Unit V
Unit V
Both the PaaS and SaaS platforms abstract and hide the
host operating system from end users with a host
abstraction layer.
One key difference between PaaS and SaaS is the
accessibility of the abstraction layer that hides the
operating system services that applications consume.
In the case of SaaS, the abstraction layer is not visible
to users and is available only to the developers and the
CSP’s Administrators.
Infrastructure Security: The Host Level
utmost importance.
And they are key to guaranteeing the integrity and
subversion attacks.
iii. Virtual Server Security
The virtual instance of an operating system that is
provisioned on top of the virtualization layer and is
visible to customers from the Internet;
e.g., various flavors of Linux, Microsoft, and Solaris.
Infrastructure Security: The Host Level
IDS/IPS.
Infrastructure Security: The Application Level
Storage
For data stored in the cloud (i.e., storage-as-a-service), we are referring
to IaaS and not data associated with an application running in the
cloud on PaaS or SaaS.
The same three information security concerns are associated with this
data stored in the cloud.
confidentiality, integrity, and availability
Confidentiality
When it comes to the confidentiality of data stored in a public cloud,
two potential concerns are :
First, what access control exists to protect the data? Access control
consists of both authentication and authorization.
Second, how is the data that is stored in the cloud actually protected?
Data Security and Storage
Provider Data and Its Security
Integrity
In addition to the confidentiality of data, there is a need
to focus about the integrity of the data.
Confidentiality does not imply integrity; data can be
encrypted for confidentiality purposes, but integrity
requires the use of message authentication codes (MACs).
The simplest way to use MACs on encrypted data is to
use a block symmetric algorithm in cipher block chaining
(CBC) mode, and to include a one-way hash function.
Data Security and Storage
Provider Data and Its Security
Availability
Assuming that a customer’s data has maintained its
confidentiality and integrity the availability about the data
is to be concerned.
There are currently three major threats in this regard :
The first threat to availability is network-based attacks.
The second threat to availability is the CSP’s own
availability.
Data Security and Storage
Provider Data and Its Security
2. Use
• Internal versus external: Is PII used only within the
collecting organization, or is it used outside the organization
(e.g., in a public cloud)?
• Third party: Is the information shared with third parties
(e.g., subcontractors or CSPs)?
• Appropriateness: Is the use of the information consistent
with the purpose for which it was collected?.
• Discovery/subpoena: Is the information managed in the
cloud in a way that will enable the organization to comply
with legal requirements in case of legal proceedings?
Data Privacy
3. Transfer
• Public versus private networks: When information is
transferred to a cloud, is the organization using public
networks, and is it protected appropriately? (PII should
always be protected to address the risk level and legal
requirements.)
• Encryption requirements: Is the PII encrypted? Some
laws require that PII will be encrypted when
transmitted via a public network.
• Access control: Are there appropriate access controls
over PII when it is in the cloud?
Data Privacy
4. Transformation
• Derivation: Are the original protection and use
limitations maintained when data is transformed or
further processed in the cloud?
• Aggregation: Is data in the cloud aggregated so that it
is no longer related to an identifiable individual?
• Integrity: Is the integrity of PII maintained when it is in
the cloud?
Data Privacy
5. Storage
• Access control: Are there appropriate controls over access to
PII when stored in the cloud so that only individuals with a
need to know will be able to access it?
• Structured versus unstructured: How is the data stored to
enable the organization to access and manage the data in the
future?
• Integrity/availability/confidentiality: How are data integrity,
availability, and confidentiality maintained in the cloud?
• Encryption: Several laws and regulations require that certain
types of PII should be stored only when encrypted. Is this
requirement supported by the CSP?
Data Privacy
6. Archival
• Legal and compliance: PII may have specific requirements that dictate
how long it should be stored and archived. Are these requirements
supported by the CSP?
• Off-site considerations: Does the CSP provide the ability for long-
term off-site storage that supports archival requirements?
• Media concerns: Is the information stored on media that will be
accessible in the future?
Is the information stored on portable media that may be more
7. Destruction
• Secure: Does the CSP destroy PII obtained by
customers in a secure manner to avoid potential
breach (break) of the information?
• Complete: Is the information completely destroyed?
Does the destruction completely erase the data, or can
it be recovered?
Data Privacy
computing.
These concerns typically mix security and privacy.
1. Access
Data subjects have a right to know what personal information
3. Storage
Where is the data in the cloud stored? Was it transferred to
4. Retention
How long is personal information (that is transferred to
5. Destruction
How does the cloud provider destroy PII at the end of the
retention period?
How do organizations ensure that their PII is destroyed by the
CSP at the right point and is not available to other cloud users?
How do they know that the CSP didn’t retain additional
copies?
Cloud storage providers usually replicate the data across
7. Privacy breaches
How do you know that a breach has occurred, how do
notification process ?
If contracts include liability for breaches resulting from
who is at fault?
Data Privacy