0% found this document useful (0 votes)
9 views7 pages

Unit 5 - Understanding of Cloud Security

The document provides an overview of cloud security, emphasizing the integration of policies, controls, and technologies to protect cloud infrastructure and data from various threats. It discusses the importance of understanding security boundaries between cloud providers and customers, the role of encryption, and the necessity of auditing and compliance in cloud environments. Additionally, it covers identity management and the use of standardized protocols for secure access and interoperability across cloud services.

Uploaded by

adityayevate07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views7 pages

Unit 5 - Understanding of Cloud Security

The document provides an overview of cloud security, emphasizing the integration of policies, controls, and technologies to protect cloud infrastructure and data from various threats. It discusses the importance of understanding security boundaries between cloud providers and customers, the role of encryption, and the necessity of auditing and compliance in cloud environments. Additionally, it covers identity management and the use of standardized protocols for secure access and interoperability across cloud services.

Uploaded by

adityayevate07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Unit 5: Understanding of Cloud Security

1. Securing the Cloud


• Cloud security is the integration of policies, controls, procedures, and
technologies that together provide protection for cloud-based
infrastructure, systems, and data. These mechanisms are essential to
defend cloud environments against a wide spectrum of threats, both
external (e.g., hackers, malware) and internal (e.g., insider threats,
misconfigurations).
• These security strategies are designed to ensure data integrity, privacy,
confidentiality, and availability. This includes the use of access
controls, network segmentation, monitoring systems, and endpoint
protections to enforce secure interactions between cloud services and
users.
• A key aspect of securing the cloud is establishing and enforcing
authentication rules. These rules control access to resources by
individual users or devices, ensuring that only authorized entities can
interact with sensitive data or systems.
• Cloud security solutions also support regulatory compliance by
integrating audit trails, encryption, and policy enforcement mechanisms.
These are necessary for organizations that must comply with standards
such as GDPR, HIPAA, or ISO 27001.
• Businesses can tailor their cloud security strategies to their unique
operational and industry-specific needs, providing flexible, scalable, and
responsive protection mechanisms.

2. The Security Boundary


• The security boundary in cloud computing represents the clear
separation between what is managed by the cloud provider and what is
the responsibility of the customer. This is crucial to prevent
assumptions about who secures what, which could lead to vulnerabilities.
• The Cloud Security Alliance (CSA) plays a major role in defining this
boundary and in promoting security best practices across the industry.
CSA works with academia, government bodies, and industry leaders to
educate and guide organizations on establishing safe cloud environments.
• Customers are typically responsible for securing their data, identity and
access management (IAM), and client-side operations, while providers
secure the underlying infrastructure. Misunderstanding this boundary can
lead to misconfigurations or unprotected data.
• The boundary also helps in defining liability in case of a data breach. For
instance, in a SaaS model, most of the responsibility lies with the
provider, but in an IaaS model, the customer has far more control—and
thus more responsibility.

3. Security Service Boundary


• The security service boundary differs based on the cloud service
model: SaaS, PaaS, or IaaS. It identifies which layers of the stack the
provider secures and which ones the customer must handle.
• In a SaaS (Software as a Service) model, the provider is responsible for
everything — application, middleware, runtime, OS, and infrastructure.
Security here is embedded into the service agreement (SLA), and the
customer’s role is primarily to manage user access and data input.
• In PaaS (Platform as a Service), the provider secures infrastructure and
the platform layer (middleware, runtime), while customers are
responsible for their applications and user data. This model gives more
flexibility but requires more security awareness from the user.
• In IaaS (Infrastructure as a Service), the provider only secures the
underlying hardware and virtualization layers. Customers must secure the
OS, apps, data, and network configurations. IaaS offers the most control
but also the highest risk if mismanaged.
• Therefore, the security service boundary helps organizations align their
internal policies with the division of responsibility, reducing potential
gaps in their security posture.

4. Security Mapping
• Security mapping is the process of aligning cloud deployment models
with the specific security features and compliance requirements needed
for an application or service. This ensures that the appropriate
mechanisms are in place at the right level.
• For each cloud service model (SaaS, PaaS, IaaS), a different security
control model must be applied. Mapping helps identify whether the
service provider, the customer, or a third-party is responsible for each
control (e.g., data protection, encryption, logging).
• A security control model includes protections for applications, data,
network configurations, management operations, and physical
infrastructure. Each layer must be assessed for threats and defended with
relevant controls.
• Proper security mapping is crucial for risk management, ensuring no
layer is left unprotected. It also supports compliance audits and the
maintenance of security policies that adhere to regulatory frameworks.

5. Securing Data
• Data security in the cloud is the most critical concern for most
organizations. Data in cloud environments is constantly moving—in
transit, at rest, and in use—and must be protected across all states.
• Key mechanisms for securing data include access control, auditing,
authentication, and authorization. These ensure only authorized users
and applications can interact with the data and that all actions are logged
for accountability.
• In many environments, organizations use encryption for both stored data
and data in transit. This prevents unauthorized interception and reading of
sensitive information.
• Businesses must understand how their cloud provider handles data: where
it is stored (geographically), how it is transferred, and what mechanisms
exist for backup, recovery, and incident response.
• It is also vital to understand data sensitivity and apply differentiated
security levels based on the criticality and compliance requirements of the
data (e.g., financial vs. public data).

6. Brokered Cloud Storage Access


• Brokered Cloud Storage Access is a design model to isolate client
access from the actual cloud storage. This improves security by
preventing direct access to data by the client.
• The model uses two key components:
o A Broker, which has full access to storage but cannot directly
interact with the client.
o A Proxy, which interfaces with the client but does not access the
storage directly.
• When a client requests data, the proxy receives it and forwards it to the
broker, which then retrieves the data from storage and returns it through
the proxy. This structure limits exposure and allows better enforcement of
access controls.
• This approach supports role separation, least privilege, and data flow
monitoring. It also helps in preventing data manipulation or exfiltration
by unauthorized sources.
• The broker can be configured to allow only certain actions (e.g., READ
and QUERY), while blocking others (like DELETE or APPEND),
further securing data integrity.
7. Storage Location and Tenancy
• In cloud computing, data storage is distributed across multiple
locations, which could be in different cities, countries, or even
continents. This geographical distribution brings performance and
scalability benefits, but also introduces concerns about data sovereignty
and jurisdictional laws.
• Cloud environments are multi-tenant by default, meaning data from
multiple clients is stored on shared infrastructure. Cloud providers
implement data segregation techniques, such as virtualization and
encrypted containers, to ensure that one tenant's data is not accessible to
another.
• It is important for users to understand how their cloud provider
manages tenancy and storage zones. This includes knowing whether the
data is co-located with other clients, how securely it is partitioned, and
what access control models are in place.
• Most providers store data in encrypted form, but this adds complexity —
especially in data recovery and key management. If encryption keys are
lost or mismanaged, the data could become permanently inaccessible.

8. Encryption
• Encryption is a foundational cloud security measure that protects data
both in transit (moving across networks) and at rest (stored in cloud
systems). It ensures confidentiality and integrity, making intercepted
data unreadable without the decryption key.
• Strong encryption protocols are necessary to establish a virtual private
storage that mimics on-premise privacy within a public cloud setting.
This enables organizations to leverage cloud benefits without
compromising on sensitive data protection.
• Key management is a vital component of encryption. Cloud platforms
like AWS and Microsoft Azure support multiple keys per client and
allow key rotation to enhance security. Secure key stores with restricted
access, backup mechanisms, and lifecycle management policies are often
used.
• Separation of key management from the cloud provider is considered
best practice. This minimizes the risk in case of provider compromise and
gives the organization more control over who can decrypt the data.

9. Auditing and Compliance


• Auditing in cloud environments involves the recording, monitoring, and
evaluation of system events to ensure that operations comply with
security policies and regulatory standards. This goes hand-in-hand with
logging, which stores the actual records of those events.
• Logs should capture at a minimum: system events, application-level
events, and security-related incidents. These provide traceability and
support incident detection, forensic analysis, and compliance
reporting.
• One challenge in cloud auditing is that providers often use proprietary
log formats. Therefore, your auditing tools must be capable of
interpreting these formats and correlating data across multiple systems or
geographic locations.
• Because of the multi-tenant and multi-site nature of cloud services,
audit logs may be scattered across regions and servers, complicating
data aggregation and analysis. Proper tools and service-level agreements
(SLAs) are critical to ensure you can meet audit requirements.

10. Establishing Identity and Presence


• Identity management is central to controlling access to cloud resources.
It ensures that users are authenticated, their roles are enforced, and their
access is limited to what's necessary. This prevents unauthorized data
access and supports role-based control.
• IDaaS (Identity as a Service) is a cloud-based identity management
solution offered by third parties. It supports functionalities like Single
Sign-On (SSO), multi-factor authentication, and directory
synchronization.
• Presence information complements identity by signaling a user's
availability and location. It’s used in services like VoIP, instant
messaging, and geo-location apps to provide contextual access or
service delivery. For example, access might be restricted if a user is
detected to be outside a specific region.
• Together, identity and presence systems enable dynamic access control,
improve collaboration, and support context-aware security policies.

11. Identity Protocol Standards


• Cloud environments depend on standardized identity protocols to support
secure, portable, and interoperable identity management. These
protocols allow identity data to be exchanged across systems and service
providers.
• Key protocols include:
o OpenID – Provides a framework for federated identity and Single
Sign-On (SSO). It enables users to authenticate via a trusted
identity provider and then use services across platforms.
o SAML (Security Assertion Markup Language) and XACML
(eXtensible Access Control Markup Language) – Support secure
authentication and authorization data exchange between identity
providers and service providers.
o OAuth – Offers token-based access control. It allows services to
grant limited access to users without exposing credentials like
passwords. The token has a defined expiry time and can be scoped
to specific resources.
• These standards ensure that identity verification is secure, portable
across platforms, and independent of specific vendors, making them
ideal for hybrid or multi-cloud environments.

12. Windows Azure Identity Standards


• Microsoft Azure uses a claims-based identity system that leverages
open authentication and authorization protocols. This approach allows
seamless integration between cloud and on-premise applications using
standardized identity frameworks.
• The Azure identity framework is built on three main components:
o Active Directory Federation Services (ADFS) 2.0 – A Security
Token Service (STS) that issues tokens containing identity claims.
It enables users to access cloud applications using their on-prem
credentials.
o Azure AppFabric Access Control Service (ACS) – Supports
claims-based access control, allowing applications to make access
decisions based on the user’s identity and roles.
o Windows Identity Foundation (WIF) – A .NET framework that
provides developers with APIs for implementing claims-aware
applications. It integrates with WS-Security and supports SAML
tokens.
• Together, these services allow Azure to offer robust identity federation,
enabling single sign-on (SSO) and secure access control across hybrid
cloud environments.

You might also like