Cloud Computing (Unit-Iii & Iv)
Cloud Computing (Unit-Iii & Iv)
The name says it all. It is accessible to the public. Public deployment models in the
cloud are perfect for organizations with growing and fluctuating demands. It also
makes a great choice for companies with low-security concerns. Thus, you pay a
cloud service provider for networking services, compute virtualization & storage
available on the public internet.
Benefits of Public Cloud
● No Hardware Setup - The cloud service providers fully fund the entire
Infrastructure
● Data Security and Privacy Concerns - Since it is accessible to all, it does not
fully protect against cyber-attacks and could lead to vulnerabilities.
● Reliability Issues - Since the same server network is open to a wide range of
users, it can lead to malfunction and outages
2. Private Cloud
Now that you understand what the public cloud could offer you, of course, you are
keen to know what a private cloud can do. Companies that look for cost efficiency
and greater control over data & resources will find the private cloud a more
suitable choice.
It means that it will be integrated with your data center and managed by your IT
team. Alternatively, you can also choose to host it externally.
● Data Privacy - It is ideal for storing corporate data where only authorized
personnel gets access
● Supports Legacy Systems - This model supports legacy systems that cannot
access the public cloud.
● Higher Cost - With the benefits you get, the investment will also be larger
than the public cloud. Here, you will pay for software, hardware, and
resources for staff and training.
● Fixed Scalability - The hardware you choose will accordingly help you scale
in a certain direction
3.Community Cloud
The community cloud operates in a way that is similar to the public cloud. There's
just one difference - it allows access to only a specific set of users who share
common objectives and use cases. This type of deployment model of cloud
computing is managed and hosted internally or by a third-party vendor. However,
you can also choose a combination of all three.
4.Hybrid Cloud
Let's understand the hybrid model better. A company with critical data will prefer
storing on a private cloud, while less sensitive data can be stored on a public cloud.
Benefits of Hybrid Cloud
● Security - Since data is properly segmented, the chances of data theft from
attackers are significantly reduced.
Limitations of Hybrid Cloud
● Specific Use Case - This model makes more sense for organizations that
have multiple use cases or need to separate critical and sensitive data.
1. Agility: Control the size of your virtual network and deploy cloud resources
whenever your business needs them. You can scale these resources dynamically
and in real-time.
3. Security: Because the VPC is a logically isolated network, your data and
applications won’t share space or mix with those of the cloud provider’s other
customers. You have full control over how resources and workloads are accessed,
and by whom.
4. Affordability: VPC customers can take advantage of the public cloud’s
cost-effectiveness, such as saving on hardware costs, labor times, and other
resources.
1. Agility
A VPC gives users full control over the network size along with automation to
scale resources up or down whenever required. These resources can be scaled
dynamically in real-time.
2. Security
Even though the VPC is part of the public cloud, it is logically isolated so a user’s
data and space don’t mix with a cloud provider’s other customers. Users have full
control of how resources and workloads are accessed and by whom.
4. Improved performance
Cloud-hosted websites and apps generally perform better than those hosted on
on-premises servers.
VPCs enable a hybrid cloud environment where an organisation can use a VPC
as an extension of their own data centre, without having to deal with the
complexity of building an on-premises private cloud.
5. Availability
Redundant resources and architectures that are highly fault-tolerant mean that pass
and workloads are highly available which means VPC environments can provide
close to 100% uptime expectations.
Cloud Migration
Cloud migration is the procedure of transferring applications, data, and other
types of business components to any cloud computing platform. There are several
parts of cloud migration an organization can perform. The most used model is the
applications and data transfer through an on-premises and local data center to
any public cloud.
But, a cloud migration can also entail transferring applications and data from a
single cloud environment or facilitate them to another- a model called
cloud-to-cloud migration.
Pros of Cloud Migration
Organizations migrate to a cloud for various reasons, but, normally when faced
with many challenges of developing IT infrastructure within the most secure and
cost-effective way possible.
1. Rehosting (lift-and-shift)
The most general path is rehosting (or lift-and-shift), which implements as it
sounds. It holds our application and then drops it into our new hosting platform
without changing the architecture and code of the app. Also, it is a general way for
enterprises unfamiliar with cloud computing, who profit from the deployment
speed without having to waste money or time on planning for enlargement.
2. Re-platforming
Re-platforming is called "lift-tinker-and-shift". It includes making some cloud
optimizations without modifying our app's core architecture. It is the better strategy
for enterprises that are not ready for configuration and expansion, or those
enterprises that wish to improve trust inside the cloud.
3. Re-factoring
It means to rebuild our applications from leverage to scratch cloud-native abilities.
We could not perform serverless computing or auto-scaling. A potential
disadvantage is vendor lock-in as we are re-creating on the cloud infrastructure. It
is the most expensive and time-consuming route as we may expect. But, it is also
future-proof for enterprises that wish to take benefit from more standard cloud
features.
It covers the most common three approaches for migrating our existing
infrastructure.
4. Re-purchasing
It means replacing our existing applications along with a new SaaS-based and
cloud-native platform (such as a homegrown CRM using Salesforce). The
complexity is losing the existing training and code's familiarity with our team over
a new platform. However, the profit is ignoring the cost of the development.
5. Retiring
When we don't find an application useful and then simply turn off these
applications. The consequencing savings may boost our business situation for
application migration if we are accessible for making the move.
6. Re-visiting
Re-visiting may be all or some of our applications must reside in the house. For
example, applications that have unique sensitivity or handle internal processes to
an enterprise. Don't be scared for revisiting cloud computing at any later date. We
must migrate only what makes effects to the business.
Cloud Migration Tools
Third-party vendors and cloud providers facilitate a lot of automated, cloud-based,
and open-source services and tools designed to:
Bear in mind that during cloud vendors offer access to the metric's rich set for
acknowledging modifications in our cloud environment. Usually, these metrics
aren't in the overall application context.
We will need an isolated monitoring solution for the visibility level. We can create
real-time correlations among end-user experience, application performance, and
cloud service utilization with a solution that includes AppDynamics APM.
2. Unified Monitoring
It is an emerging ability that gives full visibility into our whole application
supporting components, infrastructure, database, application, end-user, and
ecosystem. These are running in the cloud and on-premises. We can easily find the
issues of cloud migration that will usually cause war-room calls.
3. Business Intelligence Monitoring
It is a kind of tool we will need to verify cloud migration profits. Check for a tool
same as AppDynamics Business iQ, that can compare post and pre-move
performance baselines through a business and technical perspective. Accordingly,
optimize enterprise performance simulates the experience of the user during all the
phases of our migration project, and track enterprise transactions for revealing the
true effect on our bottom line.
Firewall is the central part of cloud architecture. The firewall protects the network
and the perimeter of end-users. It also protects traffic between various apps stored
in the cloud.
Access control protects data by allowing us to set access lists for various assets.
For example, you can allow the application of specific employees while restricting
others. It's a rule that employees can access the equipment that they required. We
can keep essential documents which are stolen from malicious insiders or hackers
to maintaining strict access control.
We understand how the cloud computing security operates to find ways to benefit
your business.
1. SaaS
Software as a Service (SaaS) is a form of application delivery that relieves users of
the burden of software maintenance while making development and testing easier
The cloud delivery model's top layer is where applications are located. End
customers get access to the services this tier offers via web portals.
2. PaaS
basic compute and storage capabilities (PaaS). Developers can construct and
deploy apps on a cloud platform without necessarily needing to know how many
3. IaaS
center space) as a service. It may also include the delivery of OS and virtualization
NIST Cloud computing also has 4 deployment models, which are as follows:
1. Public
This is the model where cloud infrastructure and resources are given to the public
via a public network. These models are generally owned by companies that sell
cloud services.
2. Private
This is the model where cloud infrastructure and resources are only accessible by
the cloud consumer. These models are generally owned by cloud consumers
3. Community
This is the model where a group of cloud consumers might share their cloud
infrastructure and resources as they may have the same goal and policies to be
4. Hybrid
various models.
What are the Security Risks of Cloud Computing
Cloud computing provides various advantages, such as improved collaboration,
excellent accessibility, Mobility, Storage capacity, etc. But there are also security
risks in cloud computing.
Some most common Security Risks of Cloud Computing are given below-
Data Loss
Data loss is the most common cloud security risks of cloud computing. It is also
known as data leakage. Data loss is the process in which data is being deleted,
corrupted, and unreadable by a user, software, or application. In a cloud computing
environment, data loss occurs when our sensitive data is somebody else's hands,
one or more data elements can not be utilized by the data owner, hard disk is not
working properly, and software is not updated.
Data Breach is the process in which the confidential data is viewed, accessed, or
stolen by the third party without any authorization, so organization's data is hacked
by the hackers.
Vendor lock-in
Migrating, integrating, and operating the cloud services is complex for the IT staff.
IT staff must require the extra capability and skills to manage, integrate, and
maintain the data to the cloud.
Spectre & Meltdown allows programs to view and steal data which is currently
processed on computer. It can run on personal computers, mobile devices, and in
the cloud. It can store the password, your personal information such as images,
emails, and business documents in the memory of other running programs.
Account hijacking
for example. Some even offer their passwords upon falling for the phishing phone
call made by a cyber attacker. They fail to recognise phishing emails too,
especially those that might refer to specific members on the team or details about a
current project.
Sometimes, the most likely perpetrator is someone with privileged system access,
such as IT or other system administrators. A skilled and malicious administrator
can leave a back door open or leave programs on the network so that information
gets stolen. Some might even plant the malware themselves, causing millions of
dollars in damage.
3. Leaked information
Employees take information both knowingly and unknowingly on cameras, USB
data sticks, and their phones.
Every company should use software to specify its policies about what devices can
be connected to the network, what data can be downloaded, and when. It’s crucial
to educate workers on the policies and the reasoning behind the policies.
Malware and virus threats occur through those same channels, and employees often
welcome them inadvertently onto the network.
Update and correct your IT systems regularly to make sure your business is
protected.
5. Insecure applications
It’s possible that your system is very secure, but that your external applications are
bringing you down.
Third-party services can seriously hinder internal website security. Make sure that
your team takes the time to carefully discuss and consider whether or not every
application is right for your network before they install it.
Most data corruptions occur when a file somehow flips or mixes its binary code
(bits of 0s and 1s). Bits are mixed up for many reasons, including hardware
problems, software-based issues, and human mistakes.
1. Human error
Human error is the root cause of most data loss in business as humans are, by
nature, not perfect. The day-to-day running of a business involves a lot of data
manipulation through typing, editing, updating, and deletions, processes that are
prone to error by users.
2. Theft
Losing data through theft usually happens when a data storage device such as a
laptop is stolen. Laptops are stolen at an alarming rate, meaning data loss through
theft can be quite high. Laptops are mobile and are usually taken out of secure
company premises, increasing vulnerability to theft.
3. Software corruption
Software malfunction or crash is another major cause of data loss. Any application
used for requesting data can crash, resulting in data loss or corruption. Software
failure can also occur in file editing software when updating multiple files where
some files fail to save or update and are subsequently deleted. Data can also
become lost in the same way during backup.
4. Computer viruses
Computer viruses can infiltrate and damage data stored in hard drives and company
network systems. Viruses can steal, corrupt, encrypt or delete important data. They
can also infiltrate an entire organization’s network system and affect the
functioning of computer hardware.
5. Hardware impairment
Hardware containing or maintaining data can easily malfunction, leading to
irretrievable data loss. The reasons for hardware impairment can be internal or
external. Data storage devices such as hard drives are prone to destruction through
physical or mechanical faults. The faults can be a result of misuse or mishandling
of the devices.
6. Natural disasters
Natural disasters assume a lower prevalence rate as a cause of data loss because of
their rare occurrence. Natural disasters that can lead to data loss include floods,
earthquakes, hurricanes, cyclones, natural fires, and lightning.
3. Financial implications
Data supports the operations of the business, and if lost, it means the company
loses not only its ability to make money but also the means to operate. Since
financial resources are also channeled towards data recovery, business finances can
be stretched to the point of eating into unbudgeted funds and drawing down
reserves. Data loss comes with the potential to bankrupt a business.
4. Effects on productivity
The productivity of employees is severely affected as data used in day-to-day work
is lost. Also, data is needed to make decisions, and the decision-making function is
also curtailed due to data loss.
5. Legal consequences
Data loss exposes a business to various legal actions and lawsuits. The loss of
customer data carries potential fines from the regulator for not adhering to data
protection laws and regulations. Customers can also file lawsuits against a business
in the event of loss of customer data.
● Check with your service provider to make sure they have conducted
background checks on employees who have physical access to the servers in
their data centers.
● Have a strong method of authentication for cloud app users.
● Make sure all of your data is securely backed up in the event that your data
is lost in the cloud.
● Restrict the IP addresses allowed to access cloud applications. Some cloud
apps provide tools to specify allowable IP ranges, forcing users to access the
application only through corporate networks or VPNs.
Before we dive into how to prevent cloud hijacking, let’s first take a look at what a
cloud hijacking attack looks like contextually. Below, we’re presuming that the
threat actor has already got a hold of your employee’s credentials through one of
the means above.
Step 1: The attacker uses your employee’s stolen credentials to log-in to their
cloud account (something like Slack, Microsoft Outlook or Google Workspace)
Step 2: The attacker goes through your employee’s files, contacts and
information for data that could be lucrative on the Dark Web and/or to build a
picture of the employee so that they can then convincingly impersonate them.
Step 3: Depending on the attacker’s goal, this step tends to go in one of a few
ways. They may simply take what data they’ve found and monetize it.
Alternatively, they may pose as your employee in order to reroute invoices and
receive monetary payment. Some cybercriminals will also spread malware via
email or file upload in order to compromise the organization further.
Steps to reduce Cloud security breaches:
1. Educate your employees.
For most organizations, there is an easy explanation for the security threats:
uneducated employees. By teaching your employees proper defense practices, you
can minimize risk and prevent cloud security threats.
4. Encryption is key.
Cloud encryption is critical for protection. It allows for data and text to be
transformed using encryption algorithms and is then placed on a storage cloud.
Ask your provider how data is managed. To ensure the protection of your data
before it leaves your business, you can encrypt at the network’s edge, ensuring the
movement of data in the cloud is protected. Once the data is encrypted, keep the
keys that both encrypt and decipher your information.
5. Take passwords seriously.
Since files are zipped and encrypted with passwords, it’s important to choose one
wisely. Most passwords — 90%, to be exact — can be cracked within seconds.
Failure to protect your data on the cloud can result in data loss or theft.Cloud
Features of an NGFW:
● Geolocation
Benefits of MFA:
● Time-based Codes: Provides your users one time access with time based
codes.
● Risk-based Access Control: Verifies users based on risk factors. Such as:
1. Location
2. Time of access
3. User Device
4. IP address
IAM is a cloud service that controls the permissions and access for users and cloud
tools. It helps you give access to tools at fine-grained levels on the cloud.
● Restricted Access: IAM ensures only approved users have access to data
and systems.
● View only Access: Users can access files with only read or view rights.
They cannot make changes.
Cloud monitoring reviews, observes and manages the cloud systems for security
from log data in real-time. Cloud logging collects and compares log data from
cloud-based systems.The Logs can tell us ‘who’ accessed ‘what’ on the cloud and
when. From logins to firewall updates, all events are logged in order. The log
Cloud visibility is the ability to view all of your activities in the cloud.It helps you
identify weak performance and potential risks in the cloud deployment. Once you
know what’s harming the process, you can put policies in place to control risks.
Security controls are a set of measures that helps you protect cloud systems.
intervention.
● Avoid misconfigurations
platform services; Cloud IAM solutions provide a clean and single access
control interface.
There are a ton of ways in which every individual can state the meaning of the
cloud platform. But in the simplest way it can be stated as the operating system and
hardware of a server in an Internet-based data centre are referred to as a cloud
platform. It enables remote and large-scale coexistence of software and hardware
goods.
Cloud systems come in a range of shapes and sizes. None of them are suitable for
all. To meet the varying needs of consumers, a range of models, forms, and
services are available. They are as follows:
Azure has long been regarded as one of the greatest cloud services platforms
offered services is sufficient to meet the demands of any company in any sector.
You may operate services on the cloud or mix them with any of your current
infrastructures using Azure. Microsoft Azure was first published in 2010, and it
change.
2.)Amazon Web Services
developing interactive web applications for your company. Elastic Cloud Compute
(EC2), Elastic Beanstalk, Simple Storage Service (S3), and Relational Database
Service are just a few of the IaaS and PaaS options available (RDS).
Although Google Cloud's service offering isn't as extensive as Azure's, it's still
sufficient to meet all of your IaaS and PaaS requirements. Its headlines include
user-friendliness and security.
Your first 12 months of service are also free, much like Azure. In addition,
Google boasts that its services are less expensive and more budget-friendly than
others.
more cost-effective pricing plans on the market, and it's totally configurable, so
you may save even more money. Using their APIs, creating an account is a breeze.
5.) Cloud Linux
Cloud Linux is the way to go if you wish to construct your own IT infrastructure
rather than depending on a third-party service. It's not just another cloud provider;
Working with CloudLinux comes with a lot of obstacles, but it also comes with a
lot of benefits and advantages, such as total control, flexibility, security, and deep
customization.
Internal Security
Breaches in Cloud
Computing
Internal Security
Breaches in Cloud
Computing
Internal Security
Breaches in Cloud
Computing
-III
1.Public Cloud
The name says it all. It is accessible to the public. Public deployment models in the
cloud are perfect for organizations with growing and fluctuating demands. It also
makes a great choice for companies with low-security concerns. Thus, you pay a
cloud service provider for networking services, compute virtualization & storage
available on the public internet.
Benefits of Public Cloud
● No Hardware Setup - The cloud service providers fully fund the entire
Infrastructure
● Data Security and Privacy Concerns - Since it is accessible to all, it does not
fully protect against cyber-attacks and could lead to vulnerabilities.
● Reliability Issues - Since the same server network is open to a wide range of
users, it can lead to malfunction and outages
2. Private Cloud
Now that you understand what the public cloud could offer you, of course, you are
keen to know what a private cloud can do. Companies that look for cost efficiency
and greater control over data & resources will find the private cloud a more
suitable choice.
It means that it will be integrated with your data center and managed by your IT
team. Alternatively, you can also choose to host it externally.
● Supports Legacy Systems - This model supports legacy systems that cannot
access the public cloud.
● Higher Cost - With the benefits you get, the investment will also be larger
than the public cloud. Here, you will pay for software, hardware, and
resources for staff and training.
● Fixed Scalability - The hardware you choose will accordingly help you scale
in a certain direction
3.Community Cloud
The community cloud operates in a way that is similar to the public cloud. There's
just one difference - it allows access to only a specific set of users who share
common objectives and use cases. This type of deployment model of cloud
computing is managed and hosted internally or by a third-party vendor. However,
you can also choose a combination of all three.
Benefits of Community Cloud
Let's understand the hybrid model better. A company with critical data will prefer
storing on a private cloud, while less sensitive data can be stored on a public cloud.
●
● Security - Since data is properly segmented, the chances of data theft from
attackers are significantly reduced.
● Specific Use Case - This model makes more sense for organizations that
have multiple use cases or need to separate critical and sensitive data.
1. Agility: Control the size of your virtual network and deploy cloud resources
whenever your business needs them. You can scale these resources dynamically
and in real-time.
3. Security: Because the VPC is a logically isolated network, your data and
applications won’t share space or mix with those of the cloud provider’s other
customers. You have full control over how resources and workloads are accessed,
and by whom.
4. Affordability: VPC customers can take advantage of the public cloud’s
cost-effectiveness, such as saving on hardware costs, labor times, and other
resources.
1. Agility
A VPC gives users full control over the network size along with automation to
scale resources up or down whenever required. These resources can be scaled
dynamically in real-time.
2. Security
Even though the VPC is part of the public cloud, it is logically isolated so a user’s
data and space don’t mix with a cloud provider’s other customers. Users have full
control of how resources and workloads are accessed and by whom.
4. Improved performance
Cloud-hosted websites and apps generally perform better than those hosted on
on-premises servers.
VPCs enable a hybrid cloud environment where an organisation can use a VPC
as an extension of their own data centre, without having to deal with the
complexity of building an on-premises private cloud.
5. Availability
Redundant resources and architectures that are highly fault-tolerant mean that pass
and workloads are highly available which means VPC environments can provide
close to 100% uptime expectations.
Cloud Migration
Cloud migration is the procedure of transferring applications, data, and other
types of business components to any cloud computing platform. There are several
parts of cloud migration an organization can perform. The most used model is the
applications and data transfer through an on-premises and local data center to
any public cloud.
But, a cloud migration can also entail transferring applications and data from a
single cloud environment or facilitate them to another- a model called
cloud-to-cloud migration.
Pros of Cloud Migration
Organizations migrate to a cloud for various reasons, but, normally when faced
with many challenges of developing IT infrastructure within the most secure and
cost-effective way possible.
1. Rehosting (lift-and-shift)
The most general path is rehosting (or lift-and-shift), which implements as it
sounds. It holds our application and then drops it into our new hosting platform
without changing the architecture and code of the app. Also, it is a general way for
enterprises unfamiliar with cloud computing, who profit from the deployment
speed without having to waste money or time on planning for enlargement.
2. Re-platforming
Re-platforming is called "lift-tinker-and-shift". It includes making some cloud
optimizations without modifying our app's core architecture. It is the better strategy
for enterprises that are not ready for configuration and expansion, or those
enterprises that wish to improve trust inside the cloud.
3. Re-factoring
It means to rebuild our applications from leverage to scratch cloud-native abilities.
We could not perform serverless computing or auto-scaling. A potential
disadvantage is vendor lock-in as we are re-creating on the cloud infrastructure. It
is the most expensive and time-consuming route as we may expect. But, it is also
future-proof for enterprises that wish to take benefit from more standard cloud
features.
It covers the most common three approaches for migrating our existing
infrastructure.
4. Re-purchasing
It means replacing our existing applications along with a new SaaS-based and
cloud-native platform (such as a homegrown CRM using Salesforce). The
complexity is losing the existing training and code's familiarity with our team over
a new platform. However, the profit is ignoring the cost of the development.
5. Retiring
When we don't find an application useful and then simply turn off these
applications. The consequencing savings may boost our business situation for
application migration if we are accessible for making the move.
6. Re-visiting
Re-visiting may be all or some of our applications must reside in the house. For
example, applications that have unique sensitivity or handle internal processes to
an enterprise. Don't be scared for revisiting cloud computing at any later date. We
must migrate only what makes effects to the business.
Cloud Migration Tools
Third-party vendors and cloud providers facilitate a lot of automated, cloud-based,
and open-source services and tools designed to:
Bear in mind that during cloud vendors offer access to the metric's rich set for
acknowledging modifications in our cloud environment. Usually, these metrics
aren't in the overall application context.
We will need an isolated monitoring solution for the visibility level. We can create
real-time correlations among end-user experience, application performance, and
cloud service utilization with a solution that includes AppDynamics APM.
2. Unified Monitoring
It is an emerging ability that gives full visibility into our whole application
supporting components, infrastructure, database, application, end-user, and
ecosystem. These are running in the cloud and on-premises. We can easily find the
issues of cloud migration that will usually cause war-room calls.
3. Business Intelligence Monitoring
It is a kind of tool we will need to verify cloud migration profits. Check for a tool
same as AppDynamics Business iQ, that can compare post and pre-move
performance baselines through a business and technical perspective. Accordingly,
optimize enterprise performance simulates the experience of the user during all the
phases of our migration project, and track enterprise transactions for revealing the
true effect on our bottom line.
Firewall is the central part of cloud architecture. The firewall protects the network
and the perimeter of end-users. It also protects traffic between various apps stored
in the cloud.
Access control protects data by allowing us to set access lists for various assets.
For example, you can allow the application of specific employees while restricting
others. It's a rule that employees can access the equipment that they required. We
can keep essential documents which are stolen from malicious insiders or hackers
to maintaining strict access control.
We understand how the cloud computing security operates to find ways to benefit
your business.
1. SaaS
Software as a Service (SaaS) is a form of application delivery that relieves users of
the burden of software maintenance while making development and testing easier
The cloud delivery model's top layer is where applications are located. End
customers get access to the services this tier offers via web portals.
2. PaaS
basic compute and storage capabilities (PaaS). Developers can construct and
deploy apps on a cloud platform without necessarily needing to know how many
3. IaaS
center space) as a service. It may also include the delivery of OS and virtualization
NIST Cloud computing also has 4 deployment models, which are as follows:
1. Public
This is the model where cloud infrastructure and resources are given to the public
via a public network. These models are generally owned by companies that sell
cloud services.
2. Private
This is the model where cloud infrastructure and resources are only accessible by
the cloud consumer. These models are generally owned by cloud consumers
3. Community
This is the model where a group of cloud consumers might share their cloud
infrastructure and resources as they may have the same goal and policies to be
4. Hybrid
various models.
What are the Security Risks of Cloud Computing
Cloud computing provides various advantages, such as improved collaboration,
excellent accessibility, Mobility, Storage capacity, etc. But there are also security
risks in cloud computing.
Some most common Security Risks of Cloud Computing are given below-
Data Loss
Data loss is the most common cloud security risks of cloud computing. It is also
known as data leakage. Data loss is the process in which data is being deleted,
corrupted, and unreadable by a user, software, or application. In a cloud computing
environment, data loss occurs when our sensitive data is somebody else's hands,
one or more data elements can not be utilized by the data owner, hard disk is not
working properly, and software is not updated.
Data Breach is the process in which the confidential data is viewed, accessed, or
stolen by the third party without any authorization, so organization's data is hacked
by the hackers.
Vendor lock-in
Migrating, integrating, and operating the cloud services is complex for the IT staff.
IT staff must require the extra capability and skills to manage, integrate, and
maintain the data to the cloud.
Spectre & Meltdown allows programs to view and steal data which is currently
processed on computer. It can run on personal computers, mobile devices, and in
the cloud. It can store the password, your personal information such as images,
emails, and business documents in the memory of other running programs.
Account hijacking
for example. Some even offer their passwords upon falling for the phishing phone
call made by a cyber attacker. They fail to recognise phishing emails too,
especially those that might refer to specific members on the team or details about a
current project.
Sometimes, the most likely perpetrator is someone with privileged system access,
such as IT or other system administrators. A skilled and malicious administrator
can leave a back door open or leave programs on the network so that information
gets stolen. Some might even plant the malware themselves, causing millions of
dollars in damage.
3. Leaked information
Employees take information both knowingly and unknowingly on cameras, USB
data sticks, and their phones.
Every company should use software to specify its policies about what devices can
be connected to the network, what data can be downloaded, and when. It’s crucial
to educate workers on the policies and the reasoning behind the policies.
Malware and virus threats occur through those same channels, and employees often
welcome them inadvertently onto the network.
Update and correct your IT systems regularly to make sure your business is
protected.
5. Insecure applications
It’s possible that your system is very secure, but that your external applications are
bringing you down.
Third-party services can seriously hinder internal website security. Make sure that
your team takes the time to carefully discuss and consider whether or not every
application is right for your network before they install it.
Most data corruptions occur when a file somehow flips or mixes its binary code
(bits of 0s and 1s). Bits are mixed up for many reasons, including hardware
problems, software-based issues, and human mistakes.
1. Human error
Human error is the root cause of most data loss in business as humans are, by
nature, not perfect. The day-to-day running of a business involves a lot of data
manipulation through typing, editing, updating, and deletions, processes that are
prone to error by users.
2. Theft
Losing data through theft usually happens when a data storage device such as a
laptop is stolen. Laptops are stolen at an alarming rate, meaning data loss through
theft can be quite high. Laptops are mobile and are usually taken out of secure
company premises, increasing vulnerability to theft.
3. Software corruption
Software malfunction or crash is another major cause of data loss. Any application
used for requesting data can crash, resulting in data loss or corruption. Software
failure can also occur in file editing software when updating multiple files where
some files fail to save or update and are subsequently deleted. Data can also
become lost in the same way during backup.
4. Computer viruses
Computer viruses can infiltrate and damage data stored in hard drives and company
network systems. Viruses can steal, corrupt, encrypt or delete important data. They
can also infiltrate an entire organization’s network system and affect the
functioning of computer hardware.
5. Hardware impairment
Hardware containing or maintaining data can easily malfunction, leading to
irretrievable data loss. The reasons for hardware impairment can be internal or
external. Data storage devices such as hard drives are prone to destruction through
physical or mechanical faults. The faults can be a result of misuse or mishandling
of the devices.
6. Natural disasters
Natural disasters assume a lower prevalence rate as a cause of data loss because of
their rare occurrence. Natural disasters that can lead to data loss include floods,
earthquakes, hurricanes, cyclones, natural fires, and lightning.
3. Financial implications
Data supports the operations of the business, and if lost, it means the company
loses not only its ability to make money but also the means to operate. Since
financial resources are also channeled towards data recovery, business finances can
be stretched to the point of eating into unbudgeted funds and drawing down
reserves. Data loss comes with the potential to bankrupt a business.
4. Effects on productivity
The productivity of employees is severely affected as data used in day-to-day work
is lost. Also, data is needed to make decisions, and the decision-making function is
also curtailed due to data loss.
5. Legal consequences
Data loss exposes a business to various legal actions and lawsuits. The loss of
customer data carries potential fines from the regulator for not adhering to data
protection laws and regulations. Customers can also file lawsuits against a business
in the event of loss of customer data.
● Check with your service provider to make sure they have conducted
background checks on employees who have physical access to the servers in
their data centers.
● Have a strong method of authentication for cloud app users.
● Make sure all of your data is securely backed up in the event that your data
is lost in the cloud.
● Restrict the IP addresses allowed to access cloud applications. Some cloud
apps provide tools to specify allowable IP ranges, forcing users to access the
application only through corporate networks or VPNs.
Before we dive into how to prevent cloud hijacking, let’s first take a look at what a
cloud hijacking attack looks like contextually. Below, we’re presuming that the
threat actor has already got a hold of your employee’s credentials through one of
the means above.
Step 1: The attacker uses your employee’s stolen credentials to log-in to their
cloud account (something like Slack, Microsoft Outlook or Google Workspace)
Step 2: The attacker goes through your employee’s files, contacts and
information for data that could be lucrative on the Dark Web and/or to build a
picture of the employee so that they can then convincingly impersonate them.
Step 3: Depending on the attacker’s goal, this step tends to go in one of a few
ways. They may simply take what data they’ve found and monetize it.
Alternatively, they may pose as your employee in order to reroute invoices and
receive monetary payment. Some cybercriminals will also spread malware via
email or file upload in order to compromise the organization further.
Steps to reduce Cloud security breaches:
1. Educate your employees.
For most organizations, there is an easy explanation for the security threats:
uneducated employees. By teaching your employees proper defense practices, you
can minimize risk and prevent cloud security threats.
4. Encryption is key.
Cloud encryption is critical for protection. It allows for data and text to be
transformed using encryption algorithms and is then placed on a storage cloud.
Ask your provider how data is managed. To ensure the protection of your data
before it leaves your business, you can encrypt at the network’s edge, ensuring the
movement of data in the cloud is protected. Once the data is encrypted, keep the
keys that both encrypt and decipher your information.
5. Take passwords seriously.
Since files are zipped and encrypted with passwords, it’s important to choose one
wisely. Most passwords — 90%, to be exact — can be cracked within seconds.
Failure to protect your data on the cloud can result in data loss or theft.Cloud
Features of an NGFW:
● Geolocation
Benefits of MFA:
● Time-based Codes: Provides your users one time access with time based
codes.
● Risk-based Access Control: Verifies users based on risk factors. Such as:
1. Location
2. Time of access
3. User Device
4. IP address
IAM is a cloud service that controls the permissions and access for users and cloud
tools. It helps you give access to tools at fine-grained levels on the cloud.
● Restricted Access: IAM ensures only approved users have access to data
and systems.
● View only Access: Users can access files with only read or view rights.
They cannot make changes.
Cloud monitoring reviews, observes and manages the cloud systems for security
from log data in real-time. Cloud logging collects and compares log data from
cloud-based systems.The Logs can tell us ‘who’ accessed ‘what’ on the cloud and
when. From logins to firewall updates, all events are logged in order. The log
Cloud visibility is the ability to view all of your activities in the cloud.It helps you
identify weak performance and potential risks in the cloud deployment. Once you
know what’s harming the process, you can put policies in place to control risks.
Security controls are a set of measures that helps you protect cloud systems.
intervention.
● Avoid misconfigurations
platform services; Cloud IAM solutions provide a clean and single access
control interface.
There are a ton of ways in which every individual can state the meaning of the
cloud platform. But in the simplest way it can be stated as the operating system and
hardware of a server in an Internet-based data centre are referred to as a cloud
platform. It enables remote and large-scale coexistence of software and hardware
goods.
Cloud systems come in a range of shapes and sizes. None of them are suitable for
all. To meet the varying needs of consumers, a range of models, forms, and
services are available. They are as follows:
Azure has long been regarded as one of the greatest cloud services platforms
offered services is sufficient to meet the demands of any company in any sector.
You may operate services on the cloud or mix them with any of your current
infrastructures using Azure. Microsoft Azure was first published in 2010, and it
change.
2.)Amazon Web Services
developing interactive web applications for your company. Elastic Cloud Compute
(EC2), Elastic Beanstalk, Simple Storage Service (S3), and Relational Database
Service are just a few of the IaaS and PaaS options available (RDS).
Although Google Cloud's service offering isn't as extensive as Azure's, it's still
sufficient to meet all of your IaaS and PaaS requirements. Its headlines include
user-friendliness and security.
Your first 12 months of service are also free, much like Azure. In addition,
Google boasts that its services are less expensive and more budget-friendly than
others.
more cost-effective pricing plans on the market, and it's totally configurable, so
you may save even more money. Using their APIs, creating an account is a breeze.
5.) Cloud Linux
Cloud Linux is the way to go if you wish to construct your own IT infrastructure
rather than depending on a third-party service. It's not just another cloud provider;
Working with CloudLinux comes with a lot of obstacles, but it also comes with a
lot of benefits and advantages, such as total control, flexibility, security, and deep
customization.
Internal Security
Breaches in Cloud
Computing
Internal Security
Breaches in Cloud
Computing
Internal Security
Breaches in Cloud
Computing