What Is Cloud Infrastructure Security
What Is Cloud Infrastructure Security
Public cloud infrastructure is, in many ways, more vulnerable than on-premises
infrastructure because it can easily be exposed to public networks, and is not located
behind a secure network perimeter. However, in a private or hybrid cloud, security is still
a challenge, as there are multiple security concerns due to the highly automated nature
of the environment, and numerous integration points with public cloud systems.
Cloud security has different implications in different cloud infrastructure models. Here
are considerations for security in each of the three popular models—public cloud,
private cloud, and hybrid cloud.
In a public cloud, the cloud provider takes responsibility for securing the infrastructure,
and provides tools that allow the organization to secure its workloads. Your organization
is responsible for:
The private cloud model gives you control over all layers of the stack. These resources
are commonly not exposed to the public Internet. This means that you can achieve a
certain level of security using traditional mechanisms that protect the corporate network
perimeter. However, there are additional measures you should take to secure your
private cloud:
Use cloud native monitoring tools to gain visibility over any anomalous behavior
in your running workloads.
Monitor privileged accounts and resources for suspicious activity to detect insider
threats. Malicious users or compromised accounts can have severe
consequences in a private cloud, because of the ease at which resources can be
automated.
Ensure complete isolation between virtual machines, containers, and host
operating systems, to ensure that compromise of a VM or container does not
allow compromise of the entire host.
Virtual machines should have dedicated NICs or VLANs, and hosts should
communicate over the network using a separate network interface.
Plan ahead and prepare for hybrid cloud by putting security measures in place to
ensure that you can securely integrate with public cloud services
Hybrid clouds are a combination of on-premise data center, public cloud, and private
cloud. The following security considerations are important in a hybrid cloud
environment:
Ensure public cloud systems are secured using all the best practices.
Private cloud systems should follow private cloud security best practices, as well
as traditional network security measures for the local data center.
Avoid separate security strategies and tools in each environment—adopt a single
security framework that can provide controls across the hybrid environment.
Identify all integration points between environments, treat them as high-risk
components and ensure they are secured.
Here are key best practices to securing the key components of a typical cloud
environment.
Accounts
Service accounts in the cloud are typically privileged accounts, which may have access
to critical infrastructure. Once compromised, attackers have access to cloud networks
and can access sensitive resources and data.
Service accounts may be created automatically when you create new cloud resources,
scale cloud resources, or stand up environments using infrastructure as code (IaC). The
new accounts may have default settings, which in some cases means weak or no
authentication.
Use identity and access management (IAM) to set policies controlling access and
authentication to service accounts. Use a cloud configuration monitoring tool to
automatically detect and remediate non-secured accounts. Finally, monitor usage of
sensitive accounts to detect suspicious activity and respond.
Servers
While a cloud environment is virtualized, behind the scenes it is made up of physical
hardware deployed at multiple geographical locations. This includes physical servers,
storage devices, load balancers, and network equipment like switches and routers.
Here are a few ways to secure a cloud server, typically deployed using a compute
service like Amazon EC2:
Hypervisors
A hypervisor runs on physical hardware, and makes it possible to run several virtual
machines (VMs), each with a separate operating system.
All cloud systems are based on hypervisors. Therefore, hypervisors are a key security
concern, because compromise of the hypervisor (an attack known as hyperjacking)
gives the attacker access to all hosts and virtual machines running on it.
In public cloud systems, hypervisor security is the responsibility of the cloud provider,
so you don’t need to concern yourself with it. There is one exception—when running
virtualized workloads on a public cloud, using systems like VMware Cloud, you are
responsible for securing the hypervisor.
In private cloud systems, the hypervisor is always under your responsibility. Here are
a few ways to ensure your hypervisor is secure:
Storage
In cloud systems, virtualization is used to abstract storage from hardware systems.
Storage systems become elastic pools of storage, or virtualized resources that can be
provisioned and scaled automatically.
Databases
Databases in the cloud can easily be exposed to public networks, and almost always
contain sensitive data, making them an imminent security risk. Because databases are
closely integrated with the applications they serve and other cloud systems, those
adjacent systems must also be secured to prevent compromise of the database.
Network
Here are a few ways you can secure cloud networks:
Cloud systems often connect to public networks, but also use virtual networks to enable
communication between components inside a cloud. All public cloud providers let you
set up a secure, virtual private network for your cloud resources ( called a VPC in
Amazon and a VNet in Azure).
Use security groups to define rules that define what traffic can flow between
cloud resources. Keep in mind that security groups are tightly connected to
compute instances, and compromise of an instance grants access to the security
group configuration, so additional security layers are needed.
Use Network Access Control Lists (ACL) to control access to virtual private
networks. ACLs provide both allow and deny rules, and provide stronger security
controls than security groups.
Use additional security solutions such as firewalls as a service (FWaaS) and web
application firewalls (WAF) to actively detect and block malicious traffic.
Deploy Cloud Security Posture Management (CSPM) tools to automatically
review cloud networks, detect non-secure or vulnerable configurations and
remediate them.
Kubernetes
When running Kubernetes on the cloud, it is almost impossible to separate the
Kubernetes cluster from other cloud computing layers. These include the application or
code itself, container images, compute instances, and network layers. Each layer is built
on top of the previous layer, and all layers must be protected for defense in depth.
The Kubernetes project recommends approaching security from four angles, known as
the “4 Cs”:
Compliance with security best practices, industry standards and benchmarks, and
internal organizational strategies in a cloud-native environment also face challenges.