Cloud Infrastructure Security
Cloud Infrastructure Security
Security
Introduction
Cloud infrastructure security is the practice of securing resources deployed in a cloud environment
and supporting systems.
Public cloud infrastructure is, in many ways, more vulnerable than on-premises infrastructure
because it can easily be exposed to public networks, and is not located behind a secure network
perimeter.
However, in a private or hybrid cloud, security is still a challenge, as there are multiple security
concerns due to the highly automated nature of the environment, and numerous integration points
with public cloud systems.
Public Cloud Security
In a public cloud, the cloud provider takes responsibility for securing the infrastructure, and provides
tools that allow the organization to secure its workloads. Your organization is responsible for:
Securing workloads and data, fully complying with relevant compliance standards, and ensuring all
activity is logged to enable auditing.
Ensuring cloud configurations remain secure, and any new resources on the cloud are similarly
secured, using automated tools such as a Cloud Security Posture Management (CSPM) platform.
Understanding which service level agreements (SLA), supplied by your cloud provider, deliver
relevant services and monitoring.
Securing 6 Key Components of
Cloud Infrastructure
The components are-
1. Accounts
2. Servers
3. Hypervisors
4. Storage
5. Databases
6. Network
Accounts
Service accounts in the cloud are typically privileged accounts, which may have access to
critical infrastructure. Once compromised, attackers have access to cloud networks and can
access sensitive resources and data.
Service accounts may be created automatically when you create new cloud resources, scale
cloud resources, or stand up environments using infrastructure as code (IaC). The new
accounts may have default settings, which in some cases means weak or no authentication.
Use identity and access management (IAM) to set policies controlling access and authentication
to service accounts.
Use a cloud configuration monitoring tool to automatically detect and remediate non-secured
accounts.
Use security groups to define rules that define what traffic can flow between cloud resources. Keep
in mind that security groups are tightly connected to compute instances, and compromise of an
instance grants access to the security group configuration, so additional security layers are needed.
Use Network Access Control Lists (ACL) to control access to virtual private networks. ACLs provide
both allow and deny rules, and provide stronger security controls than security groups.
Use additional security solutions such as firewalls as a service (FWaaS) and web application
firewalls (WAF) to actively detect and block malicious traffic.
Deploy Cloud Security Posture Management (CSPM) tools to automatically review cloud networks,
detect non-secure or vulnerable configurations and remediate them.