Unit 4
Unit 4
Firewall is the central part of cloud architecture. The firewall protects the
network and the perimeter of end-users. It also protects traffic between
various apps stored in the cloud.
Access control protects data by allowing us to set access lists for various
assets. For example, you can allow the application of specific
employees while restricting others. It's a rule that employees can access
the equipment that they required. We can keep essential documents which
are stolen from malicious insiders or hackers to maintaining strict access
control.
More than 90% of malware comes via email. It is often reassuring that
employee's download malware without analysingit. Malicious software
installs itself on the network to steal files or damage the content once it is
downloaded.
Data redundancy provides the option to pay a ransom for your data. You can
get that was stolen with minimal service interruption.
DDoS Security
Distributed Denial of Service (DDoS)is flooded with requests. Website
slows down the downloading until it crashes to handle the number of
requests.
DDoS attacks come with many serious side effects. Most of the companies
suffering from DDoS attacks lose $ 10,000 to $ 100,000. Many businesses
damage reputation when customers lose confidence in the brand. If
confidential customer data is lost through any DDoS attack, we may face
challenges.
The severity of these side effects, some companies shut down after the
DDoS attacks. It is to be noted that the last DDoS attack lasted for 12 days.
Cloud security service monitors the cloud to identify and prevent attacks.
The cloud service providers protectthe cloud service users in real time.
Threat to detect
Cloud computing detects advanced threats by using endpoint scanning for
threats at the device level.
1. Enlarged Surface
Public cloud environments have become a large and highly attractive surface
for hackers and disrupt workloads and data in the cloud. Malware, zero-day,
account acquisition and many malicious threats have become day-to-day
more dangerous.
3. Ever-changing workload
At the application level, configured keys and privileges expose the session to
security risks. Often cloud user roles are loosely configured, providing broad
privileges beyond therequirement. An example is allowing untrained users or
users to delete or write databases with no business to delete or add
database assets.
6. Complex environment
These days the methods and tools work seamlessly on public cloud
providers, private cloud providers, and on-premises manage persistent
security in hybrid and multi-cloud environments-it including geographic
Branch office edge security for formally distributed organizations.
All the leading cloud providers have known themselves best, such as PCI
3.2, NIST 800-53, HIPAA and GDPR.
In the industry, there are several vulnerability scanners obtainable. They can
be freely accessible, charged, or open-source. On GitHub, many free and
open-source tools have been developed. Choosing which tool to use depends
on a variety of variables, such as the category of security vulnerabilities, the
cost estimate, how often the tool is modified, etc.
Here, we have discussed some of the best vulnerability scanning tools. They
are-
1. OpenVAS
OpenVAS is a valuable tool for detecting vulnerabilities that endorses
massive scale scans that are appropriate for companies. This tool can be
used not only in web applications or application server, but also in
databases, programming systems, networks, and virtualization software to
diagnose vulnerabilities problems.
2. Nikto2
Nikto2 is a screening program for open-source exploits that emphasizes on
web application security. Nikto2 will discover about 6700 hazardous archives
that cause web server problems and evaluate iterations based on inaccurate
servers. In addition, Nikto2 can immediately notify you to server installation
problems and improve virtual server audits in a minimal amount of time.
Nikto2 might not offer any preventative measures for potential vulnerabilities
that include risk management functionality. Nikto2, after all, is a constant
accessed tool that allows vulnerabilities to be covered more broadly.
3. Netsparker
Netsparker is also a vulnerability assessment tool for web applications with
an optimization feature provided for vulnerability seeking. This tool is also
smart enough to find vulnerabilities within the next few hours in millions of
web application domains.
4. Acunetix
Acunetix is a commercial (open-source edition also obtainable) web
application vulnerability scanner with several features offered. With the help
of this tool, there is a mapping range of about 6500 vulnerabilities. It can
also discover network vulnerabilities as well, in additament to web services.
Acunetix offers the opportunity for your scan to be streamlined. It is suitable
for large-scale organizations because several systems can be controlled by
it. HSBC, NASA, USA air force are few industrial titans that use the Arachni
scanning tool for vulnerability testing.
5. Arachni
For application development, Arachni is also a deeply committed
vulnerability tool. A number of vulnerabilities are protected by this tool and
are inspected periodically. Arachni offers risk management services and
recommends suggestions and defensive measures for vulnerabilities that
have been identified.
Linux, Windows, and macOS are supported by Arachni, a freely used and
open-source security vulnerabilities tool. With its capacity to adapt with
recently discovered vulnerabilities, Arachni also aims to assist in penetration
testing.
6. Nmap
Among many cybersecurity experts, Nmap is one of the possibly the best-
known, freely used and open-source testing tools for networks. To explore
hosts in the domain and for software exploration, Nmap uses the penetrating
technique.
In two or more distinct networks, this function aims to detect exploits. If you
really are a beginner or trying to learn to search for vulnerabilities, then the
Nmap scanning tool is a great starting point.
7. W3AF
W3AF is a platform also called Web Software Attack and Framework, open
and free-source. This software is an open-source web application analysis for
vulnerabilities. By identifying and evaluating the bugs, it provides a
mechanism that is useful to protect the web application. This software is
recognized for user-friendliness. W3AF also has infiltration services used for
vulnerability assessment work, along with penetration testing options.
9. Intruder
The Intruder is a paid vulnerability scanner explicitly designed for cloud-
based storage scanning. Immediately after a vulnerability is released,
intruder software begins to search. The scanning mechanism in Intruder is
automated and constantly monitors for vulnerabilities.
10. OpenSCAP
OpenSCAP is an application of tools that help search for vulnerabilities,
analyze vulnerabilities, calculate vulnerabilities, and build protection
measures. OpenSCAP is a platform developed by groups that are free and
open source. Only the Linux operating system supports OpenSCAP.
11. Aircrack
Aircrack, also called Aircrack-NG, is a series of software used to test the
security of the wireless network. These tools may be used to inspect
networks and enable different operating systems, such as Linux, OS X,
Solaris, NetBSD, Windows, and much more.
The tool will concentrate on several areas of Wi-Fi privacy, such as traffic and
data management, driver and card screening, hacking, attack response, etc.
By collecting the data packets, this method helps you to recover the missing
keys.
It's important in helping you find missed upgrades or fixes for protection. To
install new security patches on the system, use the tool. Small to medium-
sized organizations render the software most valuable, and with its
capabilities, it may save the security of the organization's money. To fix the
bugs which the tool detects, you would not need to consult a security
specialist.
14. Nexpose
Nexpose is an open-source platform that can be used without any cost. For
security assessments, intelligence analysts frequently use this method.
Credit goes to the Github network, all the latest vulnerabilities are included
in the Nexpose repository. With the Metasploit System, people can use this
tool and also can focus on it to provide a thorough scan of your web service.
Different sections will be taken into consideration before producing the
report.
Vulnerabilities are graded as per their level of risk by the instrument and
rated from minimum to maximum. It will scan new apps, so the entire
network is secured. Every week, Nexpose is modified so you know it and can
find the new threats.
The tool provides a wide variety of cloud infrastructure, digital and physical
networks, including OS, DBs, programs, and many other tools. Nessus is
trusted by millions of customers for their vulnerability assessment and
configuration problems.
You must follow a predetermined method, like the one illustrated below, to
execute a vulnerability assessment. There are four phases to the
vulnerability scanning process: scanning, assessment, analysis and
remediation. Each of these are discussed below.
2. Analysis
The aim of this phase is to determine the cause and root cause of the
established vulnerabilities in level one.
It includes the description and the root cause of the insecurity of sensing
devices essential for the vulnerabilities. For instance, a previous version of a
free software repository might be the root cause of a vulnerability. This
offers a straightforward direction for updating the library for remediation.
3. Risk Assessment
Prioritization of exploits is the purpose of this stage. It implies security
analysts granting each vulnerability a rank or intensity ranking, predicated
on such considerations as:
4. Remediation
The purpose of this move is to close security loopholes. It's usually a
collaborative effort between security personnel, management and operations
leaders, who decide the most appropriate route for abatement or
containment of each vulnerability.
Step 4: Ensure that you log all the findings and compile stakeholder reports.
Advantages of Vulnerability Assessment
The screening of vulnerabilities ensures devices safety from external threats.
Some advantages of vulnerability scanning are given below:
Data loss or data theft is one of the major security challenges that the cloud
providers face. If a cloud vendor has reported data loss or data theft of
critical or sensitive material data in the past, more than sixty percent of the
users would decline to use the cloud services provided by the vendor.
Outages of the cloud services are very frequently visible even from firms
such as Dropbox, Microsoft, Amazon, etc., which in turn results in an
absence of trust in these services during a critical time. Also, it is quite easy
for an attacker to gain access to multiple storage units even if a single one is
compromised.
7. Managerial Issues
There are not only technical aspects of cloud privacy challenges but also
non-technical and managerial ones. Even on implementing a technical
solution to a problem or a product and not managing it properly is eventually
bound to introduce vulnerabilities. Some examples are lack of control,
security and privacy management for virtualization, developing
comprehensive service level agreements, going through cloud service
vendors and user negotiations, etc.
Cloud Computing Security Architecture
Security in cloud computing is a major concern. Proxy and brokerage
services should be employed to restrict a client from accessing the shared
data directly. Data in the cloud should be stored in encrypted form.
Security Planning
Before deploying a particular resource to the cloud, one should need to
analyze several aspects of the resource, such as:
o A select resource needs to move to the cloud and analyze its sensitivity to
risk.
o Consider cloud service models such as IaaS, PaaS,and These models require
the customer to be responsible for Security at different service levels.
o Consider the cloud type, such as public, private, community, or
o Understand the cloud service provider's system regarding data storage and
its transfer into and out of the cloud.
o The risk in cloud deployment mainly depends upon the service models and
cloud types.
o access control
o audit trail
o certification
o authority
The service model should include security mechanisms working in all of the
above areas.
1. A broker has full access to the storage but does not have access to the client.
2. A proxy does not have access to storage but has access to both the client
and the broker.
3. Working on a Brocade cloud storage access system
4. When the client issues a request to access data:
5. The client data request goes to the external service interface of the proxy.
6. The proxy forwards the request to the broker.
7. The broker requests the data from the cloud storage system.
8. The cloud storage system returns the data to the broker.
9. The broker returns the data to the proxy.
10.Finally, the proxy sends the data to the client.
It does this by building down - defining threats starting with the users,
moving to the cloud environment and service provider, and then to the
applications. Cloud security architectures can also reduce redundancy in
security measures, which will contribute to threat mitigation and increase
both capital and operating costs.
Each will divide the components of a cloud application into layers, with the
top layer being the responsibility of the customer and the lower layer being
the responsibility of the cloud provider. Each separate function or component
of the application is mapped to the appropriate layer depending on who
provides it. The contract form then describes how each party responds.
Type-2 Hypervisor
Type I Virtualization
In this design, the Virtual Machine Monitor (VMM) sits directly above the
hardware and eavesdrops on all interactions between the VMs and the
hardware. On top of the VMM is a management VM that handles other guest
VM management and handles the majority of a hardware connections. The
Xen system is a common illustration of this kind of virtualization design.
Type II virtualization
In these architectures, like VMware Player, allow for the operation of the
VMM as an application within the host operating system (OS). I/O drivers
and guest VM management are the responsibilities of the host OS.
The fourth and last aspect of cloud virtual network security is to make sure
that connections between tenants or services do not cross over into virtual
networks. Virtual Networking is a fantastic approach to building quick
connections to scaled or redeployed features, but each time a
modification is made to the virtual network, it’s possible that an accidental
connection will be made between two distinct services, tenants, or
feature/function deployments. A data plane leak, a link between the actual
user networks, or a management or control leak could result from this,
allowing one user to affect the service provided to another.