Unit V
Unit V
Security Overview
Secure cloud computing encompasses three core capabilities: confidentiality, integrity, and
availability.
1. Confidentiality is the ability to keep information secret from people who shouldn’t have
access.
2. Integrity means that systems operate as they are intended to function and produce
outputs that are not unexpected or misleading.
3. Availability speaks to maintaining service uptime for cloud infrastructure and cloud-
based services, which includes preventing denial-of-service (DoS) attacks.
The cloud offers on-demand compute and storage resources that can help transform businesses
and accelerate services development and deployment. However, businesses cannot enjoy all
these potential benefits without a strong backbone to help protect them from digital threats,
malware, and hackers. The goal is to reduce total attack surface, manage risks to accessing
cloud resources, and ultimately make it profitable and beneficial to use the cloud.
Every industry is working diligently to keep up with the ever-changing threat landscape,
whether its protecting intellectual property, keeping systems patched, or ensuring compliance
with privacy regulations. IT security teams are often short-staffed or struggling to meet the
constantly changing needs of the business. Cloud computing offers a solution to these
challenges because many public clouds have cybersecurity, encryption, and data protection
baked into their service offerings.
The cloud is emerging as a premier platform for the security conscious, where the latest
technologies are implemented, cybersecurity experts are available around the clock, and
advancements in digital threats are addressed in real time. Not only can businesses benefit from
on-demand compute and storage resources in the cloud, but they can also benefit from world-
class data security features as well.
Network security refers to securing the perimeter of a data center, and the movement of data
inside or outside the data center. This entails using network infrastructure and access controls
to manage data flow and prevent digital threats from entering the network. A key example of
network security is the use of firewalls to restrict access to specific network ports. But
networking is just one piece of the equation and cloud computing encompasses the full gamut
of devices, data, and software. Businesses and cloud architects need a robust and secure
network perimeter, but there will always be insider threats and data breaches that bypass
perimeter protections. For this reason, it is important to have a multi-layered security strategy,
like confidential computing, that touches hardware, software, and applications.
Let us consider an example: An API endpoint hosted in the cloud and exposed to the public
Internet is a risk, the attacker who tries to access sensitive data using that API is
the threat (along with any specific techniques they could try), and your
organization’s challenge is effectively protecting public APIs while keeping them
available for legitimate users or customers who need them.
A complete cloud security strategy addresses all three aspects, so no cracks exist within
the foundation.
An attack surface is your environment’s total exposure. The adoption of microservices can
lead to an explosion of publicly available workload. Every workload adds to the attack
surface.
Attack surface can also include subtle information leaks that lead to an attack. For
example, CrowdStrike’s team of threat hunters found an attacker using sampled DNS
request data gathered over public Wi-Fi to work out the names of S3 buckets. CrowStrike
stopped the attack before the attackers did any damage, but it is a great illustration of risk’s
ubiquitous nature. Even strong controls on the S3 buckets were not enough to completely
hide their existence. If you use the public Internet or cloud, you’re automatically exposing
an attack surface to the world.
2. Human Error
Human error is a constant risk when building business applications. However, hosting
resources on the public cloud magnifies the risk.
The cloud’s ease of use means that users could be using APIs you are not aware of without
proper controls and opening up holes in your perimeter. Manage human error by building
strong controls to help people make the right decisions.
3. Misconfiguration
Cloud settings keep growing as providers add more services over time. Many companies
are using more than one provider.
Providers have different default configurations, with each service having its distinct
implementations and nuances. Until organizations become proficient at securing their
various cloud services, adversaries will continue to exploit misconfigurations.
4. Data Breaches
A data breach occurs when sensitive information leaves your possession without your
knowledge or permission. Data is worth more to attackers than anything else, making it
the goal of most attacks. Cloud misconfiguration and lack of runtime protection can l eave
it wide open for thieves to steal.
The impact of data breaches depends on the type of data stolen. Thieves sell personally
identifiable information (PII) and personal health information (PHI) on the dark web to
those who want to steal identities or use the information in phishing emails.
Traditional data center security models are not suitable for the cloud. Administrators must
learn new strategies and skills specific to cloud computing.
Cloud may give organizations agility, but it can also open up vulnerabilities for
organizations that lack the internal knowledge and skills to understand security challenges
in the cloud effectively. Poor planning can manifest itself in misunderstanding the
implications of the shared responsibility model, which lays out the security duties of the
cloud provider and the user. This misunderstanding could lead to the exploitation of
unintentional security holes.
Identity and Access Management (IAM) is essential. While this may seem obvious, the
challenge lies in the details.
It’s a daunting task to create the necessary roles and permissions for an enterprise of
thousands of employees. There are three steps to a holistic IAM strategy: ro le design,
privileged access management, and implementation.
Begin with a solid role design based on the needs of those using the cloud. Design the
roles outside of any specific IAM system. These roles describe the work your employees
do, which won’t change between cloud providers.
Next, a strategy for privileged access management (PAM) outlines which roles require
more protection due to their privileges. Tightly control who has access to privileged
credentials and rotate them regularly.
Finally, it’s time to implement the designed roles within the cloud provider’s IAM service.
This step will be much easier after developing these ahead of time.
3. Shadow IT
Shadow IT is the result of employees adopting cloud services to do their jobs. The ease
with which cloud resources can be spun up and down makes controlling its growth
difficult. For example, developers can quickly spawn workloads using their accounts.
Unfortunately, assets created in this way may not be adequately secured and accessible via
default passwords and misconfigurations.
The adoption of DevOps complicates matters. Cloud and DevOps teams like to run fast
and without friction. However, obtaining the visibility and management levels that the
security teams require is difficult without hampering DevOps activities. DevOps needs a
frictionless way to deploy secure applications and directly integrate with their continuous
integration/continuous delivery (CI/CD) pipeline. There needs to be a unified approach
for security teams to get the information they need without slowing down DevOps. IT and
security need to find solutions that will work for the cloud — at DevOps’ velocity.
4. Cloud Compliance
Organizations have to adhere to regulations that protect sensitive data like PCI
DSS and HIPAA. Sensitive data includes credit card information, healthcare patient
records, etc. To ensure compliance standards are met, many organizations limit access and
what users can do when granted access. If access control measures are not set in place, it
becomes a challenge to monitor access to the network.
Each challenge is different and therefore requires unique solutions. Take the time to plan
before making use of any cloud services. A sound strategy takes into consideration any
common cloud challenges like the ones we’ve discussed here. Then you’ll have a plan of
action for each anticipated challenge.
Software-as-a-Service Security
SaaS security covers a range of practices that organizations implement to protect their assets
when using a SaaS architecture. According to the UK’s National Cyber Security Centre
(NCSC) SaaS security guidelines, responsibility for security is shared between the customer
and the service provider or software distributor. Additionally, vendors are introducing SaaS
Security Posture Management (SSPM) systems that can regulate and automate SaaS security.
Many organizations are well-experienced in handling the security risks associated with
Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) environments. IT and
security teams typically collaborate using integrated business processes and programs. There
is also a large market for IaaS and PaaS security and management tools.
SaaS applications tend to operate differently and offer advantages for organizations. However,
they can be harder to manage in terms of security:
The following practices are recommended for securing SaaS environments and assets.
1. Enhanced Authentication
Cloud providers can handle authentication in various ways, making it complicated to determine
how users should be given access to SaaS resources. Some vendors support integration with
identity providers that the customer can manage, such as Active Directory (AD) with Security
Assertion Markup Language, OpenID Connect and Open Authorization. Likewise, some
vendors support multi-factor authentication, while others do not.
To navigate the various SaaS offerings available, it is essential that the security team
understands which services are being used and the supported options for each service. This
context allows administrators to choose the right authentication method (or methods) according
to the organization’s needs.
A good option is to use single sign-on (SSO) tied to AD, if the SaaS provider supports it, as
this ensures that the account and password policies correlate to the services in use for the SaaS
application.
2. Data Encryption
The channels used to communicate with SaaS applications typically use Transport Layer
Security (TLS) to protect in-transit data. Some SaaS providers also offer encryption capabilities
for protecting data at rest. This could be a default feature or may need to be enabled.
Research the available security measures of each SaaS service in use to determine whether data
encryption is possible and make sure to enable the encryption when relevant.
Ensure you review and evaluate any potential SaaS provider. Make sure you understand how
the service is used and which security model is used to deliver the service, as well as any
available optional security features.
It is important to be able to track all SaaS usage given that usage patterns can be unexpected,
especially when applications are deployed rapidly. Make sure you search for new, untracked
SaaS usage and stay alert for unexpected changes.
Combine manual data collection techniques with automation tools, where possible, to keep up
with rapidly evolving SaaS usage and maintain a reliable, up-to-date inventory of the services
employed and who is using them.
5. CASB Tools
Consider using a Cloud Access Security Broker (CASB) solution for situations where the SaaS
provider does not provide an adequate level of security. CASB allows organizations to add
controls that are not included or natively-supported by SaaS providers.
Explore the tools available to address any shortcomings in the SaaS provider’s security model.
You should also pay attention to the different CASB deployment modes so you choose the
right deployment configuration (i.e. API or proxy-based) for your organization’s architecture.
6. Situational Awareness
Monitor your SaaS use and examine the data from tools like CASBs, and keep track of the data
and logs provided by the SaaS provider. IT and security executives must treat SaaS offerings
differently from ordinary websites, as they are robust tools demanding the same level of
security as any enterprise application.
Make sure you implement measures for systematic risk management when adopting SaaS
security best practices—this helps ensure that users employ SaaS safely and that your
organization’s SaaS usage remains protected.
SSPM ensures that SaaS applications are properly configured to protect them from
compromise. Cynet provides a leading SSPM solution that continuously monitors SaaS
applications to identify gaps between stated security policies and actual security posture, letting
you automatically find and fix security risks in SaaS assets, and automatically prioritize risks
and misconfigurations by severity.
• Automatic tracking of SaaS risks – tracks security posture across all SaaS platforms,
prioritized by risk category, tracked over time directly from the Cynet dashboard.
• Automatic analysis and fix in one click – drills down to provide details and insights
about every identified risk, recommends remediation actions, and applies them
automatically.
Cloud security governance refers to the management model that facilitates effective and
efficient security management and operations in the cloud environment so that an enterprise’s
business targets are achieved. This model incorporates a hierarchy of executive mandates,
performance expectations, operational practices, structures, and metrics that, when
implemented, result in the optimization of business value for an enterprise.
Strategic alignment, value delivery, risk mitigation, effective use of resources, and performance
measurement are key objectives of any IT-related governance model, security included. To
successfully pursue and achieve these objectives, it is important to understand the operational
culture and business and customer profiles of an enterprise, so that an effective security
governance model can be customized for the enterprise.
The lack of a senior management influenced and endorsed security policy is one of the common
challenges facing cloud customers. An enterprise security policy is intended to set the executive
tone, principles and expectations for security management and operations in the cloud.
However, many enterprises tend to author security policies that are often laden with tactical
content, and lack executive input or influence. The result of this situation is the ineffective
definition and communication of executive tone and expectations for security in the cloud. To
resolve this challenge, it is essential to engage enterprise executives in the discussion and
definition of tone and expectations for security that will feed a formal enterprise security policy.
It is also essential for the executives to take full accountability for the policy, communicating
inherent provisions to the enterprise, and subsequently enforcing compliance.
Many enterprises moving into the cloud environment tend to lack a formal operating model for
security, or do not have strategic and tactical roles and responsibilities properly defined and
operationalized. This situation stifles the effectiveness of a security management and
operational function/organization to support security in the cloud. Simply, establishing a
hierarchy that includes designating an accountable official at the top, supported by a
stakeholder committee, management team, operational staff, and third-party provider support
(in that order) can help an enterprise to better manage and control security in the cloud, and
protect associated investments in accordance with enterprise business goals. This hierarchy can
be employed in an in-sourced, out-sourced, or co-sourced model depending on the culture,
norms, and risk tolerance of the enterprise.
Another major challenge for cloud customers is the lack of defined metrics to measure security
performance and risks – a problem that also stifles executive visibility into the real security
risks in the cloud. This challenge is directly attributable to the combination of other challenges
discussed above. For example, a metric that quantitatively measures the number of exploitable
security vulnerabilities on host devices in the cloud over time can be leveraged as an indicator
of risk in the host device environment. Similarly, a metric that measures the number of user-
reported security incidents over a given period can be leveraged as a performance indicator of
staff awareness and training efforts. Metrics enable executive visibility into the extent to which
security tone and expectations (per established policy) are being met within the enterprise and
support prompt decision-making in reducing risks or rewarding performance as appropriate.
Cloud security governance facilitates the institution of a model that helps enterprises explicitly
address the challenges described above.
Enterprises should mandate that security investments, services, and projects in the
cloud are executed to achieve established business goals (e.g., market competitiveness,
financial, or operational performance).
2. Value Delivery
3. Risk Mitigation
It is important for enterprises to establish a practical operating model for managing and
performing security operations in the cloud, including the proper definition and
operationalization of due processes, the institution of appropriate roles and
responsibilities, and use of relevant tools for overall efficiency and effectiveness.
5. Sustained Performance
1. Identify the risk - The inception of the risk management process starts with the
identification of the risks that may negatively influence an organisation's strategy or
compromise cloud system security. Operational, performance, security, and privacy
requirements are identified. The organisation should uncover, recognise and describe
risks that might affect the working environment. Some risks in cloud computing include
cloud vendor risks, operational risks, legal risks, and attacker risks.
2. Analyze the risk - After the identification of the risk, the scope of the risk is analyzed.
The likelihood and the consequences of the risks are determined. In cloud computing,
the likelihood is determined as the function of the threats to the system, the
vulnerabilities, and consequences of these vulnerabilities being exploited. In analysis
phase, the organisation develops an understanding of the nature of risk and its potential
to affect organisation goals and objectives.
3. Evaluate the risk - The risks are further ranked based on the severity of the impact
they create on information security and the probability of actualizing. The organisation
then decides whether the risk is acceptable or it is serious enough to call for treatment.
4. Treat the risk - In this step, the highest-ranked risks are treated to eliminate or
modified to achieve an acceptable level. Risk mitigation strategies and preventive plans
are set out to minimise the probability of negative risks and enhance opportunities. The
security controls are implemented in the cloud system and are assessed by proper
assessment procedures to determine if security controls are effective to produce the
desired outcome.
5. Monitor or Review the risk - Monitor the security controls in the cloud infrastructure
on a regular basis including assessing control effectiveness, documenting changes to
the system and the working environment. Part of the mitigation plan includes following
up on risks to continuously monitor and track new and existing risks.
The steps of risk management process should be executed concurrently, by individuals or teams
in well-defined organisational roles, as part of the System Development Life Cycle (SDLC)
process. Treating security as an addition to the system, and implementing risk management
process in cloud computing independent to the SDLC is more difficult process that can incur
higher cost with a lower potential to mitigate risks.
1. Data Breach - Data breach stands for unauthorized access to the confidential data of
the organisation by a third party such as hackers. In cloud computing, the data of the
organisation is stored outside the premise, that is at the endpoint of the cloud
service provider(CSP). Thus any attack to target data stored on the CSP servers may
affect all of its customers.
2. Cloud Vendor Security Risk - Every organisation takes services offered by different
cloud vendors. The inefficiency of these cloud vendors to provide data security and risk
mitigation directly affects the organisation's business plan and growth. Also, migrating
from one vendor to another is difficult due to different interfaces and services provided
by these cloud vendors.
3. Availability - Any internet connection loss disrupts the cloud provider's services,
making the services inoperative. It can happen at both the user's and the cloud service
provider's end. An effective risk management plan should focus on availability of
services by creating redunadancy in servers on cloud such that other servers can provide
those services if one fails.
4. Compliance - The service provider might not follow the external audit process,
exposing the end user to security risks. If a data breach at the cloud service provider's
end exposes personal data, the organisation may be held accountable due to improper
protection and agreements.
Apart from these risks, cloud computing possesses various security risks bound under 2 main
categories.
• Internal Security Risks: Internal security risks in cloud computing include the
challenges that arise due to mismanagement by the organisation or the cloud service
provide. Some internal security risks involve:
1. Misconfiguration of settings - Misconfiguration of cloud security settings, either by
the organisation workforce or by the cloud service provider, exposes the risk of a data
breach. Most small businesses cloud security and risk management are inadequate for
protecting their cloud infrastructure.
2. Malicious Insiders - A malicious insider is a person working in the organisation and
therefore already has authorized access to the confidential data and resources of the
organization. With cloud deployments, organisations lack control over the underlying
infrastructure; making it very hard to detect malicious insiders.
• External Security Risks: External security risks are threats to an organisation arising
from the improper handling of the resources by its users and targeted attacks by hackers.
Some of the external security risks involve:
1. Unauthorized Access - The cloud-based deployment of the organisation's
infrastructure is outside the network perimeter and directly accessible from the public
internet. Therefore, it is easier for the attacker to get unauthorized access to the server
with the compromised credentials.
2. Accounts Hijacking - The use of a weak or repetitive password allows attackers to
gain control over multiple accounts using a single stolen password. Moreover,
organizations using cloud infrastructure cannot often identify and respond to such
threats.
3. Insecure APIs - The Application Programming Interfaces(APIs) provided by the cloud
service provider to the user are well-documented for ease of use. A potential attacker
might use this documentation to attack the data and resources of the organisation.
Above discussed risks are the primary security concern for individuals, businesses, and
organisations. If actualized, some risks may cause a business to close. These risks need to be
treated proactively by implementing risk management strategies. By implementing a risk
management plan and considering the various potential risks or events before they occur, an
organisation may save money and time and protect its future. This is because a robust risk
management plan will help an organisation establish procedures to prevent potential threats
and minimise their impact if they occur. This ability to understand and control risks allows
organisations to be more confident in their business decisions. Moreover, effective risk
management helps organisations to understand the processes deeply and provide information
that can be used to make informed decisions to provide increased levels of security and ensure
that the business remains profitable. In cloud computing, the organisation sets risk management
plans which help them to identify appropriate cloud vendors and service providers, make
proper service-level agreements and set up better budgeting plans.
An effective risk management process is a mix of coordinate governance and internal controls.
It coordinates the engagement of managers, employers, and stakeholders at each step to
embrace risk-taking as an avenue for growth and opportunity. The following are the best
practices to manage the risks in cloud computing:
1. Choose the cloud service provider wisely - Perform cloud vendor risk assessment for
contract clarity, availability, security, ethics, compliance, and legal liabilities. Make
sure, the cloud service provider(CSP) has service providers that can deliver the services
accordingly.
2. Deploy Technical Safeguards such as Cloud Access Security Broker - Cloud Access
Security Broker (CASB) are on-premise or cloud-based software which acts as
intermediary between cloud service providers and consumers, to monitor the activities
and enforce organisation security policy for accessing cloud applications.
3. Establish controls based on risk treatment - After identification, analysis, and
evaluation of the risk. Dedicated measures need to be taken to mitigate risks and drive
the business processes to improve. Organisations should delete unwanted data from the
hosted cloud.
4. Optimized cloud service model - Adopt a cloud service model that promotes
achieving a business solution, minimizes risks, and optimizes cloud investment cost.
5. Strategize Availability of Services - Create redundancy of servers by regions and
zones. In this way, if one connection fails, it will not stop the operation of the services.
Cloud security monitoring is the practice of continuously supervising both virtual and physical
servers to analyze data for threats and vulnerabilities. Cloud security monitoring solutions often
rely on automation to measure and assess behaviors related to data, applications and
infrastructure.
Cloud security monitoring solutions can be built natively into the cloud server hosting
infrastructure (like AWS’s CloudWatch, for example) or they can be third-party solutions that
are added to an existing environment (like Blumira). Organizations can also perform cloud
monitoring on premises using existing security management tools.
Like a SIEM, cloud security monitoring works by collecting log data across servers. Advanced
cloud monitoring solutions analyze and correlate gathered data for anomalous activity, then
send alerts and enable incident response. A cloud security monitoring service will typically
offer:
1. Visibility. Moving to the cloud inherently lowers an organization’s visibility
across their infrastructure, so cloud monitoring security tools should bring a
single pane of glass to monitor application, user and file behavior to identify
potential attacks.
2. Scalability: Cloud security monitoring tools should be able to monitor large
amounts of data across a variety of distributed locations.
3. Auditing: It’s a challenge for organizations to manage and meet compliance
requirements, so cloud security monitoring tools should provide robust auditing
and monitoring capabilities.
4. Continuous monitoring: Advanced cloud security monitoring solutions should
continuously monitor behavior in real time to quickly identify malicious activity
and prevent an attack.
5. Integration: To maximize visibility, a cloud monitoring solution should ideally
integrate with an organization’s existing services, such as productivity suites
(i.e. Microsoft 365 and G Suite), endpoint security solutions
(i.e. Crowdstrike and VMware Carbon Black) and identity and authentication
services (i.e. Duo and Okta).
1. Lack of cloud security strategy: Many organizations hastily migrate to the cloud to
support remote work without developing a clear cloud security strategy. Without a clear
strategy, an organization will not be able to fully reap the benefits of a cloud security
monitoring solution.
2. Alert fatigue: Many cloud monitoring products are noisy, which can result in IT and
security teams lacking insight into what’s important to focus on. A FireEye study
revealed that some organizations receive up to 10,000 alerts per month from security
products. Cloud monitoring solutions with prioritized alerts can reduce the noise and
chances of receiving false positives, which provides higher security value.
3. Lack of context: Logs and alerts are only valuable if an organization understands how
to interpret them. Security teams should understand what they want to monitor and why;
once they receive alerts, they should know which actions to take. A best-in-class threat
detection and response platform will provide remediation steps and playbooks in
addition to prioritized alerts.
These cloud security monitoring best practices will help you to be strategic, gain visibility into
your environment and provide layers of security that will protect against threats:
1. Carefully evaluate cloud service providers: The big three cloud service providers
(Google, Amazon and Microsoft) are fairly comparable when it comes to security.
Regardless of the vendor, organizations should evaluate levels of compliance and
data/network availability to ensure that it fits their needs.
2. Perform a cloud infrastructure inventory: Security teams should do a deep dive into
their existing cloud infrastructure to understand potential risks, such as shadow IT.
Organizations should perform regular audits and know what changes were made within
their cloud environments to help identify causes of misconfigurations.
3. Take a layered approach to cloud security: Setting up layers of security can help
organizations to achieve the most visibility into their tech stack. Native cloud
monitoring tools such as AWS GuardDuty can help with that, but it’s important to bring
in specialized tools to address different components of the tech stack, from physical
hardware to orchestration.
Security Architecture Design
Security in cloud computing is a major concern. Proxy and brokerage services should be
employed to restrict a client from accessing the shared data directly. Data in the cloud should
be stored in encrypted form.
Before deploying a particular resource to the cloud, one should need to analyze several aspects
of the resource, such as:
o A select resource needs to move to the cloud and analyze its sensitivity to risk.
o Consider cloud service models such as IaaS, PaaS,and These models require the
customer to be responsible for Security at different service levels.
o Consider the cloud type, such as public, private, community, or
o Understand the cloud service provider's system regarding data storage and its transfer
into and out of the cloud.
o The risk in cloud deployment mainly depends upon the service models and cloud types.
The Cloud Security Alliance (CSA) stack model defines the boundaries between each service
model and shows how different functional units relate. A particular service model defines the
boundary between the service provider's responsibilities and the customer. The following
diagram shows the CSA stack model:
o IaaS is the most basic level of service, with PaaS and SaaS next two above levels of
services.
o Moving upwards, each service inherits the capabilities and security concerns of the
model beneath.
o IaaS provides the infrastructure, PaaS provides the platform development environment,
and SaaS provides the operating environment.
o IaaS has the lowest integrated functionality and security level, while SaaS has the
highest.
o This model describes the security boundaries at which cloud service providers'
responsibilities end and customers' responsibilities begin.
o Any protection mechanism below the security limit must be built into the system and
maintained by the customer.
Although each service model has a security mechanism, security requirements also depend on
where these services are located, private, public, hybrid, or community cloud.
Since all data is transferred using the Internet, data security in the cloud is a major concern.
Here are the key mechanisms to protect the data:
o access control
o audit trail
o certification
o authority
The service model should include security mechanisms working in all of the above areas.
Since the data stored in the cloud can be accessed from anywhere, we need to have a mechanism
to isolate the data and protect it from the client's direct access.
Broker cloud storage is a way of separating storage in the Access Cloud. In this approach,
two services are created:
1. A broker has full access to the storage but does not have access to the client.
2. A proxy does not have access to storage but has access to both the client and the broker.
3. Working on a Brocade cloud storage access system
4. When the client issues a request to access data:
5. The client data request goes to the external service interface of the proxy.
6. The proxy forwards the request to the broker.
7. The broker requests the data from the cloud storage system.
8. The cloud storage system returns the data to the broker.
9. The broker returns the data to the proxy.
10. Finally, the proxy sends the data to the client.
Encryption helps to protect the data from being hacked. It protects the data being transferred
and the data stored in the cloud. Although encryption helps protect data from unauthorized
access, it does not prevent data loss.
The difference between "cloud security" and "cloud security architecture" is that the former is
built from problem-specific measures while the latter is built from threats. A cloud security
architecture can reduce or eliminate the holes in Security that point-of-solution approaches are
almost certainly about to leave.
It does this by building down - defining threats starting with the users, moving to the cloud
environment and service provider, and then to the applications. Cloud security architectures
can also reduce redundancy in security measures, which will contribute to threat mitigation and
increase both capital and operating costs.
The cloud security architecture also organizes security measures, making them more consistent
and easier to implement, particularly during cloud deployments and redeployments. Security
is often destroyed because it is illogical or complex, and these flaws can be identified with the
proper cloud security architecture.
The goal of the cloud security architecture is accomplished through a series of functional
elements. These elements are often considered separately rather than part of a coordinated
architectural plan. It includes access security or access control, network security, application
security, contractual Security, and monitoring, sometimes called service security. Finally, there
is data protection, which are measures implemented at the protected-asset level.
A complete cloud security architecture addresses the goals by unifying the functional elements.
The security and security architectures for the cloud are not single-player processes. Most
enterprises will keep a large portion of their IT workflow within their data centers, local
networks, and VPNs. The cloud adds additional players, so the cloud security architecture
should be part of a broader shared responsibility model.
A shared responsibility model is an architecture diagram and a contract form. It exists formally
between a cloud user and each cloud provider and network service provider if they are
contracted separately.
Each will divide the components of a cloud application into layers, with the top layer being the
responsibility of the customer and the lower layer being the responsibility of the cloud provider.
Each separate function or component of the application is mapped to the appropriate layer
depending on who provides it. The contract form then describes how each party responds.
Data Security
Cloud data security is the combination of technology solutions, policies, and procedures that
the enterprise implements to protect cloud-based applications and systems, along with the
associated data and user access.
The core principles of information security and data governance—
data confidentiality, integrity, and availability (known as the CIA triad)—also apply to the
cloud:
While cybersecurity threats that apply to on-premises infrastructure also extend to cloud
computing, the cloud brings additional data security threats. Here are some of the common
ones:
Data security in the cloud starts with identity governance. Organizations need a
comprehensive, consolidated view of data access across its on-premises and cloud platforms
and workloads. Identity governance provides:
In addition to governance, other recommended data security safeguards for cloud computing
include:
Deploy encryption. Ensure that sensitive and critical data, such as PII and intellectual
property, is encrypted both in transit and at rest. Not all vendors offer encryption, and the
enterprise should consider implementing a third-party encryption solution for added protection.
Back up the data. While vendors have their own backup procedures, it’s essential to back up
cloud data locally as well. Use the 3-2-1 rule for data backup: Keep at least three copies, store
them on at least two different media, and keep at least one backup offsite (in the case of the
cloud, the offsite backup could be the one executed by the vendor).
Implement identity and access management (IAM). IAM technology and policies ensure
that the right people have appropriate access to data, and this framework needs to encompass
the cloud environment. Besides identity governance, IAM components include access
management (such as single sign-on, or SSO) and privileged access management.
Manage organizational password policies. Poor password hygiene is frequently the cause of
data breaches and other security incidents. Use password management solutions to make it
simple for employees and other end users to maintain secure password practices.
Today's applications are frequently available over multiple networks and connected to the
cloud, they are more vulnerable to security attacks and breaches. There is increasing pressure
and incentive to assure security not only at the network level but also within individual
applications. One explanation for this is because hackers are focusing their attacks on
applications more now than in the past. Application security testing can expose application-
level flaws, assisting in the prevention of these attacks.
The faster and earlier you can detect and resolve security concerns in the software development
process, the safer your company will be. Because everyone makes mistakes, the trick is to
identify them as soon as possible.
Application security tools that integrate with your development environment can make this
process and workflow much easier and more efficient. These tools are especially beneficial for
compliance audits, as they can save time and resources by detecting issues before the auditors
notice them. The changing nature of how enterprise applications are built over the last many
years has aided the rapid expansion of the application security industry.
Authentication, authorization, encryption, logging, and application security testing are all
examples of application security features. Developers can also use code to reduce security
flaws in applications.
Authentication
When developers include protocols in an application to ensure that only authorized users have
access to it. Authentication procedures verify that the user is who they claim to be. When
logging into an application, this can be performed by requiring the user to supply a user name
and password. Multi-factor authentication necessitates the use of multiple forms of
authentication, such as something you know (a password), something you have (a mobile
device), and something you are (a biometric).
Authorization
A user may be authorized to access and use the application after being authenticated. By
comparing the user's identification to a list of authorized users, the system may verify that the
user has permission to access the application. In order for the application to match only
validated user credentials to the approved user list, authentication must take place before
authorization.
Encryption
Other security measures can safeguard sensitive data from being seen or utilized by a
cybercriminal after a user has been verified and is using the application. Traffic containing
sensitive data that flows between the end-user and the cloud in cloud-based applications can
be encrypted to keep the data safe.
Logging
If a security breach occurs in an application, logging can assist in determining who gained
access to the data and how they did so. Application log files keep track of which parts of the
application have been accessed and by whom.
• Static Application Security Testing (SAST): SAST aids in the detection of code flaws
by examining the application source files for the root cause. The ability to compare
static analysis scan results with real-time solutions speeds up the detection of security
problems, decreasing MTTR and enabling collaborative troubleshooting.
• Interactive Application Security Testing (IAST): IAST combines parts of SAST and
DAST by performing analysis in real-time or at any moment during the development
or production process from within the application. IAST has access to all of the
application's code and components, allowing it to produce more accurate results and
provide more in-depth access than previous versions.
• Run-time Application Security Protection (RASP): RASP also works within the
application, but it is more concerned with security than with testing. RASP provides
continuous security checks and automatic responses to possible breaches, which
includes terminating the session and informing IT teams.
Different approaches will uncover different subsets of the application's security flaws, and
they'll be most effective at different stages of the development lifecycle. They all reflect the
various time, effort, cost, and vulnerability trade-offs.
• Design Review: The architecture and design of the application can be examined for
security flaws before code is created. The construction of a threat model is a popular
strategy used at this phase.
• White-box Security Review or Code Review: A security engineer delves into the
application by manually inspecting the source code and looking for security issues.
Vulnerabilities unique to the application can be discovered through understanding the
application.
• Black-box Security Audit: This is accomplished solely through the use of an
application to test it for security flaws; no source code is necessary.
• Automated Tooling: Many security tools can be automated by including them in the
development or testing process. Automated DAST/SAST tools that are incorporated
into code editors or CI/CD systems are examples.
Security issues with web applications range from large-scale network disruption to focused
database tampering. The following are some application security threats:
• SQL injection (SQLi) is a technique used by hackers to exploit database flaws. These
attacks, in particular, can reveal user identities and passwords, as well as enabling
attackers to edit or destroy data, as well as modify or create user rights.
• Hackers employ cross-site request forgery (CSRF) to mimic authorized users after
duping them into submitting an authorization request. Since their accounts have
additional permissions, high-level users are obviously frequent targets of this strategy,
and once the account is compromised, the attacker can remove, change, or destroy data.
• The buffer overflow occurs when malicious code is injected into the system's
designated memory region. Overflowing the buffer zone's capacity causes surrounding
areas of the application's memory to be overwritten with data, posing a security risk.
To secure virtual machines in cloud computing, the first step is to segregate the newly hosted
components. Let’s take an example where three features that are now running on an edge
device may be placed in the cloud either as part of a private subnetwork that is invisible or
as part of the service data plane, with addresses that are accessible to network users.
Before allowing virtual features and functions to be implemented, you must confirm that they
comply with security standards as step two of cloud-virtual security. Virtual networking is
subject to outside attacks, which can be dangerous, but insider attacks can be disastrous.
When a feature with a backdoor security flaw is added to a service, it becomes a part of the
infrastructure of the service and is far more likely to have unprotected attack paths to other
infrastructure pieces.
3. Separate Management APIs to Protect the Network
The third step is to isolate service from infrastructure management and orchestration.
Because they are created to regulate features, functions, and service behaviors, management
APIs will always pose a significant risk. All such APIs should be protected, but the ones that
keep an eye on infrastructure components that service users should never access must also be
protected.
The fourth and last aspect of cloud virtual network security is to make sure that connections
between tenants or services do not cross over into virtual networks. Virtual Networking is
a fantastic approach to building quick connections to scaled or redeployed features, but
each time a modification is made to the virtual network, it’s possible that an accidental
connection will be made between two distinct services, tenants, or feature/function
deployments. A data plane leak, a link between the actual user networks, or a management
or control leak could result from this, allowing one user to affect the service provided to
another.
IAM is a cloud service that controls the permissions and access for users and cloud resources.
IAM policies are sets of permission policies that can be attached to either users or cloud
resources to authorize what they access and what they can do with it.
Services that don’t expose any underlying infrastructure rely heavily on IAM for security. For
example, consider an application that follows this flow: a Simple Notification Service (SNS)
topic triggers a Lambda function, which in turn puts an item in a DynamoDB table. In this type
of application, there is no network to inspect, so identity and permissions become the most
significant aspects of security.
As an example of the impact of a strict (or over-permissive) IAM profile, let’s consider the
Lambda function. The function is only supposed to put items in the DynamoDB table. What
happens if the function has full DynamoDB permissions? If the function is compromised for
whatever reason, the DynamoDB table is immediately compromised as well, since the function
could be leveraged to exfiltrate data.
If the IAM profile follows the “least-privilege” principle and only allows the function to put
items in the table, the blast radius will be greatly reduced in the case of an incident. A hands-
on example of this can be found in this CNCF webinar.
Managing a large number of privileged users with access to an ever-expanding set of services
is challenging. Managing separate IAM roles and groups for these users and resources adds yet
another layer of complexity. Cloud providers like AWS and Google Cloud help customers
solve these problems with tools like the Google Cloud IAM recommender (currently in beta)
and the AWS IAM access advisor. These tools attempt to analyze the services last accessed by
users and resources, and help you find out which permissions might be over-privileged.
These tools indicate that cloud providers recognize these access challenges, which is definitely
a step in the right direction. However, there are a few more challenges we need to consider.
Effective permissions
Considering that users and services have more than one permission set attached to them,
understanding the effective permissions of an entity becomes difficult.
Multi-cloud
According to RightScale, more than 84% of organizations use a multi-cloud strategy. Each
provider has its own policies, tools and terminology. There is no common language that helps
you understand relationships and permissions across cloud providers.
IAM is only one, albeit crucial, aspect of cloud security. Businesses must look at IAM as a part
of their overall security posture and add an integrated layer of security across their application
lifecycle. We’d be remiss if we didn’t mention that this is where a Cloud Native Security
Platform such as Prisma Cloud would come in handy.