ransomware
be installed on the etc.
endpoints
6. Orca Security Orca Security --Agentless --The platform --Limited to cloud- --Cloud
provides a approach and may not provide based Workload
centralized Complete visibility as environments Protection
management comprehensive
console that allows -- Automated reporting and --Cloud Data
organizations to security analytics as some Protection
manage and monitor assessments other security
their cloud security solutions on the --Cloud Threat
posture, with real- market. Detection and
time visibility into -- Integration Response
the security status of challenges
their cloud
resources.
Step 1 creating a ubuntu virtual machine using VirtualBox. Enter the name of your VM.
Step 2now, we are going to allocate base memory(RAM) to our VM(here we are allocating almost
increased to 1700 MB of RAM) and click on next.
Step 3let, the hard disk option be remain same(create a virtual hard disk now),hard disk file type be
(VDI(VirtualBox disk image)) and also let storage be (dynamically allocated). Now, here we are going to
allocate storage to our VM and locate the folder where we want to keep our VM. Now, select on create.
Step 4after creation of our VM. Select on settings, go to system, select the processor and increase the
processors count from one to four.
Step 5then select on storage, select on empty with a disc icon and again select on disk with drop down
and select the iso file which we downloaded(we can also locate the iso file by clicking on choose a dick
file, if your iso file is not shown here).
Step 6after attaching iso file and complete installation of linux.we are going to install apache2
webserver on our Linux Virtal machine.
Command:-sudo apt-get install apache2
Step 7check status of apache2 server.
Command—systemctl status apache2
Step 8now, we go to apache webserver default port number(80). As, we see our apache server is
running successfully.
Localhost:80/
EXPERIMENT NO:-3:-
Installation and Configuration of virtualization using KVM
Enabling nested virtualization:
1.intially, we are going to enable nested virtualization.
3.If kvm-ok returns an error stating KVM acceleration cannot be used, try solving the
problem by installing cpu-checker. To install cpu-checker, run the following command:
sudo apt install cpu-checker
Install KVM on Ubuntu 22
To enable KVM virtualization on Ubuntu 22 .
Step 1.installing kvm:-
1. First, update the repositories:
sudo apt update
3. In the next dialogue, click Browse Local and navigate to the path where you stored the
ISO you wish to install.
4.. The ISO you chose in the previous window populates the field in Step 2. Proceed to
Step 3 by clicking Forward.
5. Enter the amount of RAM and the number of CPUs you wish to allocate to the VM and
proceed to the next step.
6. Allocate hard disk space to the VM. Click Forward to go to the last step.
7. Specify the name for your VM and click Finish to complete the setup.
8. The VM starts automatically, prompting you to start installing the OS that’s on the ISO
file.
Experiment no:-4
Implementation of Para-Virtualization using VM Ware‘s
Workstation/ Oracle‘s Virtual Box and Guest O.S.
Step 1:-select on start to create a new virtual-machine.
Step 14:- As, we see we successfully Implemented Para-Virtualization using Oracle‘s Virtual Box and
Guest O.S .
EXPERIMENT NO:- 5
Implementation of Para virtualization
Step 1:-We can see there is grey marked button in the settings of the virtual box we need
some internal CMD commands to enable this
Change the para virtulization interface to Hyper-V
Step 2:-For this run windows+r and write cmd in dialogue box
Command prompt should open
Go to installation folder
We can see the greyed out option is now enabled and in “Acceleration” tab
Para virtualization is considered “Hyper-V”
Step 3.now, we create a s3 bucket and try to access it through our ec2
instance.
Step 4.As, we see we are unable to access our s3 bucket because we need to
create a bridge using IAM policies and role to access our s3 bucket.
Step 7.now, we select who access the role(also known as trusted entity, we
select aws services and also select use case as ec2).
Step 8.now, we have to choose a policy which provides us full access to our s3
bucket via the ec2 instance (Amazons3fullacess).
Step 15.now, as we see we are able to access our s3 bucket through our ec2
instance.
EXPERIMENT NO:-9
setting up SSH, Installing Ansible and setting its inventory
Step 1:-Setting up SSH between two Linux VM (one act as control server and other as remote
server).
Now, creating a SSH key on control node and also setting our password for key using
vikash private key(traffic decrypted by private key, and let private key remain on control
server)
vikash.pubpublic key(traffic encrypted by public key, so put public key on remote server)
Step 3:-now ,we are going to install openssh-server on remote server (left side) , control server(right
side).
Step 7:-we can check public key on remote server by going to directory /home/vikash, then
ls
Step 8:-now, we are going to transfer public key in a .ssh folder on remote server.
ssh [email protected]
exit
Now, we are going to install ansible on control server
Step 11:-run the following command to include the official project’s PPA (personal package archive)
in your system’s list of sources, from the control node.
Step 12:-update your system’s package index, so that it is aware of the packages available in the
newly included PPA.(control node)
Step 14: - now, we are going to Setup the Inventory File(control node)
we are going to edit the contents of our default Ansible inventory, open the /etc/ansible/hosts file
using any text editor, on your Ansible control node:
ansible-inventory --list -y
Step 16:-installing ansible on remote server through control server using ssh.
telnet 172.31.16.248.22
Output:ping successful