Email and Cloud Security
Email and Cloud Security
ADD ON COURSE
EMAIL AND CLOUD SECURITY
COURSE MATERIAL
E-MAIL AND CLOUD SECURITY
1 Web-Security
1 Introduction to Web-Security
Internet has facilitated most of our operations and services through web sites. Majority of the
on-line users spend their time in referring to the web sites for their official work, personal work like,
entertainment, online purchases and online transactions and for many more activities. Websites are
also vulnerable to cyber-attacks. Cybercrimes happen every day, and stringent security measures must
be taken against attacks. Cyber-attacks can be executed on web sites, web servers and web
applications. Unavailability of web sites due to denial of service attacks, displaying modified
information on their homepages are some of the common attacks on web sites. In other high-profile
cases, millions of passwords, email addresses, and credit card details are leaked to the public domain,
exposing website users to both personal embarrassment and financial risks.
There are many new methods found by hackers more often to attack websites.
Even malwares are designed and developed to identify vulnerable websites. Some of
the ways of handling these issues are:
- Website security software
Website Security Software - Website Security Software prevents the websites against cyber-
attacks. Security-as-a-Service (SaaS) is the model used to implement security and manage
them.
Malware does not differentiate - Malware is not biased. It does not differentiate between
websites. The website is ensured of handling malware attacks.
Password Breach
Data Breach
Code Injection
Security Misconfigurations
1 SQL Injection
Injection flaws particularly involve SQL injection. Based on open web security project
report Injection flaws occur during the interpretation of a command or query and the data becomes
untrusted. This type of flaws includes SQL, OS, and LDAP injection. When the hacker injects any
of these types, then there occurs an execution of unintended commands or unauthorized data access.
As a result of successful injection, the hacker gains access to change, corrupt or delete user data
by denial of access or a complete host takeover. An example for SQL Injection attack is displayed
in figure
For each valid session during website access, there is a creation of session cookie and session
that contains sensitive data like username and password. These cookies are destructed once the
session ends or when the user abruptly leaves the browser or when the user signs out. Strong
authentication and session management are important in these cases. For example, when a
Cybercafé is used for important applications, instead of proper log out, if the user closes the session
abruptly, the cookies become invalidated. A potential attacker could browse the previous session
of the victim and can get access to sensitive information like profile information or credit card
details. A proper implementation of keys, session tokens, cookies are necessary to prevent
compromise of this type. An illustration of Broken authentication and session management is
displayed in figure
A CSRF refers to the process of forging a HTTP request when a victim signs in a vulnerable
application. The forging may also occur on session cookies and on another automated
authentication information. This encourages the attacker to send a fake link to the victim that forces
the user to enter malicious website URL resulting in the theft of user’s private data. An example
for Cross Site Request Forgery is displayed in figure
All the components of a web like web applications, frameworks, application server, web
server, database server, and platform require to be defined and deployed with security
configuration. An attacker can fail in his attempt to access the authorized sensitive data or
functionality if they are configured properly. It is necessary to maintain good security mechanism
by regular update of the software. Otherwise, it results in complete system compromise. An
example for security misconfiguration in a webserver is displayed in figure
This is a common vulnerability that exists due to the insecure storage of the sensitive data.
The user credentials such as personal profile, their health details, card processing information, are
some forms of sensitive data. They are stored in the application database. When this data is stored
without encryption or hashing, it becomes vulnerable to attacks. Hashing method is used to
transform character strings to shorter strings of fixed length or a key. Hence, to decode the string,
cryptographic algorithm and the secret key used for encryption must be known. An example for
Insecure cryptographic storage of credit card details is displayed in figure
Web applications often check the URL access rights before rendering protected links and
buttons. Similarly, applications need to check for access controls whenever web pages are accessed.
In most of the applications, the special rights to pages, locations and resources are not made
available to the users. An attacker by intelligent guess, access these privileged pages by invoking
functions to view confidential information.
9 Insufficient Transport Layer Protection
The sensitive information such as credit card credential, user authentication details, session
tokens are transmitted over various network layers. These details are exposed to untrusted users
due to the absence of Secure Socket Layer (SSL). This takes
place due to the usage of weak algorithms, expired certificates or invalid certificates. This paves way
to steal sensitive information or perform unwanted actions.
10 Un validated Redirects and Page Forwards
Sometimes, the users are redirected or forwarded to inappropriate pages for intended
purpose by some web applications. If there is improper validations in redirecting or forwarding to
other pages, attackers make use of this opportunity to attack victims by phishing or malware attacks
to access unauthorized pages. Figure 8 shows an example scenario of unvalidated redirects and page
forwards.
The security issues are sometimes handled through Better performance. The website
contents are stored in multiple servers that can be accessed globally with the help of the Content
Delivery Network (CDN). Some of the ways used in handling the risks are:
- By consistent scanning, Instant malware removal
By Consistent scanning, Instant Malware removal – At regular basis and in-depth website
scanning are some important operations that assure security at server level.
By Advanced security monitoring – The customer’s or visitor’s private information are kept
confidential and prevented from redirecting onto malicious websites that are highly infective
to the system. For this purpose, website security relies on Domain Name System (DNS), Secure
Socket Layer (SSL) and WHOIS database.
Absolute Malware prevention – Must be used to block a malware before it tries to affect the
website.
Figure 9 shows the different ways of handling the risks.
Open Web Security Project (OWASP) mainly concentrates to improve the security of web
applications and software. This is a non-profit charitable organization. The organization has
prescribed many security standards. Hacking different web sites or services are closely monitored
by maintaining web hacking incident databases. Different types of check points and techniques are
applied to back web security. Depending on the data, every organization maintains a list of frequent
web security vulnerabilities published.
They are prioritized based upon factors such as exploitability, detectability and impact on
software.
Exploitability – It defines the action performed to cause the security vulnerability. Highest
exploitability occurs when the attack takes place over web browser. However, lowest
exploitability occurs when the system is being protected by advanced programming and tools.
Detectability – It defines the process of detecting the threat. Highest detectability can be done
when the information is displayed as URL, Form or Error message and lowest rank of
detection will be on the native code.
Impact or Damage – It implies the consequences of vulnerability when security is exposed
to attack. Highest damage will be complete system crash and lowest impact
can be nothing at some cases.
To prevent the above security risks, there exists two primary methods used namely
automated scanning or detection tools and Security Audit. For example, complete code review is
absolutely necessary to handle XSS vulnerability. Some XSS attacks can be caught using detection
tools, whereas automated detection in combination with manual review of coding and penetration
testing are used to prevent them to a full extent. An insecure direct object reference can be detected
using automated tools. Website security vulnerability, scanning or exploit scanning service helps
users in preventing them. Importantly, with the help of these tools and techniques a typical
hacker can hack the user website in a systematic way.
As a result, automated detection tools and systematic reviewing of site can identify eight out
of ten major vulnerability types. However, cross-site request forgery is an exception to this. It
cannot be detected using these approaches. The identified vulnerabilities are documented in user
website security risk report that helps the IT support team to enhance security.
Some of the ways to prevent web-security risks are:
iii. When a new service is loaded to the system without user’s permission.
In complex and large systems, web scanning is done on daily basis to ensure that no changes
are made to site code and the applications run within the established security
perimeter.
Web security is maintained with standards offered by different technologies done through
testing, building and preventing threats. They are:
o Black box testing tools
o Fuzzing tools
The level of security depends on the level of exploitation by the threats as well as on the basis of
equipping and testing the protection tools.
- Web Scanning
o Resource assignment – To constantly alert users for new security issues, it is necessary to
assign all the resources needed to defend against the vulnerabilities. This ensures that the
security patches are kept up to date and reviews the protection of existing applications. The
assignment of resources includes strong firewall protection, antivirus software and employing
intrusion detection/prevention systems.
o Web scanning – It refers to the process of scanning or testing user’s current equipment,
applications and web site code for existence of known vulnerabilities. A simple logic of front
door locking is applied apart from using firewalls, antivirus software and Intrusion Prevention
System/ Intrusion Detection System (IPS/IDS). The most efficient form of detecting
vulnerabilities is the usage of network and web site scanning methods. Since, unknown threats
are complex to identify. The above
solutions can be used for detecting only known threats.
- Malware Scan
- Malware Removal
- Blacklist/Spam monitoring
- Blacklist Removal
- Security Monitoring
- Site Seal
Another two solutions that help in managing a good website security are:
A web server that is turned off is more secure than the one that is on. Because it simply
restricts the number of open ports and services. A system can become vulnerable to attacks if it has
multiple open ports, services or scripting languages resulting in security loop holes. If the computer
systems are configured properly and security patches are updated continuously then the occurrence
of risks can be eliminated or totally minimised. Web Applications must also need frequent
updations.
Web Site Code and Web Security
The communication that takes place between the websites and the visitors, promotes lot of
interactions and there occurs chances of potential web security vulnerabilities. Web sites often
force visitors to the following situations:
- Loading into a new page that contains effective content
In each of the above cases, the visitors use some commands to access the web server or
database. The form field, search field or the blogs are the places where interactions take place. The
amount of commands or information types that pass in and out depends on the correctness of the
program code. A properly coded program allows desired amount of commands or information to
pass in and out. But sometimes the limits are not automatic. Only trained programmers can create
codes to allow expected data to pass on and block inappropriate data to enter into the system.
Website codes are created by programmers, that may work for third party vendors. When the
website runs the software from different sources and the codes may be continuously modified by
site designer. Webmaster creates new codes or modify existing codes that sometimes overlooks
previous web security limitations.
Most of the servers gather unused applications along with unfamiliar staff details. The
codes may also be old and often it is difficult to find whether they are unused, patched or updated
for years. But it becomes the tool for hackers to exploit web servers.
Web security vulnerabilities are further classified into two namely, known and unknown.
Websites are mostly attacked with known exploit rather than by unknown exploits. With
known exploits, the web servers and sites become highly complex. Chances of unknown exploits
are generally smaller unless the network assets are of great value. The best approach is to eliminate
the known vulnerabilities and look for unknown vulnerabilities.
2 E-mail Security
E-mail is the popular form of sending or exchanging information between two or more
parties. But today, it is the popular medium through which malware, spam and phishing attacks
are executed. Email also acts the entry point for the enterprise network
to gain access to their valuable data.
E-mail security deals with the different techniques that keeps the information sent through
email accounts secure against unauthorized access, loss, or compromise. Sometimes, data security
breaches inside an enterprise network mainly take place through e-mail which serves as the
primary door of attack for attackers. It is important to provide e-mail security as individuals and
business organizations expand their extensive communications through e-mail.
Moreover, the ease of use and popularity it becomes the attack vector for the intruders.
Unauthorized access and attempts to e-mail accounts happen for every e-mail account holder today.
Malware sent via e-mails is the most common threat. Phishing e- mails sent with malware
attachments compromise the account as well as the device. Sometimes, phishing e-mails trick the
users for sharing sensitive information. Phishing attacks also target departments that handle
sensitive information like financial data, credit card details, personal id in business organization.
To increase the chance of success, a sense of urgency will be instilled by phishing emails. Phishing
e-mails involve confirmation of the recipient’s login information, user password, social security
number, bank account numbers, and even credit card information. Other form may be, directing
the users to counterfeit websites that look similar to that original vendor site victimising users to
disclose their account data or financial data.
E-mail messages must be secured as they are delivered and received across untrusted
networks. When security measures are not in place e-mails are exposed to hackers like how
postcards can be read or modified in midways. Hence it is necessary to provide security over
external networks present outside the security boundary of an organization.
Every organisation must employ e-mail administrators responsible in providing security to
the e-mail system. To maintain the CIA triad of information transferred, through e-mail it is
necessary that every user must have enough knowledge about threat exploits and basic security
measures to be adopted. Continuous security monitoring is essential to maintain the effectiveness
of the e-mail security system and IT infrastructure security. Mail clients and mail servers are the
two primary components of an e-mail system residing in an organization’s IT infrastructure.
Mail clients enable users to read the messages, compose a new mail and send to other
recipients, and also store them as drafts or in drives. Mail is composed and sent from the mail
client to the mail server through a network. The mail server is the computer that delivers,
forwards, and stores e-
mail messages. These components must be protected with e-mail security features.
The standards used for formatting, processing, transmitting, delivering, and displaying e-
mail are Simple Mail Transfer Protocol (SMTP), Extended Simple Mail Transfer Protocol
(ESMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP). They help in
ensuring interoperability between different mail clients and
servers.
Since e-mail communication takes place over untrusted, external networks they are subject
to primary threats like:
- Malware
- Social Engineering
- Baiting
1 Malware
As discussed
3 Social Engineering
Security threats may be intentional or unintentional. But most of the time they are
unintentional. At times authorized users transmit sensitive information over e-mail without any
prior knowledge that they may be exposed to illegal actions.
6 Baiting
Baiting is an older form of social engineering. This program is created using a computer
tool that lures a user to click a link or open an attachment. This link or the attachment contains
malicious items designed based on different user’s interest. It is important to make the users
understand that opening or clicking links will result in exploitation. Apart from this, the security
system must also monitor for accidental actions by the users.
The various threats to email security are shown in figure
Figure 10 Various Threats to E-mail Security
constant effort, resources, and vigilance. Some of the actions that could be taken to maintain a
secure mail system are as follows:
- Configure, protect and analyse log files
There are many protection methods that can be used against malwares. Some of them
include malware scanning and spam filtering. With this an organization can protect against
malwares by employing them at the mail client level, server and system levels. It is also important
to conduct training and awareness programs for users in the organization. Another program is the
usage of telecommuters, which helps users to
identify and handle inappropriate mails and attachments.
4 Perform Periodic Security Testing
Every security system installed in the organization, must be tested periodically to examine
whether the security mechanisms are correctly implemented and confirm that the expected output
are met as far as security requirements of the operational mail system is concerned. A combination
of various methods such as vulnerability scanning, port scanning, spam filtering, malware
scanning, firewall, intrusion detection system should be implemented by the organizations to
assess and support the mail system and
its environment.
End-to-End encryption refers to the process where encrypting and decrypting of e- mail
messages take place only at the end points. With the help of end-to-end encryption, the source and
destination recipient’s messages are encrypted, and they cannot be read by e-mail service
providers. These encryption takes place when the user composes and sends messages to the
receiver. It reaches the receiver in the same encrypted form. The service providers like Gmail
cannot decode the sent message. This encrypted e-mail can be decrypted only with the help of
user’s private key. Few e-mail systems are protected with automatic end-to-end encryption
techniques. Some of the protocols used in end-to- end e-mail encryption are as follows,
Bit Message
Getting own key pair is much easier than it sounds. It just needs figuring out a few simple
programs.
Step 1: Download Gpg4win. This is a free software with set of encryption packages
and tools. For Mac users, checking out GPG Suite is advisable.
Step 2: Install Gpg4win. Make sure GnuPG-the actual encryption package and
Step 3:
Once everything is installed, find the Kleopatra program on the computer and open it.
Step 4: Go to the “File” tab and select “New Certificate”.
Step 5: Since user wants PGP keys, select “Create a personal OpenPGP key pair.”
Figure 16 Creating a Personal OpenPGP key pair
Step 6: If one wants to attach the key to one’s identity either real or fake, then information is entered
here. Otherwise this step can be skipped.
Step 8: Click “Okay” to exit this settings menu, and then click “Next” to start creating the key.
The program is now generating thousands of random characters to make user keys and will ask for
a passphrase. The passphrase is unrecoverable, so it should not be forgotten.
Figure 19 Setting up Passphrase for new key
Step 9: User now has a public and private key. If user wishes, then he can store the key in a
separate file somewhere. Through email or any other form, the public key can be uploaded.
Step 10: User can generate a file with public key in it by right-clicking the file and clicking
“Export.” There are several ways to view it, but it is easy to access public key whenever the user
wants, without the need to use Kleopatra.
Step 13: Open it up with text editor to see the public key.
Step 14: User can export the private key with the same process. Instead of “Export Secret Keys”
just “Export” is selected. Make sure this is stored in a safe location, or just keep it inside Kleopatra
where it perfectly accessible.
These public and private keys can be used with any program that works with PGP, and
Kleopatra itself can encrypt and decrypt files using user keys. If one wants to take them for a test
run, encrypting a text file with the public key and decrypting it with their private key can be tried.
PGP is safe only if private key remains private. If it is disabled, then anyone will be able to
read the message that is encrypted with public key. Depending on how secure one wants to be, the
key should be kept on a hard drive or put them on a secure form of removable storage, like an
encrypted USB drive.
7 End user email security best practices
These are practices used for ensuring security to end users who make use of e- mail
systems. One of the best practices is educating the employees on handling e-mail
security risks. This develops a great impact on the organization by preventing e-mail systems from
unwanted exploits. Some of the end user e-mail security practices are as follows,
- Avoiding unwanted links and opening of attachments from unknown e-mail recipients.
- By checking whether sensitive information is sent only to required recipients with the help of
spam filters.
- Using anti-virus software to block vulnerabilities.
- Using private software such as VPN’s instead of public Wi-Fi connections to access corporate
e-mail over personal remote devices.
A proper implementation of e-mail security measures in the enterprise network, helps the
organisation helps in eradicating e-mail security risks. Employees can also prevent their sensitive
data from loss or virus if they are provided with proper education and real-time practices.
Following are the tips that can be followed to secure the e-mail from spam or from virus
threats that causes unwanted content replications. E-mail accounts can be secured in many ways.
Organizations make use of two-combination approach such as educating employee and using
comprehensive security protocols. The following are some of the practices to secure enterprise e-
mail systems security,
- Educating employees by explaining them to be aware of phishing attacks by engaging them
on real-time e-mail security risks.
- Creation of strong passwords by employees based on rules and mandatorily changing them
every month strictly.
- Protecting the contents of e-mail and its attachments by implementing encryption
techniques.
- Corporate employees wishing to access e-mail on their personal devices must use BYOD
security.
- Using secure login using encryption methods on web mail applications.
- Deploying malware scanners and tools to scan and block e-mails that affect the files with
malicious contents.
- Data protection solutions must be used in identifying and preventing sensitive data over e-
mail transmissions.
3 Cloud Security
Cloud computing is one of the promised leading computing technologies for cloud service providers
and cloud consumers. The emergence of cloud users has in IT sectors increase the need for new
security standards for the challenges faced by them. Cloud security refers to the process of securing
user resources. The cloud security features are different for different cloud models and are similar
to any program that is installed and run on IT architecture.
Cloud computing security processes should also address the security controls that the cloud
provider will incorporate to maintain the customer's data security, privacy and compliance with
necessary regulations. The security process must include business continuity and data backup plan
in the case of a security breach. The common security concerns that affect cloud systems are
unauthorized exposure, leaking of data, exposure to vulnerable attacks, implementation of poor
access controls, and the problems of data availability. Some of the basic cloud security protection
measures for any cloud environment can be explained as follows,
- Ensure the safety of data and systems.
As defined by National Institute of Standards and Technology (NIST) standard there are
different cloud deployment models available such as Public, Private, Community and Hybrid. These
models are designed and deployed to secure the privacy of users accessing the cloud resources.
Apart from the standard models, a model named as Virtual Private Cloud (VPC) introduced by
Amazon has the advantages of public and private clouds in terms of flexibility and security.
(i) Public Cloud – This type of cloud model is defined by a third-party provider over a public
network to offer services and resources to the users present in the network.
(ii) Private Cloud – This cloud model is designed for a particular organization where services are
provisioned and managed by a third party making it available to private users.
(iii) Community Cloud – It is a collaborative model where sharing of infrastructure takes place
between different organizations having common security concerns.
(iv) Hybrid Cloud – It is a cloud model that uses a mix of above cloud models with co- ordination
between two platforms.
(v) Virtual private cloud (VPC) – This type of cloud introduced by Amazon has major
advantages over security of private cloud and flexibility of data in public clouds. It works based
on the advantages of Virtual Private Network (VPN) by providing resources to customize security
settings and network topology.
The different types of cloud deployment models are displayed in figure 3
A cloud service model refers to the types of services provided to the cloud users. There are
three main types of cloud services namely Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), and Software as a Service (SaaS). Apart from this, there are also other models emerging
based upon services. The various cloud service models are displayed in figure 3
This type of service model provides infrastructure resources as a service to the cloud users.
These resources include virtual machines, virtual storage, virtual infrastructure and other hardware
assets. It manages all other infrastructure services while the client is requests for it. This can include
the operating systems, applications and user interactions with the system. Examples of IaaS are
Amazon Elastic Compute Cloud
(EC2), Openstack, etc.
HuaaS refers to the process of providing human resources as a service to the cloud users for
predicting massive-scale data and aggregate their information. They make use of crowdsourcing and
Crowdservicing that groups large number of people to investigate and provide information needed
by the cloud users through innovative ideas. Examples of Crowdsourcing include community-
based design and human-based
computation.
- Management
- Operation and
- Technology
1 Management
The management aspect
of cloud security includes the following functions,
- Cloud security strategy is the organization’s security strategy based on cloud. This should be
as whole or be a part in organization’s comprehensive security policy.
- Cloud security governance is the process of believing in and following the practices of cloud
security strategy policies and its updates.
- Cloud security processes are those which are associated with cloud to incorporate it with
existing amendments.
- Security roles & responsibilities are effective implementation managements which ensure
cloud security elements by describing user actions (who and what are they doing).
- Cloud security guidelines are the advices given to organizations. They portrait methods to
achieve security based on affecting factors.
- Cloud security assessment is the process of measuring the effectiveness of security offered by
the cloud service provider.
- Service integration defines the incorporation of various cloud services at management level.
- IT & procurement security requirements are those that are used to obtain the overall security
requirements of specific cloud.
- Cloud security management refers to the overall day-to-day management of cloud security.
2 Operation
Operation is the key aspect of cloud security that renders the following functions,
- Awareness & training programs on cloud security and its impact are to be conducted to educate
employees and users by explaining their roles and functions.
- Incident management refers to identifying cloud related problems and provide responses to
them.
- Configuration management ensures that the organization’s configuration is correctly
configured by ensuring safe and secured services.
- Contingency planning is a pre-planned approach designed to keep track of cloud usage,
recover from disaster and to maintain essential functions in a cloud.
- Maintenance refers to the process of up to date preservation of resources and services in cloud
security.
- Media protection protects the cloud data surety by maintaining them properly.
- Information integrity defines the process of ensuring the fairness of the information present
in the cloud.
- Personnel security provides security to all personnel of cloud provider (both internal
3 Technology
The technology aspect of the cloud security includes the following functions,
- Access control Technology and software configuration allows only legitimate users to access
the data.
- System Protection Technology is a protection mechanism used to prevent the systems from
vulnerabilities that may involve a Distributed Denial-of-Service (DDoS) attack. Identification
Technology identifies if cloud services are accessed by only authorized personnel.
- Authentication Technology authenticates cloud system access based on claimed users.
- Cloud security audits are auditing mechanisms used to maintain cloud security with the help
of tools and processes.
- Identity and key management are the process of controlling the organization’s identity and
security keys such as session and encryption keys.
- Physical security protection refers to the process of providing physical security controls in
separate buildings for data access.
- Backup recovery and archive are used to maintain the data that is lost by the provider by backing
up or recovering them using some tools and procedures. These data can also be archived to
ensure data integrity in a cloud security system.
- Core infrastructure is the protection of servers and other core infrastructures.
4 Risks in Cloud Security
When the cloud security is weak, then there are high chances of risks that affect the cloud
users in accessing the services. Lack of multi-factor authentication, usage of
poor encryption mechanisms while storing the data in cloud are the major causes of risk in cloud
security. Apart from this, there are other types of risks that can be,
- Loss or theft of intellectual property
- Revenue losses
Revenue losses
1 Loss or theft of intellectual property
Intellectual property is those that includes sensitive data of the owners that are intangible
and protected with copyrights. Nowadays organizations store most of their confidential data on
the cloud that also contains intellectual property. This property can face serious consequences
such as being stolen or being lost by attackers. The hacker uses data breach techniques to succeed
in their attempt. If the data is breached, then access to cloud data is gained. If access is denied,
then other risks are experienced
violating the requirements of uploading owner data into the cloud system.
At present, most of the companies follow regulatory control for their information. For
example: HIPAA is used for private health information, FERPA is used for maintaining student’s
confidential records. There are other regulatories related to industry and governance. With the
help of these regulations, organizations can identify where data is stored, who are the persons
accessing it, how protection methods used. One major example of this risk is the state of non-
compliance by Bring Your Own Computer(BYOC) or Bring Your Own Device(BYOD). It
violates the regulations thereby putting the organizations to indirect consequences.
A major type of malware found in cloud services is data exfiltration. It performs malicious
activity by unauthorized copying, transferring or retrieving data from the cloud. It is also used in
the process of encoding sensitive data into video or audio files. This
type of attack causes dangerous risks to user private data. They are also implemented to cause
phishing attacks through sharing of malware infected files and services.
Contracts are those which are used to define the rights of user access and authorized parties
in an organization. Only employees who adhere to the contract are identified as authorized person
and granted access for the data. Sometimes, these contracts can be breached by cybercriminals,
violating the access rights and gaining control over business data stored in the cloud. This risk
can happen when there is a violation in sharing the data with the users.
This type of risks occurs mainly due to data breaches that happen to the user’s confidential
data stored in the cloud. When the attacker compromise user data, then the customers lack their
trust on storing their data on cloud. This diminished customer trust may also happen during
credit card frauds where the customer’s account is under-taken by the attacker. Because of this
risk, customer may lose trust over their cloud security mechanisms.
Due to data breach the company’s confidential and sensitive information are uncovered.
The company must send notifications to the victims. It is a very important approach in data
protection related to health care industries. The regulation authorities can levy fine on the
company, if proper disclosure is not practiced.
8 Increased customer churn
The customers have every right to change their choice on the cloud type based on the
security controls. It is advisable to avoid cloud services if the customer privacy is not provided in
a safe manner.
9 Revenue losses
When the customer become aware of data breaches of the organization, then they can
move their data to other cloud service provider who ensures proper security. This results in the
revenue losses to the service provider thereby leading to all other customers changing their
services to other cloud service providers.
5 Tools used in Cloud security
OpenStack is an open source software that is used for creating private and public clouds.
It is intended to control the access of the resources in a datacenter through a dashboard or through
OpenStack API. With OpenStack, users can create virtual machines to run multiple tasks at the
same time using instances.
Users can quickly create a new Virtual Machine (VM) or an instance upon which other
cloud components can run. On the platform provided users can develop and deliver applications to
the end users.
6 The Steps towards an Effective Cloud Security Team
There are generally seven steps towards an effective cloud security team and they are as
follows,
Developing a cloud security strategy
Managing multiplicity
Managing multiplicity
Due to the increasing adoption of cloud services, it is important for the security team to
focus on creating a combined model that provides various cloud protection mechanisms. For this
purpose, a federated model that authenticates and authorizes the services around the organization’s
boundary should be considered. A cloud model that is centralized is less secured. The security
team is responsible for addressing the
security issues and to provide methods to overcome risks.
3 Moving closer to contracts and the business
To meet the requirements of the organization’s security, the security team should develop
policies based on strong contracts. These contracts are useful for ensuring security by providing
assessment criteria including assurance and compliance of data
and services. Outsourcing of cloud resources require these contracts for effectiveness.
It is necessary for the security teams to understand and manage cloud security risks in
multiple cloud service providers. When multiple clouds are present, the risks of data availability
are larger. Hence the security team should be responsible for managing these issues using
multiplicity concepts.
6.4.6.5 Securing the exit