Unit 4 For Students
Unit 4 For Students
• The cloud has changed business as we know it, and has proliferated almost all organizational
structures across every industry. With this popularity have come the options: from infrastructure,
platform, and software as a service platforms, all the way to storage, security, and database
services.
• While organizations have more choices than ever for cloud computing, this only make things more
challenging—there is no standard way to oversee it all. In fact, some businesses that once had
3,000 services under one management umbrella now have more than 10,000!
• This is where having solid, scalable cloud management becomes so important.
• Cloud management is the organized management of cloud computing products and services that
operate in the cloud. It refers to the processes, strategies, policies, and technology used to help
control and maintain public and private cloud, hybrid cloud, or multi-cloud environments.
Cloud Management Tasks :
• Auditing System Backups –
It is required to audit the backups from time to time to ensure restoration of randomly selected files of
different users. This might be done by the organization or by the cloud provider.
• Vendor Lock-In –
The managers should know how to move their data from a server to another in case the organization
decides to switch providers.
• Another way this could be done would be to have a global file system across all machines where a VM could be located. This
removes the need to copy files from one machine to another since all files would be network accessible. Most modern data centers
consolidate their storage requirements using a network-attached storage (NAS) device, in preference to using local disks in
individual servers. NAS has many advantages in this environment, including simple centralized administration, widespread vendor
support, and reliance on fewer spindles leading to a reduced failure rate. A further advantage for migration is that it obviates the
need to migrate disk storage, as the NAS is uniformly accessible from all host machines in the cluster.
NETWORK MIGRATION
• A migrating VM should maintain all open network connections without relying on forwarding
mechanisms on the original host or on support from mobility or redirection mechanisms.
• To enable remote systems to locate and communicate with a VM, each VM must be assigned a
virtual IP address known to other entities.
• This address can be distinct from the IP address of the host machine, where the VM is currently
located.
• Each VM can also have its own distinct virtual MAC address.
• The VMM maintains a mapping of the virtual IP and MAC addresses to their corresponding VMs.
• In general a migrating VM includes all the protocol state (e.g., TCP ), and will carry its IP address
with it.
• If the source and destination machines of the VM migration are typically connected to a single
switched LAN, an unsolicited ARP reply from the migrating host is provided, advertising that the
IP has moved to a new location.
• This solves the open network connection problem by reconfiguring all the peers to send future
packets to the new location.
• Although a few packets that have already been transmitted might be lost, there are no other
problems with this mechanism.
• Alternatively, on a switched network, the migrating OS can keep its original Ethernet MAC
address, relying on the network switch to detect its move to a new port.
WORKFLOW ENGINE FOR CLOUDS
• The term "intercloud" refers to a network of interconnected clouds. This encompasses private,
public, and hybrid clouds, all of which work together to create a seamless data flow.
• A theoretical model for cloud computing services is referred to as the “inter-cloud” or “cloud of
clouds.” combining numerous various separate clouds into a single fluid mass for on-demand
operations. Simply put, the inter-cloud would ensure that a cloud could utilize resources outside of
its range using current agreements with other cloud service providers. There are limits to the
physical resources and the geographic reach of any one cloud.
Need of Inter-Cloud
• The dynamic resource provisioning capability of cloud systems leads to an important goal of
system design which is zero-downtime architecture.
• One physical server generally facilitates or hosts multiple virtual servers. Hence, the physical
server acts as the single point of failure for all of the virtual systems it creates.
• But the dynamic provisioning mechanism immediately replaces any crashing physical system with
a new system instantly and thus the running virtual system gets a new physical host without
halting.
• Figure below demonstrates how live VM migration maintains zero downtime during failure of
physical host.
• Here, the virtual server A1 (VM-A1) was hosted by physical server A1 and two applications were
running on VM-A1.
• When physical server ‘A1’ crashes, VM-A1 is shifted to a new VM with current system status and
all of the applications running in VM-A1 have been migrated to VM-A2 which is hosted by
physical server ‘A2’.
• Thus, the applications remain unaffected by the effects of zero downtime
Demand-Driven method
• This method adds or removes computing instances based on the current utilization level of
the allocated resources.
• The demand-driven method automatically allocates two Xeon processors for the user
application, when the user was using one Xeon processor more than 60 percent of the time
for an extended period.
• In general, when a resource has surpassed a threshold for a certain amount of time, the
scheme increases that resource based on demand.
When a resource is below a threshold for a certain amount of time, that resource could be
decreased accordingly. (Defines a range for CPU utilization say for eg: 30% to 70%. if CPU
utilization below 30% decreases the CPU capacity. If CPU utilization above 70% increases
the CPU capacity)
• Amazon implements such an auto-scale feature in its EC2 platform.
• This method is easy to implement.
• Disadvantage: The scheme does not work out right if the workload changes abruptly.
Event Driven method
• This scheme adds or removes machine instances based on a specific time
event.
• The scheme works better for seasonal or predicted events such as
Christmastime in the West and the Lunar New Year in the East.
• During these events, the number of users grows before the event period and
then decreases during the event period.
• This scheme anticipates peak traffic before it happens.
• The method results in a minimal loss of QoS, if the event is predicted
correctly.
• Otherwise, wasted resources are even greater due to events that do not
follow a fixed pattern.
Popularity-Driven method
• In this method, the Internet searches for popularity of certain
applications and creates the instances by popularity demand.
• (Currently popular applications→ Facebook, Instagram, Twitter)
• The scheme anticipates increased traffic with popularity.
• Again, the scheme has a minimal loss of QoS, if the predicted
popularity is correct.
• Resources may be wasted if traffic does not occur as expected.
Global Exchange of resources
• In order to support a large number of consumers from around the world, cloud
infrastructure providers have established data centers in multiple geographical locations to
provide redundancy and ensure reliability in case of site failures.
• For example, Amazon has data centers in the United States (e.g., one on the East Coast
and another on the West Coast) and Europe.
• However, it is difficult for cloud customers to determine in advance the best location for
hosting their services as they may not know the origin of consumers of their services.
• Also, SaaS providers may not be able to meet the QoS expectations of their service
consumers originating from multiple geographical locations.
• This necessitates building mechanisms for seamless federation of data centers of a cloud
provider or providers supporting dynamic scaling of applications across multiple domains
in order to meet QoS targets of cloud customers. (Creating of VMs at multiple data
centers at multiple places all over the world that satisfies customer QoS)
• Shortcomings.
• 1. It is difficult for cloud customers to determine in advance the best location for
hosting their services as they may not know the origin of consumers of their services.
• 2. SaaS providers may not be able to meet the QoS expectations of their service
consumers originating from multiple geographical locations
• No single cloud infrastructure provider will be able to establish its data centers at all
possible locations throughout the world.
• As a result, cloud application service(SaaS)providers will have difficulty in meeting QoS
expectations for all their consumers.
• This necessitates federation of cloud infrastructure service providers for seamless
provisioning of services across different cloud providers.
• To realize this, the Cloudbus Project at the University of Melbourne has proposed
Inter-Cloud architecture
• By realizing Inter Cloud architectural principles in mechanisms in
their offering:-
• Cloud providers will be able to dynamically expand or resize their
provisioning capability based on sudden spikes in workload demands
by leasing available computational and storage capabilities from other
cloud service providers.
• Operate as part of a market driven resource leasing federation, where
application service providers such as Salesforce.com host their
services based on negotiated SLA contracts driven by competitive
market prices
• Deliver on-demand, reliable, cost-effective, and QoS-aware services
based on virtualization technologies while ensuring high QoS
standards and minimizing service costs.
• Cloud providers will be able to dynamically expand or resize their provisioning
capability based on sudden spikes in workload demands by leasing available
computational and storage capabilities from other cloud service providers; operate
as part of a market-driven resource leasing federation.
• They consist of client brokering and coordinator services that support utility-
driven federation of clouds: application scheduling, resource allocation, and
migration of workloads.
• The Cloud Exchange (CEx) acts as a market maker for bringing together service
producers and consumers. It aggregates the infrastructure demands from
application brokers and evaluates them against the available supply currently
published by the cloud coordinators.
• It supports trading of cloud services based on competitive economic models such
as commodity markets and auctions.
• An SLA specifies the details of the service to be provided in terms of metrics
agreed upon by all parties, and incentives and penalties for meeting and violating
the expectations, respectively.
• The availability of a banking system within the market ensures that financial
transactions pertaining to SLAs between participants are carried out in a secure
and dependable environment.
Inter Grid Gateway
• Peering arrangements established between gateways enables the allocation of resources
from multiple grids to establish the execution environment.
• Figure below illustrates a scenario in which an IGG allocates resources from a local
cluster to deploy applications in 3 steps:
• (1) requesting the VMs,
• (2) enactment of the leases, and
• (3) delpoyment of the VMs as requested. Under peak demand, this IGG interacts with
another that can allocate resources from a cloud computing provider.
• A grid has predefined peering arrangements with other grids, which the inter-grid gateway
(IGG) manages.
• Through multiple IGGs, the system coordinates the use of InterGrid resources.
• An IGG is aware of the peering terms with other grids, selects suitable grids that can
provide the required resources, and replies to requests from other IGGs.
• Request redirection policies determine which peering grid InterGrid selects to process a
request and a price for which that grid will perform it.
• An IGG can also allocate resources from a cloud provider.
• The cloud system creates a virtual environment to help users deploy their applications.
These applications use the distributed grid resources.
• The InterGrid allocates and provides as a distributed virtual
environment (DVE). This is a virtual cluster of VMs that runs isolated
from other virtual clusters.
• A component, called the DVE manager, performs resource allocation
and management on behaff of specific user applications.
• The core component of the IGG is a scheduler to implement the
provisioning policies and peering with other gateways.
•
Cloud Security
• Cloud security, also known as cloud computing security, consists of a set of policies,
controls, procedures and technologies that work together to protect cloud-based systems,
data, and infrastructure.
• These security measures are configured to protect cloud data, support regulatory
compliance and protect customers' privacy as well as setting authentication rules for
individual users and devices.
• From authenticating access to filtering traffic, cloud security can be configured to the
exact needs of the business.
• And because these rules can be configured and managed in one place, administration
overheads are reduced and IT teams empowered to focus on other areas of the business.
• The way cloud security is delivered will depend on the individual cloud provider or the
cloud security solutions in place.
• However, implementation of cloud security processes should be a joint responsibility
between the business owner and solution provider.
Basic Cloud Security
• Three basic cloud security enforcements are expected.
• First, facility security in data centers demands on-site security year round.
Biometric readers, CCTV (close circuit TV), motion detection, and man traps
are often deployed. (on-site security at data center→ Biometric, CCTV, motion
detection, man traps)
• Second, Network security demands fault-tolerant external firewalls, intrusion
detection systems (IDSes), and third-party vulnerability assessment.
• Finally, platform security demands SSL and data decryption, strict password
policies, and system trust certification (providing trust certificate in using
platform). (SSL (Secure Sockets Layer) is a security technology used to secure
transactions b/w server and browser)
Cloud security benefits
• Cloud security offers many benefits, including:
• Centralized security: Just as cloud computing centralizes applications and data, cloud security centralizes protection. Cloud-based
business networks consist of numerous devices and endpoints that can be difficult to manage when dealing with them. Managing
these entities centrally enhances traffic analysis and web filtering, streamlines the monitoring of network events and results in feour
software and policy updates. Disaster recovery plans can also be implemented and actioned easily when they are managed in one
place.
• Reduced costs: One of the benefits of utilizing cloud storage and security is that it eliminates the need to invest in dedicated
hardware. Not only does this reduce capital expenditure, but it also reduces administrative overheads. Cloud security delivers
proactive security features that offer protection 24/7 with little or no human intervention.
• Reduced Administration: When we choose a reputable cloud services provider or cloud security platform, we can say goodbye to
manual security configurations and almost constant security updates. These tasks can have a massive drain on resources, but when
we move them to the cloud, all security administration happens in one place and is fully managed on our behalf.
• Reliability: Cloud computing services offer the ultimate in dependability. With the right cloud security measures in place, users can
safely access data and applications within the cloud no matter where they are or what device they are using.
Security Issues in Cloud Computing :
• There is no doubt that Cloud Computing provides various Advantages but there are also some security issues in cloud computing.
Below are some following Security Issues in Cloud Computing as follows.
• Data Loss
Data Loss is one of the issues faced in Cloud Computing. This is also known as Data Leakage. As we know that our sensitive data
is in the hands of Somebody else, and we don’t have full control over our database. So, if the security of cloud service is to break by
hackers then it may be possible that hackers will get access to our sensitive data or personal files.
• Lack of Skill
While working, shifting to another service provider, need an extra feature, how to use a feature, etc. are the main problems caused in
IT Company who doesn’t have skilled Employees. So it requires a skilled person to work with Cloud Computing.
• SaaS (Software as a Service) has become increasingly popular in recent years due
to its flexibility, cost-effectiveness, and scalability. However, this popularity also
means that SaaS providers and their customers face significant security challenges.
• SaaS Security is important because:
• Sensitive data would be well-protected and not compromised by hackers,
malicious insiders or other cyber threats.
• SaaS security helps avoid severe consequences such as legal liabilities, damage to
reputation and loss of customers.
• Aids in increasing the trust of the SaaS provider to the customers.
• Aids in compliance with security standards and regulations.
• Ensures the security and protection of applications and data hosted from cyber
threats, minimizing the chances of data breaches and other security incidents.
Challenges in SaaS security
• Some of the most significant challenges in SaaS security include:
• 1. Lack of Control
• SaaS providers typically host applications and data in the cloud, meaning that customers have less direct control over their security.
This can make it challenging for customers to monitor and manage security effectively.
• 2. Access Management
• SaaS applications typically require users to log in and authenticate their identity. However, managing user access can be
challenging, particularly if the provider is hosting applications for multiple customers with different access requirements.
• 3. Data Privacy
• SaaS providers may be subject to data privacy regulations, which can vary by jurisdiction. This can make it challenging to ensure
compliance with all relevant laws and regulations, particularly if the provider hosts data for customers in multiple countries.
• 4. Third-party integration
• SaaS providers may integrate with third-party applications, such as payment processors or marketing platforms. However, this can
increase the risk of security incidents, as vulnerabilities in third-party software can potentially affect the entire system.
• 5. Continuous monitoring
• SaaS providers must continuously monitor their systems for security threats and vulnerabilities. This requires a high level of
expertise and resources to detect and respond to security incidents effectively.
What makes SaaS applications risky?
• 1. Virtualization
• Cloud computing systems run on virtual servers to store and manage multiple accounts and machines, unlike traditional networking
systems. In such a case, if even a single server is compromised it could put multiple stakeholders at risk. Though virtualization
technology has improved significantly over time, it still poses vulnerabilities that are often easy targets for cybercriminals. When
properly configured and implemented with strict security protocols, it can provide significant protection from numerous threats.
• 2. Managing identity
• Many SaaS providers allow for Single Sign-on (SSO) abilities to ease access to applications greatly. This is most helpful when there
are multiple SaaS applications and access is role-based. Some of the providers do have secure data access systems, however, with an
increase in the number of applications, it becomes quite complicated and difficult to manage securely.
• 3. Standards for cloud services
• SaaS security can greatly vary based on the provider and the standards maintained by them. Not all SaaS providers conform to
globally accepted SaaS security standards. Even those provide complicated and might not have SaaS-specific certification.
Standards such as ISO 27001 can offer a certain level of confidence; however, if not carefully evaluated they might not have all
security avenues covered under the certification.
• 4. Obscurity
• To be completely confident regarding SaaS security the customers must know in detail how everything works. If a SaaS provider
tries to be too obscure about the backend details, consider it a red flag.. Most popular SaaS providers are transparent about their
backend processes; however, several providers may not disclose details such as their security protocols and multi-tenant
infrastructure. In such cases, Service Level Agreements (SLA) are useful since it compels the provider to disclose all
responsibilities. After all, customers have a right to know how their data is protected against cyber-attacks and information exposure
among other SaaS risks.
• 5. Data location
• SaaS tools might store clients’ data in some other geographical region, but not all providers can promise that
due to several factors such as data laws and cost. Sometimes clients would be comfortable with their data
being stored within their country. Data location should also be based on factors such as data latency and load
balancing.
• 6. Access from anywhere
• SaaS apps can be accessed from anywhere and that is one of the reasons which makes them more appealing.
However, this feature has its own set of risks. Incidents such as accessing the application using an infected
mobile device or public WiFi without any VPN would compromise the server. If the endpoints are not secure
it would allow attackers to enter the server.
• 7. Data control
• Since all data will be hosted on the cloud, clients do not have complete control over it. If something goes
wrong, clients are at the mercy of the SaaS provider. Once agreeing to a price model, the provider becomes
responsible for storing and managing data. In such cases, clients often worry about who has access to it,
scenarios of data corruption, and access by third parties and competitors, to name a few. When sensitive data
is stored, answers to these queries become much more crucial.
SaaS Security Best Practices
• No system is safe , SaaS offerings also have security concerns that need to be resolved. By following the
below security practices, you can leverage the powerful features and advantages of SaaS without worrying
about security.
• 1. End-to-end data encryption
• This means that all kinds of interaction between server and user happens over SSL connections and are
encrypted. However, end-to-end encryption should also exist for data storage. Many providers have the option
to encrypt the data by default, while some clients need to explicitly specify this. Clients can also have the
option to encrypt specific fields such as financial details by using Multi-domain SSL certificates.
• 2. Vulnerability testing
• You can expect SaaS providers to make high claims regarding SaaS security. But the onus to verify these
claims can end up with the clients. If the SaaS provider has tools or checks, they should be reliable and meets
all standards. Apart from these, you should also ensure that intensive checks are done on the SaaS systems.
• There are multiple ways to assess SaaS security, such as automated tools or manually by security experts. A
comprehensive SaaS security check should meet both automated and manual checks since it would also
consider real-world scenarios and the latest threats. A number of quality SaaS security solutions are available
to help you with the security testing process.
• Policies for data deletion
• Data deletion policies play an important role in customers’ data safe. SaaS providers should be clear in
declaring their data deletion policies to their clients. These policies are mentioned in the service agreement
and should include what would happen after the customer’s data retention timeline ends. When applicable,
client data should be programmatically deleted from the server and respective logs should be generated.
• 4. Data security at the user level
• Multiple levels of SaaS security can limit the damage from cyber-attacks. At the user level, security protocols
such as role-based permissions and access, and enforced distribution of tasks, will protect your system from
attacks that leverage internal security gaps.
• 5. Virtual Private Network/Virtual Private Cloud
• VPN and VPC provide a safe environment for clients for their operation and data storage. These are better
options and more secure than multi-tenant systems. These also enable users to log in and use SaaS
applications from anywhere by securing endpoints and protecting the infrastructure.
• 6. Virtual Machine Management
• Your virtual machine needs to be updated regularly to maintain a secure infrastructure. Keep up with the latest
threats and patches on the market and deploy them timely to protect your VM.
• Scalability & Reliability
• SaaS offers great scalability (both vertical as well as horizontal) & reliability features. You have the benefit of
adding a new enhanced feature or additional resources as per your wish. Scaling cannot be realized instantly,
thus the vendor must put together a plan for horizontal redundancy. A CDN (Content delivery network) adds
more robustness to scaling.
• 8. Transport Layer Security and configuration certificates
• SaaS security is greatly enhanced when a provider protects externally transmitted data using Transport Layer
Security. Moreover, TLS also improves privacy between communicating applications and users. Make sure
that the certificates are appropriately configured and follow security protocols. The same applies to internal
data too. Internal data should also be stored in an encrypted format and any intra-application transfer should
be protected. Further, cookie security should be looked into as well.
• 9. User privileges and multi-factor authentication
• Different categories of users should have different levels of privileges. Cybercriminals often misuse privileges
to access the core files of an application. Admins should have exclusive access to crucial files and folders.
Also, authentication is a major point of entry for attackers. Factor Authentication is the new standard for
logging into applications. Make sure the SaaS application adheres to this custom.
• 10. Logs
• Logs help in monitoring SaaS security incidents and help in detecting any cyber attacks. SaaS systems should
have automatic log .Two-factor authentication should be available to clients to assist in audits or regular
monitoring.
• 11. Data Loss Prevention
• Data Loss Prevention (DLP) consists of two parts, detection, and action. DLP systems can scan outgoing or
transferred data for sensitive information through keyword and phrase searches. Once detected, data transfer
is blocked preventing any leakage. For a robust system, the DLP system can send alerts to the administrator
who verifies if the detection is correct. There are also SaaS APIs that enforce DLP protocols in your
application.
• 12. Deployment security
• Deployment can be either done on public cloud services or a SaaS vendor. In case you decide to self-deploy
your SaaS application then you need to test the security thoroughly and adopt enough safeguards to protect
your application against cyber attacks.
• Most of the big cloud providers take care of all your SaaS security needs, however, when opting for a public
cloud vendor, make sure that they follow all globally accepted standards. Asking for a pentest report while
making a vendor assessment is fair play on your part.
VM security
• A virtual machine (VM) is a digital substitute for a real computer.
• Virtual machine software is capable of running programs and
operating systems, storing data, connecting to networks, and
performing other computer operations Digitally.
• Still, it requires regular maintenance, such as updates and system
monitoring. Since a VM( Virtual Machine) stores and accesses lots of
data and can be misused and manipulated easily.
• Therefore we must ensure all the security features to protect data.
Securing a VM: Best Practices
• Securing a virtual machine in a cloud environment requires careful planning and implementation of various
security measures. Here are the essential steps:
• Implement strong access controls for VMs using multi-factor authentication, strong passwords, and role-based
access control (RBAC) to ensure only authorized users can access your VM.
• Use encryption to protect data stored on the VM. This includes using encryption for data at rest and data in
transit. We can use encryption protocols such as HTTPS, SSL/TLS, and SSH to protect data in transit. Some
common methods to enable encryption at rest include disk encryption, file-level encryption, and database-level
encryption.
• Use vulnerability management and patching to regularly update software and operating systems with the
latest security patches and updates. This will help to close any known vulnerabilities in the system.
• Use endpoint protection such as antivirus solutions to protect the VM from malware and other security
threats. Ensure that the endpoint security software is up-to-date and configured correctly.
• Use security monitoring regularly for any unusual activities or vulnerabilities. Use tools such as intrusion
detection systems (IDS) and security information and event management (SIEM) to monitor the VM and detect
any security incidents.
• Use a backup as regular data backups can help protect against data loss due to security incidents or other
disasters. By backing up data on a separate location or device, the data can be restored if the original data is lost
or becomes corrupted.
• Follow security hardening and best practices and industry-specific security requirements and regulations.
The National Institute of Standards and Technology (NIST) and Center for Internet Security (CIS) maintain
standards for system hardening best practices.
•
Security Governance
• Security governance in cloud computing involves establishing and
maintaining a framework of policies, procedures, and controls to ensure the
confidentiality, integrity, and availability of data and resources. Here are key
aspects of security governance in the context of cloud computing:
• Policy Development: Create cloud-specific security policies.
• Risk Management: Identify and mitigate security risks in cloud adoption.
• Access Controls: Implement robust IAM controls for cloud resource
access.
• Data Classification: Classify and secure data based on sensitivity.
• Incident Response Planning: Develop and test cloud-specific incident
response plans.
• Security Awareness: Provide ongoing training for employees on cloud
security best practices.
• Third-Party Security Assessments: Regularly assess cloud service
providers for security compliance.
• Continuous Monitoring: Implement real-time monitoring of cloud
resources for security threats.
• Security Audits: Conduct regular audits to evaluate the effectiveness of
security controls.
• Encryption: Enforce encryption for data at rest and in transit.
• Change Management: Implement controlled processes for changes to
cloud configurations.
IAM
• Identity and Access Management (IAM) is the security discipline that
enables the right individuals to access the right resources at the right
times for the right reasons. IAM addresses the mission-critical need to
ensure appropriate access to resources across increasingly
heterogeneous technology environments.
• Enterprises traditionally used on-premises IAM software to manage
identity and access policies, but nowadays, as companies add more
cloud services to their environments, the process of managing
identities is getting more complex. Therefore, adopting cloud-based
Identity-as-a-Service (IDaaS) and cloud IAM solutions becomes a
logical step.
• In more technical terms, IAM is a means of managing a given set of
users' digital identities, and the privileges associated with each identity.
• It is an umbrella term that covers a number of different products that all do
this same basic function.
• Within an organization, IAM may be a single product, or it may be a
combination of processes, software products, cloud services, and hardware
that give administrators visibility and control over the organizational data
that individual users can access.
• To verify identity, a computer system will assess a user for characteristics
that are specific to them. If they match, the user's identity is confirmed.
These characteristics are also known as "authentication factors," because
they help authenticate that a user is who they say they are.
• The three most widely used authentication factors are:
• Something the user knows
• Something the user has
• Something the user is
• Something the user knows: This factor is a piece of knowledge that
only one user should have, like a username and password combination.
• Something the user has: This factor refers to possession of a physical
token that is issued to authorized users. The system sends the
verification code on user mobile( which is unique to that person)
• Something the user is: This refers to a physical property of one's
body. A common example of this authentication factor in action is
Face ID, the feature offered by many modern smartphones. Fingerprint
scanning is another example. Less common methods used by some
high-security organizations include retina scans and blood tests.
Cloud IAM typically includes the following features:
• Authentication and Authorization: Ensures secure user authentication and defines
access permissions.
• Roles and Permissions: Enables creation of roles with specific permissions for the
principle of least privilege.
• Resource Policies: Attaches policies to cloud resources, specifying who can access them
and what actions are allowed.
• Federation and SSO: Supports identity federation and Single Sign-On for seamless
access across environments.
• Audit Trails: Generates logs for user activities, aiding in compliance and security
monitoring.
• Temporary Credentials: Provides temporary security credentials, reducing the risk of
long-term exposure.
• Single Access Control Interface. Cloud IAM solutions provide a clean and consistent
access control interface for all cloud platform services. The same interface can be used for
all cloud services.
• Enhanced Security. You can define increased security for critical applications.
Why do you need Identity and Access
Management?
• Identity and Access Management technology can be used to initiate,
capture, record, and manage user identities and their access
permissions. All users are authenticated, authorized, and evaluated
according to policies and roles.
• Poorly controlled IAM processes may lead to regulatory non-
compliance; if the organization is audited, management may not be
able to prove that company data is not at risk of being misused.
How can Cloud IAM help?
• The ability to spend less on enterprise security by relying on the centralized trust model to
deal with Identity Management across third-party and own applications.
• It enables your users to work from any location and any device.
• You can give them access to all your applications using just one set of credentials
through Single Sign-On.
• You can protect your sensitive data and apps: Add extra layers of security to your
mission-critical apps using Multifactor Authentication.
• It helps maintain compliance of processes and procedures. A typical problem is that
permissions are granted based on employees’ needs and tasks, and not revoked when they
are no longer necessary, thus creating users with lots of unnecessary privileges.
• Auth0 is an identity access management (IAM) provider
• Auth0 can authenticate your users with any identity provider running on any stack, any
device or cloud. It provides Single Sign-On, Multifactor Authentication, Social Login,
and several more features.
Cloud Security Standards
• Ensure cloud computing is an appropriate environment: Organizations need to make sure that
cloud computing is the appropriate environment for the applications as security and mitigating risk
are the major concerns.
• To ensure that sensitive data is safe in the cloud: Organizations need a way to make sure that the
sensitive data is safe in the cloud while remaining compliant with standards and regulations.
• No existing clear standard: Cloud security standards are essential as earlier there were no existing
clear standards that can define what constitutes a secure cloud environment. Thus, making it
difficult for cloud providers and cloud users to define what needs to be done to ensure a secure
environment.
• Need for a framework that addresses all aspects of cloud security: There is a need for
businesses to adopt a framework to address these issues
What are Cloud Security Standards
• It was essential to establish guidelines for how work is done in the cloud due to the different
security dangers facing the cloud. They offer a thorough framework for how cloud security is
upheld with regard to both the user and the service provider.
• Cloud security standards provide a roadmap for businesses transitioning from a traditional
approach to a cloud-based approach by providing the right tools, configurations, and policies
required for security in cloud usage.
• It helps to devise an effective security strategy for the organization.
• It also supports organizational goals like privacy, portability, security, and interoperability.
• Certification with cloud security standards increases trust and gives businesses a competitive
edge.
Best Practices For Cloud Security