Security in The Cloud and The Shared Security ModelUpdated
Security in The Cloud and The Shared Security ModelUpdated
security model
Submitted:- Shubh Agarwal(QID-22030295)
By Manish Raj Pandey(QID-22030266)
Submitted To:-
Mrs.Madhulika Mittal
Security in the Cloud &
the Shared Security
Model
Welcome to this exploration of cloud security. Today, we'll dive into the
fundamental concepts of cloud security and explore the shared security
model that governs responsibility between cloud providers and customers.
Introduction to Cloud Computing
Shared Resources Pay-as-you-go
Cloud computing offers on-demand access to computing Cloud services follow a pay-as-you-go model, where users
resources like servers, storage, and software over the internet, pay only for the resources they consume, eliminating upfront
enabling scalability and flexibility. This model leverages capital expenditure and ensuring cost-effective solutions.
shared resources, reducing costs and increasing efficiency for This makes cloud computing accessible to businesses of all
users. sizes.
Defining the Shared
Security Model
Shared Responsibility Distinct Roles
The shared security model Cloud providers are responsible
underscores the collaborative for securing the underlying
nature of cloud security, where infrastructure, while customers
both cloud providers and are responsible for securing
customers share responsibility data, applications, and user
for securing the cloud identities within their cloud
environment. environment.
Cloud Provider
Responsibilities
Data in Transit
2 Encrypting data transmitted over the network using protocols like HTTPS or TLS
to secure communication.
Key Management
Securely managing encryption keys, including their
3
generation, storage, and rotation, to protect data from
unauthorized decryption.
Threat Monitoring and
Incident Response
Threat Monitoring
Continuous monitoring of security events, logs, and system
activities to detect potential threats and security breaches.
Incident Response
Having a plan to respond to security incidents, including steps for
containment, remediation, and recovery.
Security Automation
Automating security tasks like vulnerability scanning, patch
management, and incident response to improve efficiency and
reduce the risk of human error.
Compliance and Regulatory Considerations
1 2 3
Regulations Audits Reporting
Adhere to relevant regulations (HIPAA, Regular security audits (internal and Maintain detailed records of security
GDPR, PCI DSS). Non-compliance leads external) identify vulnerabilities and controls and compliance activities for
to penalties and reputational harm. improve your security posture. auditable trails.
Best Practices for Securing the Cloud
Strengthen cloud security by adopting a shared responsibility model, implementing strong IAM practices, and employing
comprehensive data encryption. Proactive threat monitoring, regular security assessments, and swift incident response are vital.
Maintain detailed compliance records to meet regulatory standards.
Conclusion
As we've discussed, securing the cloud requires a shared responsibility
between the cloud provider and the customer. By implementing strong
identity and access management, comprehensive data encryption,
proactive threat monitoring, and robust incident response, organizations
can effectively mitigate security risks in the cloud.
THANK YOU