Unit 5 Cloud computing
Unit 5 Cloud computing
Introduction:
The shared responsibility model in cloud security divides security tasks between the
cloud service provider (CSP) and the customer.
This helps both parties to understand their roles in maintaining security and compliance.
1. Physical Security:
2. Network Security:
3. Hardware Security:
4. Virtualization Security:
6. Compliance:
1. Data Security:
2. Access Controls:
3. Application Security:
4. Network Security:
6. Compliance:
- Customer: Manages user access, data within the application, and specific
configurations.
1. Clear Accountability:
Helps both parties know their specific responsibilities, reducing security and
compliance gaps.
3. Compliance Assurance:
4. Risk Mitigation:
IAM:
Identity and Access Management (IAM) strengths MFA by requiring users to verify their
identity through multiple factors (e.g., password, OTP, biometrics). It enhances security,
reduces risks of credential-based attacks, and ensures compliance with regulatory
standards.
Significance of IAM:
Sensitive Data Access: Protects confidential files like financial or patient records.
High-Risk Transactions: Verifies identity for actions like financial transfers or permission
changes.
Untrusted Locations: Requires IAM (MFA) for logins from unknown devices or IPs.
Examples:
IAM is essential for securing cloud applications, safeguarding sensitive data, and
preventing unauthorized access.
3. Strategies for managing costs and optimizing cloud resources::
1. Right-Sizing Resources
Use tools like AWS Cost Explorer or Azure Cost Management to analyze spending.
Set budgets and alerts to prevent exceeding cost limits.
4. Optimizing Storage
5. Serverless Architecture
Use serverless options like AWS Lambda, paying only for usage.
Execute functions on events to optimize resources and reduce idle costs.
6. Application Performance
7. Governance Policies
- Use frameworks like CSA Cloud Controls Matrix or NIST Cybersecurity Framework.
2. Data Protection
5. Network Security
- Use firewalls, intrusion detection systems and network segmentation to protect the
system.
7. Application Security
Tools and Techniques: Use tools like AWS CloudTrail, SIEM, and EDR solutions.
Key Areas: Monitor IAM, network traffic, applications, and data access.
Log Management: Collect, store, and analyze logs using machine learning.
Alerts and Reporting: Automate alerts, prioritize issues, and generate reports.