Cloud Computing Unit-4 Complete Notes 20-09-2024
Cloud Computing Unit-4 Complete Notes 20-09-2024
Physical Security
Physical security implies that the data center the cloud is hosted in should be secure against physical
threats.
Virtual Security
Virtual security (or cybersecurity) involves protecting digital assets, data, and systems
from cyber threats and unauthorized access. It focuses on safeguarding intangible
elements such as software, data, and networks.
1. Network Security:
o Firewalls: Implement network firewalls to filter and control incoming and outgoing
traffic.
o Intrusion Detection and Prevention Systems (IDS/IPS): Monitor network traffic for
suspicious activity and generate alerts when such activity is detected.
2. Endpoint Security:
o Device Management: Ensure that all endpoints are secured, updated, and compliant
with security policies.
3. Data Protection:
o Backup and Recovery: Regularly back up critical data and have a recovery plan in
place to handle data loss or corruption.
4. Access Management:
o Identity and Access Management (IAM): Manage user identities and permissions to
ensure appropriate access levels.
o Multi-Factor Authentication (MFA): Require additional verification steps to
strengthen access controls.
5. Application Security:
o Regular Updates and Patching: Keep software and applications up to date to protect
against known vulnerabilities.
6. Cloud Security:
7. Incident Response:
o Incident Handling Procedures: Develop and test procedures for responding to and
mitigating cyber threats.
Risk Management:
Risk management is the process for evaluating risks, deciding how they are to be controlled, and
monitoring their operation.
Risk management in cloud computing is crucial due to the dynamic nature of cloud environments
and the shared responsibility model between cloud providers and customers. Effective risk
management helps organizations mitigate potential threats and ensure the security, compliance,
and resilience of their cloud-based assets.
Risk Management Overview: Risk management involves identifying, assessing, and addressing
risks to minimize their impact on the organization. In the cloud context, this includes both the
physical infrastructure provided by the cloud vendor and the virtual resources managed by the
customer.
Cloud Providers: Responsible for securing the cloud infrastructure, including physical data
centers, networking hardware, and foundational services.
Customers: Responsible for securing their data, applications, operating systems, and
configurations within the cloud.
1. Risk Identification:
Identify Risks: Detect potential risks that could impact cloud resources, including data
breaches, service outages, compliance violations, and insider threats.
Sources of Risks: Consider risks from cloud service models (IaaS, PaaS, SaaS), third-party
integrations, and operational factors.
2. Risk Assessment:
Risk Analysis: Evaluate the likelihood and impact of identified risks. Use qualitative (e.g.,
high, medium, low) and quantitative (e.g., financial impact) methods to assess risks.
Prioritization: Rank risks based on their potential impact and likelihood to prioritize risk
management efforts.
3. Risk Treatment:
Mitigation: Implement controls to reduce the probability or impact of risks. This includes:
o Insurance: Purchase cyber insurance to cover potential financial losses from security
incidents.
Risk Acceptance: Accept risks that fall within acceptable thresholds or where mitigation
costs outweigh benefits.
Regular Reviews: Periodically review and update risk assessments and management
strategies to address changes in the cloud environment, business needs, and emerging
threats.
Awareness: Ensure that employees are aware of and understand risk management policies
and procedures.
Defense in Depth is a security design pattern that involves implementing multiple layers of security
controls to protect an organization's assets. The principle is that if one layer of security fails,
additional layers will provide continued protection, reducing the risk of a successful attack. In the
context of cloud computing, applying Defense in Depth ensures a comprehensive approach to
security, addressing various potential vulnerabilities and threats.
Honeypots are security tools designed to attract, detect, and analyze malicious activities by
simulating vulnerable systems or applications. They act as decoys to lure attackers, allowing
security professionals to study their methods, techniques, and intentions, which can then be used
to enhance overall security defenses.
Sandboxes are security mechanisms used to isolate untrusted or malicious code or applications to
prevent them from affecting the rest of the system. They create a controlled environment where
software can be executed and tested safely without posing a risk to the underlying system or
network.
VM Isolation refers to the practice of creating separate virtual environments (virtual machines, or
VMs) to ensure that different systems, applications, or workloads do not interfere with each other.
This isolation helps in enhancing security, managing resources, and maintaining system integrity
within a virtualized infrastructure.
Subnet Isolation is a networking strategy used to segment a network into smaller, distinct sub-
networks or subnets. This technique improves network security, management, and performance
by controlling traffic and limiting the scope of potential issues. In cloud computing and traditional
network environments, subnet isolation helps in creating secure and organized network
architectures.
A Common Management Database (CMDB) is a repository that acts as a centralized data source for
storing information about the components of an IT infrastructure and their relationships. It plays a
crucial role in IT Service Management (ITSM) and IT Asset Management (ITAM) by providing a
comprehensive view of the IT environment.
Example: Security Design for a PaaS System The following is an example of the security design for a
PaaS system consisting of a DBMS and an Identity Management server (see Figure 7.1). The scenario
External Network Access refers to the ability for users, systems, or services outside of an
organization's internal network to connect to its resources or services. Managing external network
access is critical for ensuring that external connections are secure and that internal resources are
protected from unauthorized access.
Internal Network Access refers to the permissions and mechanisms that allow users, systems, and
services within an organization’s network to communicate and interact with each other. Properly
managing internal network access is essential for maintaining security, efficiency, and compliance
within the organization.
Server security involves implementing measures and practices to protect servers from threats and
vulnerabilities. Given that servers often host critical applications, databases, and sensitive data,
ensuring their security is vital for safeguarding an organization’s IT infrastructure.
Security Server The diagram also includes a security server to perform security services, including
auditing, monitoring, hosting a security operations center, and security scanning of the cloud
infrastructure.
SSE-CMM stands for Systems Security Engineering Capability Maturity Model. It is a framework
designed to improve the security engineering processes within an organization. The model
provides guidelines and best practices for developing and maintaining secure systems throughout
their lifecycle.
ISO/IEC 27001 and ISO/IEC 27006 are part of the ISO/IEC 27000 family of standards, which focuses
on information security management.
The European Network and Information Security Agency (ENISA) is an agency of the European
Union (EU) that focuses on improving network and information security across the EU. Established
in 2004, ENISA provides expertise and support to EU member states, institutions, and businesses to
enhance their cybersecurity practices and resilience.
The National Institute of Standards and Technology (NIST) is a U.S. federal agency that develops
and promotes measurement standards, guidelines, and best practices for various industries,
including cybersecurity. NIST provides a range of frameworks, standards, and guidelines that help
organizations manage and protect their information and technology assets.
Third-party issues in cybersecurity refer to the risks and challenges associated with engaging
external vendors, partners, and service providers. These issues can significantly impact an
organization's security posture and require careful management to mitigate potential threats. Here’s
an overview of key third-party issues and best practices for addressing them:
Contractual issues in the context of cybersecurity and information security involve the terms and
conditions set forth in agreements with vendors, partners, and service providers. These contracts
are crucial for defining responsibilities, managing risks, and ensuring compliance with legal and
regulatory requirements. Here’s an overview of key contractual issues and best practices for
addressing them:
Data handling issues involve challenges and risks associated with managing, processing, storing,
and securing data. These issues can impact an organization’s security, compliance, and operational
effectiveness. Here’s a breakdown of common data handling issues and potential solutions:
Data piracy refers to the unauthorized access, use, and distribution of data, often for malicious
purposes or profit. It involves various illegal activities related to the theft and exploitation of digital
information. Here’s an overview of data piracy, its implications, and measures to prevent and
mitigate it:
Data location Laws on the handling of data differ from country to country. Therefore, transfer ring
confidential data between countries may be problematic. In a cloud context, the location of the data
centers and backups needs to be known in advance, to ensure that legal problems do not arise.
Secondary use of data refers to the utilization of data for purposes other than those for which it was
originally collected. This can include a range of activities, such as analytics, research, and marketing.
While secondary use can provide valuable insights and benefits, it also raises important
considerations regarding privacy, consent, and data security. Here’s an overview of secondary use of
data:
Security issues in data handling and management involve various threats and vulnerabilities that
can compromise the confidentiality, integrity, and availability of data.
Litigation related issues in data management and security involve legal disputes and challenges
that arise from the handling, protection, and use of data. These issues can significantly impact an
organization’s operations, reputation, and financial stability. Here’s a comprehensive overview of
common litigation-related issues, their implications, and strategies for addressing them:
Selecting a cloud service provider (CSP) involves a thorough evaluation of various factors to ensure
that the provider meets your organization's needs and security requirements. Here’s a
comprehensive guide to help you make an informed decision:
a. Service Needs
Description: Identify the specific services you require (e.g., computing, storage, databases,
networking).
Criteria: Ensure the provider offers the services and features that match your operational
needs.
Criteria: Evaluate the provider’s ability to handle current and future workloads, including
scalability options and performance benchmarks.
Criteria: Verify that the provider complies with relevant regulations (e.g., GDPR, HIPAA) and
holds necessary certifications (e.g., ISO/IEC 27001).
Criteria: Check for regular risk assessments, vulnerability management, and risk mitigation
strategies.
Criteria: Verify the types of encryption used and the provider’s data privacy practices.
Criteria: Look for a well-defined incident response plan, quick response times, and
transparent incident reporting.
a. Regulatory Compliance
Criteria: Confirm that the provider complies with regulations relevant to your industry and
has the necessary certifications.
b. Certification Validity
Criteria: Ensure certifications are up-to-date and applicable to the services provided.
Criteria: Ensure SLAs meet your performance and availability requirements, and understand
the terms for service credits and penalties.
Description: Assess the provider’s track record for uptime and reliability.
Criteria: Ensure the provider has robust backup procedures and disaster recovery plans in
place.
a. Pricing Model
Criteria: Compare pricing based on usage, subscription plans, and any additional costs for
services.
b. Cost Transparency
Criteria: Review the pricing details, including any hidden fees or extra charges.
a. Customer Support
Criteria: Check support channels (e.g., phone, email, chat) and response times.
Criteria: Ensure comprehensive documentation, tutorials, and user resources are available.
Criteria: Evaluate the provider’s support for training and onboarding new users.
a. Industry Reputation
Criteria: Look for customer reviews, case studies, and industry recognition.
a. Pilot Testing
a. Business Stability
Criteria: Review the provider’s financial statements and business continuity plans.
b. Future Roadmap
Criteria: Ensure the provider has a vision for future developments and innovations that
align with your needs.
By carefully evaluating these factors, you can make a well-informed decision when selecting a cloud
service provider, ensuring that they meet your organization's requirements for security,
performance, compliance, and support.
The Cloud Security Alliance (CSA) has a number of frameworks that are useful
for evaluating various aspects of cloud security. A few are described next.
1. The Cloud Controls Matrix (CCM) assists cloud customers in assessing the
controls that exist in cloud (IaaS, SaaS, PaaS) systems, with the objective of
compare the security of cloud services. The method used to accomplish this is
to define a standard set of APIs for measuring the performance and security
The European Network and Information Security Agency (ENISA) has a number
Framework [6] and Cloud Computing Benefits, Risks and Recommendations for
Information Security [3]. These have been discussed in detail earlier in this chap
to develop a security framework for cloud computing. The focus of this work
group is end-to-end cloud security. The approach taken by this group is to lever
framework. This framework can then be used as a basis for compliance and
auditing.