Unit-5 (Clod Computing)
Unit-5 (Clod Computing)
Software As a Service
1. Lack of Control
SaaS providers typically host applications and data in the cloud, meaning that
customers have less direct control over their security. This can make it challenging
for customers to monitor and manage security effectively.
2. Access Management
SaaS applications typically require users to log in and authenticate their identity.
However, managing user access can be challenging, particularly if the provider is
hosting applications for multiple customers with different access requirements.
3. Data Privacy
SaaS providers may be subject to data privacy regulations, which can vary by
jurisdiction. This can make it challenging to ensure compliance with all relevant
laws and regulations, particularly if the provider hosts data for customers in multiple
countries.
4. Third-party integration
5. Continuous monitoring
SaaS providers must continuously monitor their systems for security threats and
vulnerabilities. This requires a high level of expertise and resources to detect and
respond to security incidents effectively.
1. Virtualization
Cloud computing systems run on virtual servers to store and manage multiple
accounts and machines, unlike traditional networking systems. In such a case, if
even a single server is compromised it could put multiple stakeholders at risk.
Though virtualization technology has improved significantly over time, it still poses
vulnerabilities that are often easy targets for cybercriminals. When properly
configured and implemented with strict security protocols, it can provide significant
protection from numerous threats.
2. Managing identity
Many SaaS providers allow for Single Sign-on (SSO) abilities to ease access to
applications greatly. This is most helpful when there are multiple SaaS applications
and access is role-based. Some of the providers do have secure data access systems,
however, with an increase in the number of applications, it becomes quite
complicated and difficult to manage securely.
SaaS security can greatly vary based on the provider and the standards maintained
by them. Not all SaaS providers conform to globally accepted SaaS security
standards. Even those providecomplicatedliant might not have SaaS-specific
certification. Standards such as ISO 27001 can offer a certain level of confidence;
however, if not carefully evaluated they might not have all security avenues covered
under the certification.
4. Obscurity
that the time customers are not aware of the processes handled by the SaaS service
provider. If a SaaS provider tries to be too obscure about the backend details,
consider it a red flag. To be completely confident regarding SaaS security the
customers must know in detail how everything works.
Most popular SaaS providers are transparent about their backend processes;
however, several providers may not disclose details such as their security protocols
and multi-tenant infrastructure. In such cases, Service Level Agreements (SLA) are
useful since it compels the provider to disclose all responsibilities. After all,
customers have a right to know how their data is protected against cyber-attacks and
information exposure among other SaaS risks.
5. Data location
SaaS tools might store clients’ data in some other geographical region, but not all
providers can promise that due to several factors such as data laws and cost.
Sometimes clients would be comfortable with their data being stored within their
country. Data location should also be based on factors such as data latency and load
balancing.
SaaS apps can be accessed from anywhere and that is one of the reasons which
makes them more appealing. However, this feature has its own set of risks. Incidents
such as accessing the application using an infected mobile device or public WiFi
without any VPN would compromise the server. If the endpoints are not secure it
would allow attackers to enter the server.
7. Data control
Since all data will be hosted on the cloud, clients do not have complete control over
it. If something goes wrong, clients are at the mercy of the SaaS provider. Once
agreeing to a price model, the provider becomes responsible for storing and
managing data. In such cases, clients often worry about who has access to it,
scenarios of data corruption, and access by third parties and competitors, to name a
few. When sensitive data is stored, answers to these queries become much more
crucial.
Let’s look at key principles we need to focus on while defining cloud security
architecture as under:
Data Security:
Cloud computing delivers many benefits, allowing you to access data from any
device via an internet connection to reduce the chance of data loss during outages
or incidents and improve scalability and agility. At the same time, many
organizations remain hesitant to migrate sensitive data to the cloud as they struggle
to understand their security options and meet regulatory demands.
Understanding how to secure cloud data remains one of the biggest obstacles to
overcome as organizations transition from building and managing on-premises data
centers. So, what is data security in the cloud? How is your data protected? And
what cloud data security best practices should you follow to ensure cloud-based
data assets are secure and protected?
Today, we’re living in the era of big data, with companies generating, collecting,
and storing vast amounts of data by the second, ranging from highly confidential
business or personal customer data to less sensitive data like behavioral and
marketing analytics.
Beyond the growing volumes of data that companies need to be able to access,
manage, and analyze, organizations are adopting cloud services to help them
achieve more agility and faster times to market, and to support increasingly remote
or hybrid workforces.
The traditional network perimeter is fast disappearing, and security teams are
realizing that they need to rethink current and past approaches when it comes to
securing cloud data. With data and applications no longer living inside your data
center and more people than ever working outside a physical office, companies
must solve how to protect data and manage access to that data as it moves across
and through multiple environments.
Cloud data security best practices follow the same guiding principles of
information security and data governance:
Data availability: While you want to stop unauthorized access, data still needs to
be available and accessible to authorized people and processes when it’s needed.
You’ll need to ensure continuous uptime and keep systems, networks, and devices
running smoothly.
Often referred to as the CIA triad, these three broad pillars represent the core
concepts that form the basis of strong, effective security infrastructure—or any
organization’s security program. Any attack, vulnerability, or other security
incident will likely violate one (or more) of these principles. This is why security
professionals use this framework to evaluate potential risk to an organization’s data
assets.
As more data and applications move out of a central data center and away from
traditional security mechanisms and infrastructure, the higher the risk of exposure
becomes. While many of the foundational elements of on-premises data security
remain, they must be adapted to the cloud.
Lack of visibility. Companies don’t know where all their data and applications
live and what assets are in their inventory.
Less control. Since data and apps are hosted on third-party infrastructure, they
have less control over how data is accessed and shared.
Inconsistent coverage. Many businesses are finding multicloud and hybrid cloud
to better suit their business needs, but different providers offer varying levels of
coverage and capabilities that can deliver inconsistent protection.
Growing cybersecurity threats. Cloud databases and cloud data storage make
ideal targets for online criminals looking for a big payday, especially as companies
are still educating themselves about data handling and management in the cloud.
Distributed data storage. Storing data on international servers can deliver lower
latency and more flexibility. Still, it can also raise data sovereignty issues that
might not be problematic if you were operating in your own data center.
Cloud providers and customers share responsibility for cloud security. The exact
breakdown of responsibilities will depend on your deployment and whether you
choose IaaS, PaaS, or SaaS as your cloud computing service model.
In general, a cloud provider takes responsibility for the security of the cloud itself,
and you are responsible for securing anything inside of the cloud, such as data,
user identities, and their access privileges (identity and access management).
At Google Cloud, we follow a shared fate model. That means we are active
partners in ensuring our customers deploy securely on our platform. We can help
you implement best practices by offering secure-by-default configurations,
blueprints, policy hierarchies, and advanced security features to help develop
security consistency across your platforms and tools.
Being compliant in the context of the cloud requires that any services and systems
protect data privacy according to legal standards and regulations for data
protection, data sovereignty, or data localization laws. Certain industries, such as
healthcare or financial services, will also have an additional set of laws that come
with mandatory guidelines and security protocols that will need to be followed.
That’s why it’s important to consider cloud service providers and evaluate their
cloud security carefully. Reputable cloud service providers will not only strive to
ensure their own services and platforms are compliant but should also be willing to
collaborate with you directly to understand and address your specific regulatory
and risk management needs.
Cloud application security is crucially important for organizations that are operating
in a multi-cloud environment hosted by a third-party cloud provider such as
Amazon, Microsoft or Google, as well as those that use collaborative web
applications such as Slack, Microsoft Teams or Box. These services or
applications, while transformational in nature to the business and its workforce,
dramatically increase the attack surface, providing many new points of access for
adversaries to enter the network and unleash attacks.
Organizations that are leveraging the cloud, particularly as part of the software
development process, must now design and implement a comprehensive cloud
security solution to protect against an expanding array of threats and increasingly
sophisticated attacks within the cloud environment — including those that target the
application level.
CSPM, CWPP and CASB are the trifecta of securing data in and access to the
cloud. Organizations are encouraged to deploy all three security methods to
optimize their cloud security infrastructure.
The CSPM automates the identification and remediation of risks across cloud
infrastructures , including Infrastructure as a Service (IaaS ), Software as a Service
(Saas) and Platform as a Service (PaaS).
CSPM is used for risk visualization and assessment, incident response , compliance
monitoring and DevOps integration, and can uniformly apply best practices
for cloud security to hybrid, multi-cloud and container environments.
CSPMs are purpose-built for cloud environments and assess the entire
environment, not just the workloads. CSPMs also incorporate sophisticated
automation and artificial intelligence, as well as guided remediation — so users not
only know there is a problem, they have an idea of how to fix it.
Cloud workload protection platforms (CWPPs) protect workloads of all types in any
location, offering unified cloud workload protection across multiple providers. They
are based on technologies such as vulnerability management, antimalware and
application security that have been adapted to meet modern infrastructure needs.
Cloud access security brokers (CASBs) are security enforcement points placed
between cloud service providers and cloud service customers. They ensure traffic
complies with policies before allowing it access to the network. CASBs typically
offer firewalls, authentication, malware detection, and data loss prevention.
Misconfigurations
Misconfigurations are the single largest threat to both cloud and app security.
These errors can include misconfigured S3 buckets, which leave ports open to the
public, or the use of insecure accounts or an application programming interface
(API). These errors transform cloud workloads into obvious targets that can be
easily discovered with a simple web crawler. In the cloud, the absence of perimeter
security can make those mistakes very costly. Multiple publicly reported breaches
started with misconfigured S3 buckets that were used as the entry point.
Because many application security tools require manual configuration, this process
can be rife with errors and take considerable time to set up and update. To that
end, organizations should adopt security tooling and technologies and automate
the configuration process.
Unsecured APIs
APIs are often the only organizational asset with a public IP address. This can
make them an easy target for attackers, especially if they are insecure due to
lackluster access controls or encryption methods.
The shift to the cloud is a relatively recent phenomenon for many organizations.
This means that many companies may not have the security maturity needed to
operate safely in a multi-cloud environment.
For example, some vulnerability scanners may not scan all assets, such as
containers within a dynamic cluster. Others cannot distinguish real risk from normal
operations, which produces a number of false alarms for the IT team to investigate.
Cloud networks adhere to what is known as the “shared responsibility model .” This
means that much of the underlying infrastructure is secured by the cloud service
provider. However, the organization is responsible for everything else, including the
operating system, applications and data. Unfortunately, this point can be
misunderstood, leading to the assumption that cloud workloads are fully protected
by the cloud provider. This results in users unknowingly running workloads in a
public cloud that are not fully protected, meaning adversaries can target the
operating system and the applications to obtain access. Even securely configured
workloads can become a target at runtime, as they are vulnerable to zero-day
exploits.
Shadow IT
Shadow IT, which describes applications and infrastructure that are managed and
utilized without the knowledge of the enterprise’s IT department, is another major
issue in cloud environments. In many instances, DevOps often contributes to this
challenge as the barrier to entering and using an asset in the cloud — whether it is
a workload or a container — is extremely low. Developers can easily spawn
workloads using their personal accounts. These unauthorized assets are a threat to
the environment, as they often are not properly secured and are accessible via
default passwords and configurations, which can be easily compromised.
As workloads move to the cloud, administrators continue to try and secure these
assets the same way they secure servers in a private or an on-premises data
center. Unfortunately, traditional data center security models are not suitable for
the cloud. With today’s sophisticated, automated attacks, only advanced, integrated
security can prevent successful breaches. It must secure the entire IT environment,
including multi-cloud environments as well as the organization’s data centers and
mobile users. A consistent, integrated approach that provides complete visibility
and granular control across the entire organization will reduce friction, minimize
business disruption and enable organizations to safely, confidently embrace the
cloud.
Types of Hypervisors
Type-1 Hypervisors
Type-2 Hypervisor
Type I Virtualization
Type II virtualization
The advantages of
automated cloud security
solutions
Cloud security tools are faster, more efficient, and easier to
pilot than legacy solutions. Security automation offers more
accurate detection rates via multiple advanced detection
engines, capable of rapid, precise scanning of static and
dynamic data — text, files, URLs, etc.
Privacy regulations
Quantum computing
Blockchain
Conclusion
Cloud security automation is critical to streamline
cybersecurity processes and protect company data against
increasingly sophisticated cyberattacks. The proper
automation platform can enable organizations to address
every aspect of their data protection strategy — from common
security tasks to cloud container security and database
granular security automation. Streamlining security operations
eases threat investigation and incident response, optimizes
RTO and RPO, minimizes downtime, and ensures business
continuity for organizations of all sizes.