FCC - Module IV - Resource Management and Security in Cloud
FCC - Module IV - Resource Management and Security in Cloud
Tech
23TCSE305 – FOUNDATIONS OF
CLOUD COMPUTING
Data Protection
> Securing your data both at rest and in transit.
User Authentication
> Limiting access to data and monitoring who
accesses the data.
Disaster and Data Breach
> Contingency Planning.
SECURITY ISSUES IN CLOUD
Data breaches:
COMPUTING
> It is an incident in which sensitive, protected or
confidential data has potentially been viewed, stolen or
used by an individual unauthorized.
Data loss:
> Valuable data disappear into the ether without a trace.
Account or service traffic hijacking:
> An attacker gains access to your account, he or she can
eavesdrop on your activities and redirect your clients to
illegitimate sites.
Insecure interfaces and APIs:
> Cloud computing providers expose a set of software
interfaces or APIs that customers use to manage and
interact with cloud services.
SECURITY ISSUES IN CLOUD
Denial of service:
COMPUTING
> DoS outages can cost service providers, customers and
prove pricey to customers who are billed based on disk
space consumed.
Malicious insiders:
> It can be a current or former employee, a contractor, or
a business partner who gains access to a network, system,
or data for malicious purposes.
Cloud abuse:
> A hacker using a cloud service to break an encryption
key which is too difficult to crack on a standard computer.
Shared technology vulnerabilities:
> Cloud service providers share infrastructure, platforms,
and applications to deliver their services in a scalable way.
Software-as-a-Service Security
• When you subscribe to SaaS, the software you use is secured
by powerful firewalls, intrusion prevention systems, antivirus
software, and access controls.
• This protects you from threats like brute-force attacks, denial-
of-service, and malware.
• SaaS providers handle much of the security for a cloud
application.
• The SaaS provider is responsible for securing the platform,
network, applications, operating system, and physical
infrastructure.
• However, providers are not responsible for securing customer
data or user access to it.
• Following are SaaS security practices that organizations can
adopt to protect data in their SaaS applications.
Software-as-a-Service Security
Definition:
• Cloud security governance refers to the management
model that facilitates effective and efficient security
management and operations in the cloud
environment so that an enterprise’s business targets
are achieved.
• This model incorporates a hierarchy of executive
mandates, performance expectations, operational
practices, structures, and metrics that, when
implemented, result in the optimization of business
value for an enterprise
Cloud Security Governance
• Hypervisor Security
• Host / Platform Security
• Securing Communication
• Security between Guests
• Security between Hosts and Guests
• Virtualized Infrastructure Security
• Virtual Machine Sprawl
IAM – Identity Access Management
Authentication
• Verifying the identity of a user, system or
service
Authorization
• Privileges that a user or system or service has
after being authenticated (e.g., access control)
Auditing
• Exam what the user, system or service has
carried out
• Check for compliance
Relevant IAM Standards, Protocols for Cloud
IAM Standards and Specifications for Organizations
SAML - Security Assertion Markup Language (allows IdP to
pass authentication credentials to Service Providers(SP))
SPML – Security Provisioning Markup Language (for
exchanging user, resource and service provisioning
information between cooperating organizations)
XACML - eXtensible Access Control Markup Language
(designed to express security policies and access rights to
information for Web services)
OAuth - Open Authentication (to grant websites or
applications access to their information on other websites
but without giving them the passwords)
Relevant IAM Standards, Protocols for Cloud
Assessments
a) LaaS, DaaS
b) DaaS, CaaS
c) NaaS, CaaS
d) LaaS, NaaS
Assessments
a) demand-driven method
b) event driven method
c) popularity-driven method
d) internet driven method
Assessments