Assignment 2 Frontsheet Part 2
Assignment 2 Frontsheet Part 2
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 P7 P8 M3 M4 D2 D3
1
Summative Feedback: Resubmission Feedback:
2
Submission Format:
Format:
A report(in PDF format)
You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get failed
LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools.
LO4 Analyse the technical challenges for cloud applications and assess their risks
Task 1
Base on the scenario and architecture design in the first assignment provide the
implementation. Because of the time constraint of the assignment, the
implementation just provides some demo functions of the scenario. The
implementation includes two parts:
3
Task 2
The table of contents in your security manual (which should be 500–700 words)
should be as follows:
4
Learning Outcomes and Assessment Criteria
P6 Implement a cloud
platform using open source
tools.
P7 Analyse the most common M4 Discuss how to overcome D3 Critically discuss how an
problems which arise in a these security issues when organisation should protect
Cloud Computing platform building a secure cloud their data when they
and discuss appropriate platform. migrate to a cloud solution.
solutions to these problems.
P8 Assess the most common
security issues in cloud
environments.
5
Contents
Table of Figures..........................................................................................................................................
1.5. A guide (step by step): how to deploy (put the website) to Heroku and connect to
PostgreSQL:..............................................................................................................................................
1.5.1. Create and login a new Heroku account:.........................................................................................
1.5.2. Working with Heroku:.....................................................................................................................
1.5.2.1. Create a new Heroku application:.............................................................................................
1.5.2.2. The overview tab:......................................................................................................................
1.5.2.3. The resource tab:.......................................................................................................................
1.5.2.4. Connecting app to database add- on:.........................................................................................
1.5.2.5. Connect Heroku to the working directory:................................................................................
2. Implement a cloud platform using open source tools...............................................................................
2.1. Git and GitHub:.....................................................................................................................................
2.3. Working with GitHub:...........................................................................................................................
2.3.1. Create new repository on GitHub:...................................................................................................
2.3.2. Clone a repository:..........................................................................................................................
2.3.3. Pull all data from working directory to a GitHub repository:........................................................
2.3.8. Changing information in local account:..........................................................................................
2.3.9. Creating a server on pgAdmin:.......................................................................................................
2.4. Connecting Heroku to GitHub:.............................................................................................................
3. most common problems which arise in a Cloud Computing platform and discuss
appropriate solutions to these problems:......................................................................................................
3.1. Security issues:......................................................................................................................................
3.2. Cloud Cost Management:......................................................................................................................
3.3. Lack of resources/expertise:..................................................................................................................
3.4. Compliance:...........................................................................................................................................
3.5. Vendor Lock-In:....................................................................................................................................
3.6. Building a private cloud:.......................................................................................................................
3.7. Data portability:.....................................................................................................................................
6
3.8. Transparency of service provider:.........................................................................................................
4. Assess the most common security issues in cloud environments............................................................
4.1. Ten SaaS Cloud Security Issues:...........................................................................................................
4.2.Visibilyty And Control Over Access:....................................................................................................
4.3. Data Security:........................................................................................................................................
4.4. Five Private Cloud Security Issues:.......................................................................................................
4.5. Basic Security Risk Considerations:.....................................................................................................
4. 6. Data Security Considerations...............................................................................................................
References....................................................................................................................................................
7
Table of Figures
Figure 1: Create a new Heroku account.......................................................................................................
Figure 2: Login to Heroku............................................................................................................................
Figure 3: Login successfully to Heroku.......................................................................................................
Figure 4: Step 1 of create a new Heroku application...................................................................................
Figure 5: Step 2 of create a new Heroku application...................................................................................
Figure 6: Create successfully a new Heroku application............................................................................
Figure 7: Running successfully a new Heroku application.........................................................................
Figure 8: The overview tab..........................................................................................................................
Figure 9: The resource tab...........................................................................................................................
Figure 10: Step 1 of connecting app to database add- on.............................................................................
Figure 11: Step 2..........................................................................................................................................
Figure 12: Step 3 of connecting app to database add- on.............................................................................
Figure 13: Step 4 of connecting app to database add- on.............................................................................
Figure 14: Step 5 of connecting app to database add- on.............................................................................
Figure 15: Connect successfully app to a database......................................................................................
Figure 16: Step 1 of connecting Heroku to the working directory..............................................................
Figure 17: Step 2 connecting Heroku to the working directory...................................................................
Figure 18: Step 3 of connecting Heroku to the working directory...............................................................
Figure 19: Step 4 of connecting Heroku to the working directory...............................................................
Figure 20: Connecting Heroku successfully to the working directory.........................................................
Figure 21: Step 1 of Creating and login a GitHub account..........................................................................
Figure 22: Step 2 of Creating and login a GitHub account..........................................................................
Figure 23: Step 3 of Creating and login a GitHub account..........................................................................
Figure 24: Step 4 of Creating and login a GitHub account..........................................................................
Figure 25: Step 5 of Creating and login a GitHub account..........................................................................
Figure 26: Step 6 of Creating and login a GitHub account..........................................................................
Figure 27: Creating successfully a GitHub account:....................................................................................
Figure 28: Login to the GitHub account......................................................................................................
Figure 29: Login successfully to a GitHub account.....................................................................................
Figure 30: Step 1 of Creating new repository on GitHub............................................................................
Figure 31: Create successfully a GitHub account........................................................................................
Figure 32: Step 1 of Clone a repository.......................................................................................................
Figure 33: Step 2 of Clone a repository.......................................................................................................
Figure 34: Clone successfully a repository..................................................................................................
Figure 35: Clone successfully a repository..................................................................................................
Figure 36: Step 1 of Pulling all data from working directory to a GitHub repository................................
8
Figure 37: Step 2 of Pulling all data from working directory to a GitHub repository................................
Figure 38: Step 3 of Pulling all data from working directory to a GitHub repository................................
Figure 39: Pull successfully to a GitHub repository...................................................................................
Figure 40: Changing information in local account.......................................................................................
Figure 41: Step 1 of Creating a server on pgAdmin.....................................................................................
Figure 42: Step 2 Creating a server on pgAdmin.........................................................................................
Figure 43: Step 3 of Creating a server on pgAdmin.....................................................................................
Figure 44: Connecting Heroku to GitHub....................................................................................................
9
1.5. A guide (step by step): how to deploy (put the website) to Heroku and connect to
PostgreSQL:
1.5.1. Create and login a new Heroku account:
Create a new Heroku account: The Figure 1 show the register page of the Heroku that
allows user to register a new account by full filled information then clicks on the
“Create free account” button.
10
Figure 1: Create a new Heroku account.
11
Login to Heroku: The account that have successfully register that can login into the
Heroku in the login page in the Figure 2
12
Figure 3: Login successfully to Heroku
1.5.2. Working with Heroku:
1.5.2.1. Create a new Heroku application:
Step 1: Clicks on the “New” button then clicks on the “Create new app” to go to the
Heroku” create New App” interface.
13
Figure 5: Step 2 of create a new Heroku application
Create successfully a new Heroku application: This interface is displayed after user
successfully create a new Heroku app.
14
Figure 7: Running successfully a new Heroku application
1.5.2.2. The overview tab:
This tab will show all the Heroku application detail include overview, resource, deploy, metrics,
activity, access, and setting
15
Figure 9: The resource tab
1.5.2.4. Connecting app to database add- on:
Step 1: Clicks on the find more add-on button to go the add-on page to choose the
resource for the application.
16
Step 2: In this page, user can choose the add-on resource which is necessary for the
application in this case is Heroku Postgres.
17
Figure 13: Step 4 of connecting app to database add- on
Step 5: After choose the Heroku, user clicks on the submit button to finish connecting
app to database add- on.
18
Successfully connect app to a database: The Heroku has connect successfully to the
connecting app to database add- on
19
Step 2: User clicks on search button and to find and choose the necessary repository in
GitHub and connects it.
20
Figure 18: Step 3 of connecting Heroku to the working directory
Step 4: clicks on Deploy Branch button to deploy.
21
2. Implement a cloud platform using open-source tools.
22
Step 2: User must fill all the information and click on the Create account button to create
account
23
Figure 23: Step 4 of Creating and login a GitHub account
Step 5: Choose the major work of GitHub you are needing.
24
Figure 25: Step 6 of Creating and login a GitHub account
Create successfully a GitHub account:
25
Login to the GitHub account: In this page, user can login with the registered account with
valid username and password.
26
2.3. Working with GitHub:
2.3.1. Create new repository on GitHub:
Step 1: fills the name of repository and clicks onn the create button.
27
2.3.2. Clone a repository:
Step 1: Pressing button CRTL+O to open a clone interface
28
Step 2: User choose the necessary repository to clone.
29
After clone successfully, there will automatically create a folder in the local storage with its
name is the repository name that user have clone.
30
Figure 35: Step 1 of Pulling all data from working directory to a GitHub repository
Step 2: User enters the description and click Commit
31
Figure 36: Step 2 of Pulling all data from working directory to a GitHub repository
Step 3: after commit, user have to Publish its to GitHub by clicking on the publish
button.
32
Figure 37: Step 3 of Pulling all data from working directory to a GitHub repository
Pull successfully to a GitHub repository: All file go to the GitHit repository.
33
Figure 38: Pull successfully to a GitHub repository
2.3.8. Changing information in local account:
If there is any changes, GitHub desktop will notice the user.
34
Figure 39: Changing information in local account
2.3.9. Creating a server on pgAdmin:
Step 1: enter the password of the pgAdmin.
35
Step 3: Enters the database name Correctly full- fill all the information form the database
resources information in the Heroku application and click on save button to create a server.
36
3. most common problems which arise in a Cloud Computing platform and discuss appropriate
solutions to these problems:
Cloud computing has now emerged as one of the best practices for companies looking to renovate
and enhance their IT infrastructure. However, there are some issues and problems associated with
cloud computing. It is very convenient for everyone to adapt to new technology, but it is also wise
to recognize some of the risks associated with this technology, in order to avoid the possibility of
problems in future.
While cloud computing is a key strength for some businesses, cloud computing also has some
problems. And in some rare cases, this can also cause some serious problems. Although cloud
computing is gaining a lot of popularity, it still suffers from some disadvantageous challenges as
follows:
3.1. Security issues:
Overview: Regarding the security concern of cloud technology, the security risk of cloud
computing has become a top concern because once data is exposed or stolen, it will lead to
an extremely dangerous threat. serious for a company or a business. Mysterious threats like
website hacks and virus attacks are the biggest problems of cloud data security.
Solution: Security has indeed been a primary, and valid, concern from the start of cloud
computing technology: you are unable to see the exact location where your data is stored or
being processed. This increases the cloud computing risks that can arise during the
implementation or management of the cloud. Headlines highlighting data breaches,
compromised credentials, and broken authentication, hacked interfaces and APIs, account
hijacking haven’t helped alleviate concerns. All of this makes trusting sensitive and
proprietary data to a third party hard to stomach for some and, indeed, highlighting the
challenges of cloud computing. Luckily as cloud providers and users, mature security
capabilities are constantly improving. To ensure your organization’s privacy and security is
intact, verify the SaaS provider has secure user identity management, authentication, and
access control mechanisms in place. Also, check which database privacy and security laws
they are subject to (Durcevic, 2019)
3.2. Cloud Cost Management:
Overview: Companies make several mistakes that can increase their expenses. Sometimes, IT
professionals like developers turn on a cloud instance implied to be utilized for some time and
forget to turn it off again. And some companies find themselves hindered by the hidden cloud
costing packages that provide numerous discounts that they might not be using.
Solution: Using cloud spending management challenges, several tech solutions can help
organizations. For instance, automation, cloud spending management solutions, serverless
services, containers, autoscaling features, and numerous management tools provided by the
cloud vendors may help lower the possibility of the issue. (Solanki, 2021)
37
3.3. Lack of resources/expertise:
Overview: The shortage of resources and expertise is one of the challenges facing the cloud
migration this year. Although many IT staff are undertaking various initiatives to enhance
their expertise in the anticipated future of cloud computing, employers are still finding it
difficult to find employees with the right skills. expertise they require.
Solution: Organizations are placing more and more workloads in the cloud as cloud
technology continues to evolve rapidly. Due to these factors, organizations are having a hard
time keeping up with the tools. In addition, the need for expertise continues to grow. These
challenges can be mitigated through additional training of IT and development staff
(Durcevic, 2019)
SME (Small to Medium) organizations may find it very expensive to add cloud professionals to
their IT team. Fortunately, many of the common tasks performed by these professionals can be
automated. For this goal, companies are turning to DevOps tools, like Chef and Puppet, to
perform tasks like monitoring resource usage patterns and automated backups at defined
intervals. estimate. These tools also help optimize the cloud for cost, administration, and
security. (Durcevic, 2019)
3.4. Compliance:
An overview: Compliance is also one of the challenges faced by cloud computing in 2021.
For everyone using cloud storage or backup services, this is a problem. Whenever an
organization transfers data from its internal storage to the cloud, it experiences compliance
with the laws and regulations of the industry.
Solution: An interesting law aspect of General Data Protection Regulation (GDPR) is that it
will expedite compliance in the future. Many organizations require employing a data
protection professional who can anticipate data security and privacy according to the needs
of the law.
Considering these professionals are aware of the compliance needs of the organizations they are
employed, concentrating on the duties for compliance will help organizations fulfill every legal
responsibility.
(Solanki, 2021)
38
As per Gartner’s Cloud Adoption Statistics 2021, the rising power of the hyper-scale IaaS
providers makes both the chances and challenges for some marketing participants and end-
users. Although a few of them allow cost advantages and efficacy, companies required to be
more alert regarding the IaaS providers possibly acquiring unwanted impact over the clients
and the market.
Regarding the multi-cloud acceptance trends, some companies will highly demand an easier
way to transfer apps, workloads, and data across the cloud IaaS providers providing with no
penalty (Solanki, 2021)
As this article stated: the cloud software layer has to grab an IP address, set up a virtual local
area network (VLAN), put the server in the load balancing queue, put the server in the firewall
rule set for the IP address, load the correct version of RHEL, patch the server software when
needed and place the server into the nightly backup queue.
(Durcevic, 2019)
39
3.8. Transparency of service provider:
An overview: For uninterrupted services and proper working it is necessary that you
acquire a vendor services with proper infrastructural and technical expertise. An authorized
vendor who can meet the security standards set by your company’s internal policies and
government agencies. While selecting the service provider you must carefully read the
service level agreement and understand their policies and terms and provision of
compensation in case of any outage or lock in clauses (Pedamkar, 2021)
Solution: organizations have some demanding work ahead, especially since cloud adoption
is becoming a business standard that will grow exponentially. The cloud is not just an idea
to be implemented overnight, but a strategic approach, detailed management, and the
involvement of experts can help reduce risks, costs, and potential errors. hidden during
execution. The future of the cloud lies in the introduction of industry standards that will
help solve regulatory, regulatory, and technological issues (Durcevic, 2019)
Moving to the cloud isn't just a trend- it's becoming a requirement for any business enterprise trying to
build more team collaboration, improve productivity, and enhance the guest experience. row. But the
move to the cloud brings cutting-edge capabilities for unmistakable human threats, attacks, and breaches
from an additional mobile workforce. Security issues in cloud computing are similar to those you might
encounter with on-premises and community computing. However, to save you and fix cloud safety issues,
they must be controlled differently.
SaaS cloud security issues are naturally centered around data and access because most shared security
responsibility models leave those two as the sole responsibility for SaaS customers. It is every
organization’s responsibility to understand what data they put in the cloud, who can access it, and what
level of protection they (and the cloud provider) have applied.
It is also important to consider the role of the SaaS provider as a potential access point to the
organization’s data and processes. Developments such as the rise of XcodeGhost and GoldenEye
ransomware emphasize that attackers recognize the value of software and cloud providers as a vector to
attack larger assets. As a result, attackers have been increasing their focus on this potential vulnerability.
To protect your organization and its data, make sure you scrutinize your cloud provider’s security
programs. Set the expectation to have predictable third-party auditing with shared reports, and insist on
breach reporting terms to complement technology solutions
(mcaffe, 2021)
40
Cloud applications being provisioned outside of IT visibility (e.g., shadow IT)
Lack of staff with the skills to manage security for cloud applications
Inability to prevent malicious insider theft or misuse of data
Advanced threats and attacks against the cloud application provider
Inability to assess the security of the cloud application provider’s operations
Inability to maintain regulatory compliance
4.2.Visibilyty And Control Over Access:
Adopting a zero-trust security architecture is one of the most impactful ways to manage users and
safeguard data in the cloud.
Zero trust security is exactly what it sounds like-no user is automatically trusted. Everyone must
provide verification of who they are before gaining access to resources and data stored in the
cloud app.
Two common examples of identity-based zero trust security approaches are Single SignOn (SSO)
and Multi-factor Authentication (MFA). Single SignOn verifies users through a single name and
password combination. Multi-factor Authentication combines two (or more) unique credentials,
such as requiring users to enter a password and a security token. Most reputable cloud
applications provide both of these authentication features natively, and simply require your admin
to activate either or both for your team.
Many companies use Single SignOn or Multi-factor Authentication as the first line of defense to
keep unauthorized users out of systems that hold sensitive data. Both are easy to use and set up in
popular cloud apps, and all IT security experts strongly encourage the use of both
(managedmethod, 2019)
43
+ Integrity: The integrity of data refers to the confidence that the data stored in the
cloud is not altered in any way by unauthorized parties when it's being retrieved, i.e.
you get out what you put in. To ensure this, CSPs must make sure that no third party
has access to data in transit or data in storage. Only authorized CSCs should be able
to change their data.
+ Availability: This property ensures that the CSC has access to their data, and are
not denied access erroneously or due to malicious attacks by any entity. Attacks like
denial-of-service are typically used to deny availability of data .
Data Stages: The flow of data through a cloud goes through various distinct stages, with
each stage requiring one or more of the previous properties to be maintained. These stages
are as follows:
Data-in-transit: This is when data is in the process of being transmitted either to the cloud
infrastructure or to the computing device used by the CSC. Here, data is most at risk of
being intercepted, hence violating confidentiality. Encryption is generally used here to
prevent this, along with other methods we shall detail later.
Data-at-rest: This is when data has been stored in the cloud infrastructure. The main issue
with this stage for the CSC is their loss of control over the data. The onus of defending
against attacks at this stage hence fall on the CSP. They have to ensure that all 4 of the data
security properties outlined are upheld at this stage.
Data-in-use: This is when data is being processed into information. Here, the issues might
lie with the corruption of data while it is being processed. In order to prevent this the
integrity of data going into a process must be ensured using any one of the applicable
methods we will discuss later In addition to these three stages, the data left out in case of
data transfer or data removal also needs to be considered, since it can cause severe security
issues in the case of public cloud offerings since a CSC may end up gaining access to
sections of data not properly deleted from a prior CSC.
(Latif, 2014)
44
References
Dahbur, K. M., 2011. "A Survey of Risks, Threats and Vulnerabilities in Cloud. [Online]
Available at: https://jisajournal.springeropen.com/articles/10.1186/1869-0238-4-5
45
46