Cloud Computing Module-04 Search Creators
Cloud Computing Module-04 Search Creators
Module-04
Cloud Security
Definition:
Cloud security encompasses the technologies, policies, controls, and services that
protect data, applications, and the infrastructure of cloud computing from various
threats. It is essential to ensure that the data stored in the cloud is secure from
unauthorized access and breaches.
1. Data Privacy:
2. Data Integrity:
3. Data Availability:
6. Cost-Effectiveness:
9. Enhanced Collaboration:
1. Data Breaches:
2. Data Loss:
3. Account Hijacking:
1. Data Privacy:
2. Data Residency:
3. Vendor Lock-in:
4. Insider Threats:
Definition:
A Privacy Impact Assessment (PIA) is a systematic process used to evaluate the
potential privacy risks associated with data processing activities. It helps
organizations identify how personal data is collected, used, stored, and shared,
ensuring compliance with privacy regulations and enhancing data protection
measures.
Purpose of PIA
o Action: Clearly articulate the specific purposes for which personal data
is being collected.
Building trust in cloud security is essential for organizations that rely on cloud
services to handle sensitive data and critical operations. Establishing a trustworthy
cloud environment involves various strategies that enhance transparency,
compliance, and independent verification of security practices. Below are the key
components for fostering trust in cloud security:
1. Transparency:
3. Third-Party Audits:
Operating System (OS) security is crucial for protecting the underlying system that
supports applications and manages hardware resources. By implementing effective
security measures, organizations can safeguard their systems against various threats
and vulnerabilities. Below are the key aspects of OS security:
1. Hardening OS:
o Strategies:
2. Regular Updates:
3. Access Control:
o Strategies:
1. Isolation:
2. Snapshot Security:
3. VM Sprawl:
1. Malicious Images:
o Risks: Attackers can create and distribute malicious images that, when
deployed, compromise the integrity of the systems using them. These
images can include backdoors, trojans, or other forms of malware that
enable unauthorized access or control over the system. To mitigate this
risk, organizations should implement a rigorous vetting process for
shared images, ensuring that only images from trusted sources are
utilized. Additionally, regularly scanning images for vulnerabilities
before deployment is crucial.
o Definition: The risk that shared images might not be up-to-date with
the latest security patches.
o Risks: Images that have not been regularly updated can contain
outdated software components with known vulnerabilities. When
organizations deploy these images, they may inadvertently expose their
systems to exploitation by cybercriminals who target unpatched
vulnerabilities. To address this issue, organizations should establish
3. Misconfiguration:
o Risks: Shared images may come with default settings that are not
appropriate for all environments. Misconfigurations, such as open
ports, default passwords, or insecure settings, can create vulnerabilities
that attackers can exploit. It is essential for organizations to conduct
thorough configuration reviews after deploying shared images.
Implementing security hardening practices and applying the principle
of least privilege during configuration can help minimize the risk of
misconfigurations leading to security breaches.
Security of Management OS
The Management Operating System (Management OS) plays a critical role in cloud
infrastructure by serving as the intermediary between the cloud environment and the
virtual machines (VMs). Due to its central position, ensuring the security of the
Management OS is essential to protect the overall integrity and confidentiality of the
cloud infrastructure. Here are the key aspects of Management OS security, including
potential threats and mitigation strategies:
Role of Management OS
Threats to Management OS
1. Privilege Escalation:
2. Unauthorized Access:
Mitigation Strategies
1. Strong Authentication: