Cloud Security
Cloud Security
● Introduction:-
Cloud computing provides the capability to use computing and storage resources
on a metered basis and reduce the investments in an organization’s computing
infrastructure. The spawning and deletion of virtual machines running on physical
hardware and being controlled by hypervisors is a cost-efficient and flexible
computing paradigm. In addition, the integration and widespread availability of
large amounts of “sanitized" information such as health care records can be of
tremendous benefit to researchers and practitioners. However, as with any
technology, the full potential of the cloud cannot be achieved without
understanding its capabilities, vulnerabilities, advantages, and trade-offs. This text
provides insight into these areas and describes methods of achieving the maximum
benefit from cloud computation with minimal risk.
1
incompatible with the cloud model. As we see the trend of cloud computing
model advancement in the last decade and we explore the festival view that
on-demand access to almost elastic computing and storage available to
consumers and the inherent property of distribution of data actively, those
are providing the security as a defining factor. Such security properties bring
important potential advantages for data that could attract interested
customers in infrastructure cloud computing models in different domains of
application, so the infrastructure cloud computing can be adopted as a
business model. Thus, it is possible to achieve cloud computing data security
by services that users cannot get satisfaction from.
Cloud computing is a sophisticated, benefit-based computing model. Here, the
traditional network and information technology is provided as a service over the
internet where consumers do not require technical infrastructure building, and
computing resources are maintained in a remote data center. This computing model
basically works on the idea of virtualization technology, on-demand services that
can be accessed globally over the internet, and are provided by both IAAS
(Infrastructure as a Service), PAAS (Platform as a Service), and SAAS (Software
as a Service). There are many advantages of a cloud computing model over the
traditional computing model. It provides infinite computing storage and processing
power at a lower cost to the consumer; services are charged metered rates, so users
only pay for services used. Furthermore, cloud computing services can easily add
new capabilities or services, which obviate the need to install hardware, software,
and spend the working time of technical personnel to deploy and maintain new
components when they require. Due to these advantages, they are largely adopted
by small to large-scale enterprises and vendors.
● Historical background on the security of the
Companions:-
Some accounts trace the birth of the term to 2006, when large companies such
as Google and Amazon began using “cloud computing” to describe the new
paradigm in which people are increasingly accessing software, computer
power, and files over the Web instead of on their desktops.
2
But Technology Review tracked the coinage of the term back a decade earlier,
to late 1996, and to an office park outside Houston. At the time, Netscape’s
Web browser was the technology to be excited about and the Yankees were
playing Atlanta in the World Series. Inside the offices of Compaq Computer, a
small group of technology executives was plotting the future of the Internet
business and calling it “cloud computing.”
Their vision was detailed and prescient. Not only would all business software
move to the Web, but what they termed “cloud computing-enabled
applications” like consumer file storage would become common. For two men
in the room, a Compaq marketing executive named George Favaloro and a
young technologist named Sean O’Sullivan, cloud computing would have
dramatically different outcomes. For Compaq, it was the start of a
$2-billion-a-year business selling servers to Internet providers. For
O’Sullivan’s startup venture, it was a step toward disenchantment and
insolvency.
3
In their plans, the duo predicted technology trends that would take more than a
decade to unfold. Copies of NetCentrics business plan contain an imaginary bill
for “the total e-purchases” of one “George Favaloro,” including $18.50 for 37
minutes of video conferencing and $4.95 for 253 megabytes of Internet storage
(as well as $3.95 to view a Mike Tyson fight). Today, file storage and video are
among the most used cloud-based applications, according to consultancy CDW.
Back then, such services didn’t exist. NetCentrics software platform was meant
to allow ISPs to implement and bill for dozens, and ultimately thousands, of
“cloud computing-enabled applications,” according to the plan.
Favaloro believes he coined the term. From a storage unit, he dug out a paper
copy of a 50-page internal Compaq analysis titled “Internet Solutions Division
Strategy for Cloud Computing” dated November 14, 1996. The document
accurately predicts that enterprise software would give way to Web-enabled
services, and that in the future, “application software is no longer a feature of
the hardware—but of the Internet.”
O’Sullivan thinks it could have been his idea—after all, why else would he
later try to trademark it? He was also a constant presence at Compaq’s Texas
headquarters at the time. O’Sullivan created a daily planner, dated October 29,
1996, in which he had jotted down the phrase “Cloud Computing: The Cloud
4
has no Borders” following a meeting with Favaloro that day. That handwritten
note and the Compaq business plan, separated by two weeks, are the earliest
documented references to the phrase “cloud computing” that Technology
Review was able to locate.
“There are only two people who could have come up with the term: me, at
NetCentric, or George Favaloro, at Compaq … or both of us together,
brainstorming,” says O’Sullivan.
Both agree that “cloud computing” was born as a marketing term. At the time,
telecom networks were already referred to as the cloud; in engineering
drawings, a cloud represented the network. What they were hunting for was a
slogan to link the fast-developing Internet opportunity to businesses Compaq
knew about. “Computing was bedrock for Compaq, but now this messy cloud
was happening,” says Favaloro. “And we needed a handle to bring those things
together.”
Their new marketing term didn’t catch fire, however—and it’s possible others
independently coined the term at a later date. Consider the draft version of a
January 1997 Compaq press release, announcing its investment in NetCentric,
which described the deal as part of “a strategic initiative to provide ‘Cloud
Computing’ to businesses.” That phrase was destined to be ages ahead of its
time, had not Compaq’s internal PR team objected and changed it to “Internet
computing” in the final version of the release.
5
In fact, Compaq eventually dropped the term entirely, along with its plans for
Internet software. That didn’t matter to Favaloro. He’d managed to point
Compaq (which later merged with HP) toward what became a huge business
selling servers to early Internet providers and Web-page hosters, like UUNet.
“It’s ridiculous now, but the big realization we had was that there was going to
be an explosion of people using servers not on their premises,” says Favaloro.
“I went from being a heretic inside Compaq to being treated like a prophet.”
6
by Antonio Regalado
Share story on linkedin
Share story on twitter
Share story on facebook
7
Accessibility: Cloud computing enables users to access educational
materials and services anytime, anywhere, from any device, as long as
they have an Internet connection. This increases the flexibility and
comfort of learning, especially for distance or disadvantaged learners.
8
A school can use cloud-based solutions such as Microsoft 365,
Google Workspace or Dropbox to manage and simplify its administrative
and operational tasks, such as email, calendaring, file sharing and
backup.
The National Center for Standards and Technology defines “the cloud”
as: “a model for providing convenient and permanent access at any time to
the network, to share a large group of computing resources that can be
deployed and provided with minimal effort or interaction with the service
provider.”
9
*What are the different types of cloud computing services:-
There are three main types of clouds: public, private, and mixed:-
Public Clouds: Public clouds are owned and operated by third-party service
providers and available to the general public. Examples of public cloud
providers include Amazon Web Services (AWS), Microsoft Azure, and
Google Cloud Platform.
10
effective security system, ways of administering identities or accesses should
be well specified. Security implementation generally enhances control based on
MAC, RBAC, or ACL. Technically, hardware and software protections of
traditional responsibilities become the liability of cloud service suppliers in a
cloud computing environment. Therefore, a considerable rise in
domain-dependent risk makes sensitive demands of cloud security
management. Sensitive information should be shared with the proper cluster to
prevent business as well as financial loss.
•Theoretical Background Cloud Security
Organizations have been seeking environments offering potentiality against the
strain of stiff budgets as well as meeting demands of rapid business changes.
Cloud computing has received vital consideration due to its capability of
offering efficient computing services in a flexible fashion. Traditionally,
Information Technology (IT) services are supplied by the cloud using different
models such as Software as a Service (SaaS), Platform as a Service (PaaS), and
Infrastructure as a Service (IaaS).
•introduction to Cloud Computing:-
•Definition and Characteristics:-
Characteristic 1: On-demand self-service. A consumer can unilaterally
provision computing capabilities, such as server time and network storage, as
needed automatically without requiring human interaction with each service
provider.
Characteristic 2: Broad network access. Capabilities are available over the
network and accessed through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile phones, tablets,
laptops, and workstations).
Characteristic 3: Resource pooling. The provider's computing resources are
pooled to serve multiple consumers using a multi-tenant model, with different
physical and virtual resources dynamically assigned and reassigned according
to consumer demand.
Cloud computing is the product of the evolution and convergence of several
technologies. According to the U.S. National Institute of Standards and
Technology (NIST), cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of configurable computing
11
resources (e.g., networks, servers, storage, applications, and services) that can
be rapidly provisioned and released with minimal management effort or service
provider interaction. This model promotes a number of common characteristics
compared to other computing approaches. Specifically, cloud computing
exhibits five essential characteristics, three service models, and four
deployment models.
•Contextual background:-
12
vulnerabilities and exposures (CVEs). These provide attackers with a broad attack
surface from which to devise various attack paths to critical assets. This is where
context comes into play. Context helps organizations paint a complete picture of
potential risks and prioritize the remediation of the most critical threats.
Context helps reduce false positive security alerts, thus lowering alert fatigue
among teams. When security tools are equipped with contextual information about
potential threats, they are able to analyze that contextual data to help prioritize
risks. To do so, they should consider three crucial factors: the severity of the threat
if a breach were to occur, the accessibility of the underlying assets to an attacker
and the potential impact on the business. Once the identified risks have been
prioritized, teams can focus on resolving the most important threats first for faster
remediation.
For any cloud security efforts to bear fruit, risks must be viewed in context with the
intelligence required to prioritize threats based on severity, visualize potential
attacks from an attacker’s perspective, and identify, analyze and score multiple
exploitable attack paths to valuable cloud assets. Context-based security
intelligence also provides supplemental information to improve security decisions
and reduce alert fatigue.
Organizations must invest in a reliable cloud security platform that uses a unified
data model to gather and correlate contextual data on each asset, including details
on potential risks in the workload and configuration of the cloud as well as
information on external and internal cloud connectivity.
Orca Security does exactly that (among other things) by scanning a real-world
cloud deployment for potential vulnerabilities, visualizing attackers’ potential
paths and prioritizing risk remediation. Orca’s CSPM is enhanced with
context-aware security data to aid in the security of cloud native, Kubernetes and
microservices in a multi-cloud environment.
13
Contextual background about the industry, company,or case
study in cloud security:-
into a real-world case study that highlights the importance of cloud security.
(Accenture), a global consulting and professional services company, embarked on a
cloud journey six years ago. Their move to the cloud necessitated a robust security
strategy. Here's how they approached it:
14
CASB solution for IT Industry
Introduction:-
Based in Hong Kong, a leading IT company that provides Primary Source Verification
both public and private sector, had deployed G Suite and was very satisfied with the
same. Shortly after this transition, its IT team learnt that G Suite’s advantage of free
and easy data access to its users may pose a threat to the company’s data security,
hence having a close vigilance and control over data access was vital for the company.
Challenges:-
G Suite’s rollout throughout the company led to a faster turnaround time, better
team collaboration and efficient process flow. However, the IT team soon started
facing issues related to data governance; like the inability to gauge unrestricted
security controls was raising concerns of data leakage, data theft and data loss and
required immediate action for ensuring none of these negative events occurred.
15
This organization was also looking for a way to restrict their users from accessing
their personal gMail in order to ensure no corporate data is transferred for personal
use. In addition, this enterprise also wanted to align their company’s theme, culture
and practices, as well as improve user experience, and promote employer branding
Solution:-
While in search for a solution, the IT team of the company took several demos,
from the most recognized CASB vendors to the not so renowned ones, to zero in
on a solution that would not just suffice their need but also provide one single
console to handle all its security needs and be there to assist them at any hour of
the day.
After a demo and a few trials of CloudCodes for G Suite, a CASB solution, this
enterprise gave a green light to it. With our tailored to need Access Control
solution, the enterprise could very well monitor, report and control unauthorized
access to its data. With IP restriction, Device restriction and Browser restriction
features of our Access Control solution, they were able to implement just the right
policies to their respective users and OUs (organizational units) as well - all
16
● Whitelist, i.e, selectively authorize pre defined network IPs, ensuring
controlled access to data
Additionally, with our Value Add - Ons, this company could easily brand their
landing and login page, which helped them band together their company objective
and culture, broadcast announcements, and get user agreements accepted - all from
one platform.
Utilizing cloud computing has become more essential than ever as companies look
Along with the convenience and flexibility cloud tech provides comes the need to
secure the cloud, especially for businesses in industries with strict regulations.
Here are some examples of how companies are working with cybersecurity
17
Qlik And Palo Alto Networks Prism
Cloud:-
infrastructure.
As they shifted the majority of their service agents into remote work,
network.
18
“We chose FortiGSLB Cloud to improve the stability of the VPN connections
of all our ‘incredibles’ working from, due to its ease of integration with our
operations at OneLink.
Industry: Technology
Outcomes:
applications
19
Mercedes-AMG And CrowdStrike
Falcon Complete:-
They collect a continuous stream of data from 18,000 channels from their
racing cars, measuring variables from over 300 sensors, and generating 1
20
They selected CrowdStrike’s Falcon Complete Managed Endpoint Security as
very quickly — we must ensure our information systems are an enabler for
performance, not a blocker. But conversely, we also need to ensure they are
Security
Outcomes:
21
Akamai And OneTrust
PreferenceChoice:-
Akami is a provider of edge security, web and mobile performance, and enterprise
Due to the nature of their work, Akamai’s platform processes 250,000 edge servers
protection a priority.
“OneTrust PreferenceChoice is run by our marketing team, and the nice thing
about the tool is we have had to do very little on the legal side,” says Jim Casey,
“That’s a really powerful aspect of the tool — it doesn’t require a team of lawyers
Industry: Technology
22
Cloud Security Product: OneTrust PreferenceChoice and Website Scanning
Outcomes:
“It became very apparent how incredibly difficult it would be for our small
Corix.
23
“Deploying FireEye was more cost-effective than paying for the eight separate,
Cloud security products: FireEye Email Security Cloud Edition, FireEye Helix,
Outcomes:
Cloud security issues have risen dramatically as a lot of life's activities have moved
online as the malicious activities of hackers have begun to highlight many of the
drawbacks of the cloud in the wake of recent events, prompting many IT teams
around the world to take notice. Although cybersecurity threats have risen across
the digital landscape during the outbreak, cloud security concerns are quickly
coming to the fore.
24
• Remote access enterprise systems lack secure setup and security checks due to
unpreparedness for the mandatory transition regarding working from home.
• Social engineering training for end users is still necessary, as user credentials are
stolen via fake emails and other deceptive means.
● research aims:-
25
3.Analysis of current security strategies: Evaluate the efficiency of current
strategies and identify weak points.
26
4.Reduce financial losses: Avoid financial losses resulting from security
breaches and cyber attacks.
These goals and the purpose of the study contribute to enhancing the
security of cloud computing and achieving greater benefit from its
technologies.
1.Data Protection:-
27
2.Identity and Access Management:-
3.Network Security:-
28
4.Compliance and Regulatory Requirements:-
29
- Cloud Monitoring: Implementing comprehensive monitoring
solutions to track user activities, system performance, and security
events across the cloud infrastructure.
7.Vulnerability Management:-
30
- Cloud Provider Responsibilities: The cloud service provider is
responsible for the security and availability of the underlying cloud
infrastructure, such as physical data centers, network, and
virtualization.
31
- Data Retention and Deletion: Establishing policies for the
retention and secure deletion of data to comply with regulatory
requirements and minimize the risk of data breaches.
32
- Continuous Security Monitoring: Implementing continuous
security monitoring and automated remediation processes to address
vulnerabilities
33
- Implement robust access controls and identity management to
prevent unauthorized access.
2.Network Security:-
34
- Patch and update all cloud components, including operating
systems, applications, and third-party libraries, in a timely manner.
35
7.Resilience and Business Continuity:-
- Test and validate the incident response and disaster recovery plans
to ensure their effectiveness.
36
- Continuously review and update the shared responsibility model as
the cloud environment and service offerings evolve.
37
- Leverage Security Information and Event Management (SIEM)
and Cloud Security Posture Management (CSPM) tools to centralize
and analyze security data.
- Assess the security posture and risk profile of all third-party cloud
service providers and integrations.
38
● Research questions about cloud security:-
39
applications run on the remote server and give the user access to storage and
management.
40
9) What are the systems integration companies in cloud
computing?
In cloud computing, systems integration provides the strategy for the complex
process used to design a cloud platform. Integrator allows creating a more precise
hybrid and private cloud network, as integrators have all the knowledge about
setting up the data center.
2.Data encryption:-
- Protect data during transmission and at rest using encryption
techniques.
- Manage encryption keys securely.
3.Security in applications:-
- Secure cloud applications by designing and developing secure
applications.
- Conduct penetration tests and security assessments regularly.
41
4.Incident management and response:-
- Develop security incident response plans.
- Monitor the system to detect threats and respond quickly.
5.Security in infrastructure:-
- Secure cloud infrastructure including servers, networks, and storage.
- Implementing firewalls and intrusion detection systems.
8.Threat management:-
NB:-
These concepts integrate to form a comprehensive cloud security
framework, with each component contributing to enhancing the level
of security and protection in cloud computing environments.
42
1.Data protection: Companies are increasingly relying
on the cloud to store and process sensitive data.
Therefore, it becomes necessary to ensure that this data
is protected from hacks and cyber threats.
NB:-
These reasons make studying cloud security an urgent
necessity for any individual or organization that relies on
cloud technology in its daily operations.
43
● Scope of study in cloud security:-
The scope of study in cloud security includes several main areas, all of
which aim to provide a comprehensive understanding of potential
threats and how to deal with them. Here are some of the basic aspects
covered in this field:-
44
8.Advanced threat management: This includes understanding
complex cyber attacks such as DDoS attacks, malware, and
ransomware, and how to confront them.
NB:-
By studying these areas, cloud security professionals can develop
effective strategies to protect cloud data and applications from
increasing cyber threats.
3.Data encryption:
45
- Basics of encryption: symmetric and asymmetric encryption.
- Data encryption during transmission and storage*.
- Manage encryption keys.
46
-For artificial intelligence and machine learning in cloud
security.
- Cloud security in the Internet of Things (IoT).
- Edge computing and security.
47
2. Incident Management: There are plans and measures to respond to
security incidents in a timely manner.
3. Regular updates: Update systems and applications on a regular basis to
ensure protection from security vulnerabilities.
4. Penetration testing: Conduct periodic tests to simulate potential attacks
and identify vulnerabilities.
5. Data backup and recovery: Ensuring the availability of data backups and
data recovery in the event of a security breach or disaster.
NB:-
48
Vendor Lock-in: Migrating your data and applications between
different cloud providers can be complex and expensive. This can lead
to vendor lock-in, where you're stuck with a particular provider due to
the cost and effort of switching.
● Introduction:-
Cloud computing has revolutionized how we store data and access applications.
However, this convenience comes with security concerns. A thorough
understanding of existing research in cloud security is crucial for anyone looking
to:
● Identify and mitigate security risks: By analyzing past research, you can
gain insights into common cloud security vulnerabilities and the latest
techniques to address them.
● Develop new security solutions: Examining existing literature helps you
identify gaps in knowledge and areas where further research is needed. This
can pave the way for innovative approaches to cloud security.
● Stay up-to-date on the latest trends: The cloud security landscape is
constantly evolving. A literature review helps you stay informed about
emerging threats and defensive strategies.
49
Here's what a typical literature review in cloud security might explore:
● What other literature has said and what the study failed
50
Compliance: Studies have addressed various compliance
requirements that apply to cloud computing, such as HIPAA,
PCI DSS, and SOC 2.
51
Artificial Intelligence and Machine Learning: Many studies
have not fully explored the use of AI and machine learning to
improve cloud computing security and detect and respond to
threats.
knowledge study:-
The importance of cloud security: Cloud computing has become an integral part
of many businesses and organizations, making it an attractive target for hackers
and cybercriminals.
A cloud computing security breach can be very costly, as it can result in data
loss, exposure to financial liability, and damage to a company's reputation.
Key topics in cloud security: Key concepts: cloud computing models, security
engagement responsibilities in the cloud, common risks and threats in the cloud.
Security controls: access and identity control, data encryption, network
protection, incident management and response.
52
Technology solutions: firewalls and VPNs, intrusion detection and prevention
systems (IDS/IPS), cloud threat management tools, backup and recovery solutions.
Best practices: Create a strong cloud security policy, regularly assess risks,
conduct penetration tests, train employees on security awareness, and constantly
monitor the cloud environment.
Notes on the literature review: Many studies and research papers have addressed
different aspects of cloud computing security.
There are some areas that still need more research, such as human impact, supply
chain, dynamic compliance, artificial intelligence and machine learning, and hybrid
and multi-cloud computing.
Additional Resources:
53
54