0% found this document useful (0 votes)
4 views

Unit 4

Cloud security involves practices and technologies to protect cloud environments from threats, focusing on visibility, control, access, and compliance. Key security types include Identity and Access Management (IAM), network security, security monitoring, governance, disaster recovery, and legal compliance. The shared security model delineates responsibilities between cloud service providers and customers, ensuring a collaborative approach to managing security risks across various cloud service models (IaaS, PaaS, SaaS).
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Unit 4

Cloud security involves practices and technologies to protect cloud environments from threats, focusing on visibility, control, access, and compliance. Key security types include Identity and Access Management (IAM), network security, security monitoring, governance, disaster recovery, and legal compliance. The shared security model delineates responsibilities between cloud service providers and customers, ensuring a collaborative approach to managing security risks across various cloud service models (IaaS, PaaS, SaaS).
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Discuss cloud security in detail.

Give the detail of different type of security and about the applying of that firewall

Cloud security refers to the set of practices, technologies, policies, and controls implemented to protect cloud computing
environments, data, applications, and infrastructure from security threats, vulnerabilities, and risks. It encompasses a wide
range of security measures designed to ensure the confidentiality, integrity, and availability of cloud resources. Cloud
security consists of several elements working simultaneously to ensure comprehensive security against threats. Four critical
security solutions include visibility into cloud data, control over cloud data, access to cloud data and applications, and
compliance.

[1] Visibility into cloud data allows authorized users to view and directly monitor data stored in a cloud environment as
well as the network’s stability, with alerting systems used to facilitate mitigation of compromising events.
[2] Control over cloud data pertains to data classification, data loss prevention, collaboration controls and encryption
processes.
[3] Access to cloud data and applications is the implementation of user access control systems, device access control
systems, abnormal behavior identification systems, malware prevention measures and privileged access control.
[4] Compliance are requirements in place that include data and applications in cloud environments, such as risk assessment
and compliance assessment.

Types:

1. IAM is the process that ensures the correct user has specific access privileges. Common IAM techniques include
password management and multi-factor authentication.

2. Network and device security involves using tools to put barriers between the access and visibility of data in contained
environments, including techniques such as encryption and VPNs.

3. Security monitoring/alerting is the installation of both automated and monitored systems, such as a Security Incident
and Event Management (SIEM) platform and a Security Operations Center (SOC), that can check for and immediately
bring attention to unusual or compromising activity.

4. Governance is the enforcing of policies to prevent, detect and mitigate threats, such as user behavior policies and
training.

5. Disaster recovery and business continuity planning are recovery measures taken in the event of technical disaster.
These measures include data redundancy tactics like establishing backups and frameworks for testing the validity of
backups.

6. Legal compliance refers to the adherence to legislative policies designed to protect user privacy (GDPR), the integrity
of financial data (SOX), government assets (ITAR) and more.

What is shared security model? Discuss the responsibility of different participants.

The shared security model, also known as the shared responsibility model, is a security framework that defines the division
of security responsibilities between cloud service providers (CSPs) and cloud customers. It outlines which security aspects
are managed by the CSP and which are the responsibility of the cloud customer, depending on the cloud deployment model
(IaaS, PaaS, SaaS). This model helps clarify the roles and responsibilities of each party in securing cloud environments and
ensures a collaborative approach to cloud security. Let's discuss the responsibilities of different participants in the shared
security model:

1. Cloud Service Provider (CSP):


 Infrastructure Security: CSPs are responsible for securing the underlying infrastructure, including physical data
centers, networking, and compute resources. This includes measures such as facility security, environmental
controls, and hardware maintenance.
 Platform Security (PaaS): For platform-level services, CSPs are responsible for securing the underlying platform
and runtime environment, including operating systems, middleware, and runtime libraries.
 Application Security (SaaS): For software-as-a-service (SaaS) offerings, CSPs are responsible for securing the
application itself, including application code, data storage, and access controls.
 Global Network Security: CSPs manage and secure the global network infrastructure that connects data centers,
regions, and availability zones, ensuring secure communication between cloud resources and users.

2. Cloud Customer:
 Data Security: Cloud customers are responsible for securing their data, including encryption, access controls, and
data classification. This includes protecting data at rest, in transit, and during processing.
 Identity and Access Management (IAM): Cloud customers are responsible for managing user identities,
authentication, and access controls within the cloud environment. This includes defining user roles, permissions,
and access policies.
 Configuration Management: Cloud customers are responsible for configuring and securing cloud resources,
including virtual machines, containers, databases, and network services. This involves implementing security best
practices, patch management, and compliance checks.
 Application Security: Cloud customers are responsible for securing applications deployed on the cloud platform,
including code security, vulnerability management, and secure coding practices.
 Compliance and Governance: Cloud customers are responsible for ensuring compliance with industry regulations,
standards, and legal requirements within their cloud environment. This includes conducting audits, implementing
security controls, and maintaining documentation.
 Incident Response and Monitoring: Cloud customers are responsible for monitoring their cloud environment for
security incidents, anomalies, and unauthorized activities. They must also develop and implement incident
response plans to detect, respond to, and recover from security breaches.

Shared Responsibilities Examples:


 Infrastructure as a Service (IaaS): The CSP is responsible for securing the underlying infrastructure, while the
cloud customer is responsible for securing the operating systems, applications, and data running on the virtual
machines.
 Platform as a Service (PaaS): The CSP is responsible for securing the underlying platform and runtime
environment, while the cloud customer is responsible for securing the applications and data deployed on the
platform.
 Software as a Service (SaaS): The CSP is responsible for securing the application itself, while the cloud customer
is responsible for securing access to the application, managing user identities, and protecting data within the
application.

By clearly defining the responsibilities of each party in the shared security model, organizations can effectively manage and
mitigate security risks in the cloud while leveraging the scalability, flexibility, and cost-effectiveness of cloud computing.

Discuss in detail nefarious use of cloud.

[1] Malware Distribution: Malicious actors use cloud services to host and distribute malware through websites or emails,
exploiting vulnerabilities or social engineering tactics to infect users' devices.
[2] Command and Control (C&C) Infrastructure: Cloud servers are utilized as command centers for botnets, enabling
cybercriminals to control compromised devices and orchestrate malicious activities like DDoS attacks.
[3] Phishing and Fraudulent Activities: Cloud hosting facilitates the creation of phishing websites and fake online
marketplaces, enabling cybercriminals to steal sensitive information or conduct fraudulent transactions.
[4] Cryptocurrency Mining: Criminals hijack cloud resources for cryptojacking, using them to mine cryptocurrencies
without authorization, leading to increased costs and performance issues for legitimate users.
[5] Data Theft and Leakage: Cloud storage is exploited for storing and exfiltrating stolen data, including intellectual
property or customer information, by insiders or external attackers.
[6] DDoS Attacks: Cloud infrastructure is leveraged to launch DDoS attacks, disrupting the availability of target websites
or services and causing financial or reputational harm.
[7] Hosting Illegal Content: Cloud platforms host illegal content such as child exploitation material or pirated software,
exploiting anonymity and global reach to evade detection.
[8] Cyber Espionage and Nation-State Attacks: Nation-state actors use cloud infrastructure for cyber espionage, conducting
targeted attacks against governments, corporations, or critical infrastructure to steal sensitive information or disrupt
operations.

How to apply security in cloud. Discuss the security deployment for AWS in detail (IaaS/PaaS/SaaS).

Describe three security model in cloud.

You might also like