Unit 5 - Understanding of Cloud Security
Unit 5 - Understanding of Cloud Security
4. Security Mapping
• Security mapping is the process of aligning cloud deployment models
with the specific security features and compliance requirements needed
for an application or service. This ensures that the appropriate
mechanisms are in place at the right level.
• For each cloud service model (SaaS, PaaS, IaaS), a different security
control model must be applied. Mapping helps identify whether the
service provider, the customer, or a third-party is responsible for each
control (e.g., data protection, encryption, logging).
• A security control model includes protections for applications, data,
network configurations, management operations, and physical
infrastructure. Each layer must be assessed for threats and defended with
relevant controls.
• Proper security mapping is crucial for risk management, ensuring no
layer is left unprotected. It also supports compliance audits and the
maintenance of security policies that adhere to regulatory frameworks.
5. Securing Data
• Data security in the cloud is the most critical concern for most
organizations. Data in cloud environments is constantly moving—in
transit, at rest, and in use—and must be protected across all states.
• Key mechanisms for securing data include access control, auditing,
authentication, and authorization. These ensure only authorized users
and applications can interact with the data and that all actions are logged
for accountability.
• In many environments, organizations use encryption for both stored data
and data in transit. This prevents unauthorized interception and reading of
sensitive information.
• Businesses must understand how their cloud provider handles data: where
it is stored (geographically), how it is transferred, and what mechanisms
exist for backup, recovery, and incident response.
• It is also vital to understand data sensitivity and apply differentiated
security levels based on the criticality and compliance requirements of the
data (e.g., financial vs. public data).
8. Encryption
• Encryption is a foundational cloud security measure that protects data
both in transit (moving across networks) and at rest (stored in cloud
systems). It ensures confidentiality and integrity, making intercepted
data unreadable without the decryption key.
• Strong encryption protocols are necessary to establish a virtual private
storage that mimics on-premise privacy within a public cloud setting.
This enables organizations to leverage cloud benefits without
compromising on sensitive data protection.
• Key management is a vital component of encryption. Cloud platforms
like AWS and Microsoft Azure support multiple keys per client and
allow key rotation to enhance security. Secure key stores with restricted
access, backup mechanisms, and lifecycle management policies are often
used.
• Separation of key management from the cloud provider is considered
best practice. This minimizes the risk in case of provider compromise and
gives the organization more control over who can decrypt the data.