0% found this document useful (0 votes)
25 views15 pages

Security in The Cloud and The Shared Security ModelUpdated

Uploaded by

Shubh Agarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views15 pages

Security in The Cloud and The Shared Security ModelUpdated

Uploaded by

Shubh Agarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Topic :- Security in the cloud and the shared

security model
Submitted:- Shubh Agarwal(QID-22030295)
By Manish Raj Pandey(QID-22030266)

Submitted To:-
Mrs.Madhulika Mittal
Security in the Cloud &
the Shared Security
Model
Welcome to this exploration of cloud security. Today, we'll dive into the
fundamental concepts of cloud security and explore the shared security
model that governs responsibility between cloud providers and customers.
Introduction to Cloud Computing
Shared Resources Pay-as-you-go

Cloud computing offers on-demand access to computing Cloud services follow a pay-as-you-go model, where users
resources like servers, storage, and software over the internet, pay only for the resources they consume, eliminating upfront
enabling scalability and flexibility. This model leverages capital expenditure and ensuring cost-effective solutions.
shared resources, reducing costs and increasing efficiency for This makes cloud computing accessible to businesses of all
users. sizes.
Defining the Shared
Security Model
Shared Responsibility Distinct Roles
The shared security model Cloud providers are responsible
underscores the collaborative for securing the underlying
nature of cloud security, where infrastructure, while customers
both cloud providers and are responsible for securing
customers share responsibility data, applications, and user
for securing the cloud identities within their cloud
environment. environment.
Cloud Provider
Responsibilities

Physical Security Logical Security


Secure data centers with 24/7 Implement MFA, RBAC, data
monitoring, access control, and encryption, and regular security audits.
disaster recovery.

Network Security Monitoring and


Secure network connectivity using
Maintenance
firewalls, IDS/IPS, VPNs, and Continuous monitoring, vulnerability
penetration testing. scanning, automated patching, and
incident response plans.
Customer Responsibilities
Data Security Application Security
• Encrypt data at rest and in • Use secure coding practices.
transit. • Conduct regular vulnerability
• Use RBAC for access control. assessments.
• Manage the data lifecycle. • Deploy WAFs.

Identity and Access Threat Management


Management (IAM)
• Implement a SIEM system.
• Use strong authentication • Establish incident response
(MFA). plans.
• Implement least privilege • Conduct security awareness
access. training.
• Regularly review user access.
Identity and Access
Management in the Cloud
1 Multi-factor authentication (MFA) provides an additional layer
of security by requiring users to provide multiple forms of
authentication, such as a password and a one-time code.

2 Least privilege access restricts user permissions to only the


resources they need to perform their job duties, minimizing
the impact of potential security breaches.

3 Regularly review and update user access privileges to ensure


they remain aligned with current roles and responsibilities.
Remove access for inactive users or those who have changed
roles.
Encryption and Key Management
Data at Rest
1 Encrypting data stored on servers, databases, and other storage devices to protect it from unauthorized
access.

Data in Transit
2 Encrypting data transmitted over the network using protocols like HTTPS or TLS
to secure communication.

Key Management
Securely managing encryption keys, including their
3
generation, storage, and rotation, to protect data from
unauthorized decryption.
Threat Monitoring and
Incident Response
Threat Monitoring
Continuous monitoring of security events, logs, and system
activities to detect potential threats and security breaches.

Incident Response
Having a plan to respond to security incidents, including steps for
containment, remediation, and recovery.

Security Automation
Automating security tasks like vulnerability scanning, patch
management, and incident response to improve efficiency and
reduce the risk of human error.
Compliance and Regulatory Considerations

1 2 3
Regulations Audits Reporting
Adhere to relevant regulations (HIPAA, Regular security audits (internal and Maintain detailed records of security
GDPR, PCI DSS). Non-compliance leads external) identify vulnerabilities and controls and compliance activities for
to penalties and reputational harm. improve your security posture. auditable trails.
Best Practices for Securing the Cloud

Strengthen cloud security by adopting a shared responsibility model, implementing strong IAM practices, and employing
comprehensive data encryption. Proactive threat monitoring, regular security assessments, and swift incident response are vital.
Maintain detailed compliance records to meet regulatory standards.
Conclusion
As we've discussed, securing the cloud requires a shared responsibility
between the cloud provider and the customer. By implementing strong
identity and access management, comprehensive data encryption,
proactive threat monitoring, and robust incident response, organizations
can effectively mitigate security risks in the cloud.
THANK YOU

You might also like