Cloud Computing Unit 3
Cloud Computing Unit 3
Because strong SLAs will specify the measurement criteria for the agreed upon
services and responsibilities, proper SLA management also involves remaining
attentive to those metrics.
Multi-level SLA: These agreements are categorized into three sub-tiers, with each
one applying the same services to different customer groups within the same SLA.
o Corporate-level SLA. This provides SLA management for every user across the
customer organization. Many of the issues this level of SLA management deals with
Cloud computing unit 3 and 4
are not critical issues, so SLA performance reviews and updates are usually
required on a less frequent basis.
o Service-level SLA. This provides SLA management for specific services related to
specific customer groups.
For MSPs, SLAs tend to be one of the two foundational contracts established with
their customers. In addition to the service agreement, many service providers will
enter into a master services agreement with customers that lays out the broad
overview of terms and conditions under which they agree to provide services. The
master services agreement will often incorporate the conditions of the SLA, which
allows for more specificity regarding the services MSPs will provide and the metrics
they will use to measure the effectiveness of those services.
For customers, some of the benefits SLAs provide include a means of describing the
performance characteristics of the services they are receiving—which they can use
to compare or generate leverage when assessing other service providers’ SLAs.
The service agreements will also offer means for seeking redress for breaches of
contract via service credits or other forms of compensation and remediation.
SLA reporting is another important vector for ensuring MSPs are meeting service
targets. Many MSPs will choose to make statistics related to performance available
online so customers can easily confirm they haven’t breached they SLA contracts.
Policy-based automation
In a policy, you can define which resources belong together and are managed as
one (business entity). For example, a DB2® System consists of many
resources. With Automation Control, you can group and aggregate resources to
more meaningful manageable entities, for example, My-HumanResource-
Application and so forth. You can monitor on this level, issue commands on
this level, and manage at the business level rather than at the single IT resource
level.
In policies, you can specify how resources are dependent and related to each
other. For example, which of the other resources must be available before a
certain resource can be started. In another example, my database must be up
and running before my application is started.
Policy definitions can be reused, copied, and cloned for similar applications
elsewhere in the enterprise.
Because the underlying technology is responsible for the detailed actions,
these actions are performed in a consistent and reliable manner. With
traditional programming solutions, the testing of abnormal conditions is
difficult and prone to be incomplete. The action of automation under these
abnormal conditions is, however, critical to the entire automation solution.
Cloud computing unit 3 and 4
Cloud computing unit 3 and 4
Put simply, Service Level Objectives describe how good the service
reliability was during a specific duration of time, based on the measurements
of specific service level indicators.
The following best practices can help you achieve these goals:
workload requirements at present may not be equally valid for its future
performance requirements.
Keep SLOs simple, few & realistic. Avoid absolute numbers that are
unrealistic. You may set an internal SLO that acts as a safety margin or
buffer to deliver a lower SLO target agreed with the end-users.
Cloud computing unit 3 and 4
Cloud computing unit 3 and 4
Cloud computing unit 3 and 4
Firewall is the central part of cloud architecture. The firewall protects the
network and the perimeter of end-users. It also protects traffic between
various apps stored in the cloud.
Access control protects data by allowing us to set access lists for various
assets. For example, you can allow the application of specific
employees while restricting others. It's a rule that employees can access the
equipment that they required. We can keep essential documents which are
stolen from malicious insiders or hackers to maintaining strict access control.
More than 90% of malware comes via email. It is often reassuring that
employee's download malware without analysingit. Malicious software installs
itself on the network to steal files or damage the content once it is
downloaded.
Ransomware is a malware that hijacks system's data and asks for a financial
ransom. Companies are reluctant to give ransom because they want their data
back.
Data redundancy provides the option to pay a ransom for your data. You can
get that was stolen with minimal service interruption.
Cloud computing unit 3 and 4
Some of the advanced cloud-native security challenge and many layers of risk
faced by today's cloud-oriented organizations are below:
Cloud computing unit 3 and 4
1. Enlarged Surface
Public cloud environments have become a large and highly attractive surface
for hackers and disrupt workloads and data in the cloud. Malware, zero-day,
account acquisition and many malicious threats have become day-to-day
more dangerous.
Cloud providers have complete control over the infrastructure layer and
cannot expose it to their customers in the IaaS model. The lack of visibility and
control is further enhanced in the SaaS cloud models. Cloud customers are
often unable to identify their cloud assets or visualize their cloud
environments effectively.
3. Ever-changing workload
At the application level, configured keys and privileges expose the session to
security risks. Often cloud user roles are loosely configured, providing broad
privileges beyond therequirement. An example is allowing untrained users or
users to delete or write databases with no business to delete or add database
assets.
6. Complex environment
Cloud computing unit 3 and 4
These days the methods and tools work seamlessly on public cloud providers,
private cloud providers, and on-premises manage persistent security in hybrid
and multi-cloud environments-it including geographic Branch office edge
security for formally distributed organizations.
All the leading cloud providers have known themselves best, such as PCI 3.2,
NIST 800-53, HIPAA and GDPR.
Cloud Broker is an entity that manages the use, performance and delivery of
cloud services, and relationships between cloud providers and cloud
consumers.
All the data stored in the cloud. It can be located in the cloud service
provider’s system used to transfer data from sent and received. The cloud
computing has no physical system that serves this purpose. To protect the
cloud storage is the way to isolate data from client direct access. They are two
services are created. One service for a broker with full access to storage but
no access to the client, and another service for a proxy with no access to
storage but access to both the client and broker. These important two services
are in the direct data path between the client and data stored in the cloud.
Under this system, when a client makes a request for data, here’s what
happens:
The proxy completes the response by sending the data requested to the
client.
Cloud computing unit 3 and 4
Because data stored in the cloud is usually stored from multiple tenants the
each vendor has its own unique method for segregating one customer’s data
from another. It’s important to understand how the specific service provider
maintains data segregation. Cloud storage provider provides privileged
access to storage. Most cloud service providers store data in an encrypted
form to protect the data used in security mechanism. Hence, data cannot be
accessed by the unauthorized user.
Cloud computing unit 3 and 4
Cloud encryption is the process of transforming data from its original plain text
format to an unreadable format, such as ciphertext, before it is transferred to and
stored in the cloud.
As with any form of data encryption, cloud encryption renders the information
indecipherable and therefore useless without the encryption keys. This applies even
if the data is lost, stolen or shared with an unauthorized user.
Data encryption for information stored on the cloud network ensures that even if the
data is lost, stolen or mistakenly shared, the contents are virtually usel ess without
the encryption key. Again, keys are only made available to authorized users. Similar
to data in transit, encryption/decryption for data at rest is managed by the software
application.
Encryption Algorithms
Symmetric encryption: The encryption and decryption keys are the same. This
method is most commonly used for bulk data encryption. While implementation is
generally simpler and faster than the asymmetric option, it is somewhat less secure
in that anyone with access to the encryption key can decode the data.
Encryption is one of the primary defenses organizations can take to secure their
data, intellectual property (IP) and other sensitive information, as well as their
customer’s data. It also serves to address privacy and protection standards and
regulations.
Data loss: Encrypted data is virtually useless without the key. If the organization
loses or destroys the access key, the data may not be able to be recovered.
Here are a few ways in which security audits can improve the security
of your cloud environment:
Here are a few key challenges that can make cloud security audits
more difficult, and how to overcome them.
Transparency
Encryption
There are a two main options for encrypting data in the cloud:
You can encrypt data on-premises and then send it to the cloud,
but this runs the risk of rogue insiders abusing their privileges.
You can leave encryption to the cloud provider, but then you will
be at risk of breaches within the cloud provider’s environment.
From an auditing perspective, it is almost always better to encrypt
data on-premise and manage encryption keys in-house. Auditing can
be extremely difficult, even impossible in some cases, if encryption
keys are managed by the cloud provider. The PCI DSS Cloud Special
Cloud computing unit 3 and 4
Colocation
2. Interview. Ask cloud vendor personnel how the provider operates and
delivers its services. CSA has cloud audit questions and checklists that can be
useful to both external and internal auditors. CSA has partnered with ISACA to
define what constitutes relevant cloud audit knowledge and provide
accreditation resources for cloud audit professionals.
3. Analyze. Look at how well the vendor's processes align with CSA and ISACA
controls.
4. Compile results. Combine analysis with the evidence from documentation and
interviews into work papers that are used to prepare a final report and
recommendations.
Cloud computing unit 3 and 4
Resource Description
Security, Trust, Assurance and Risk Checklist tool to ask cloud vendors about
(STAR) security questionnaire security controls
Resource Description
The term ‘cloud compliance’ can relate to many different industry standards and
regulations that cloud customers need to comply with.
For example, in the healthcare industry, a set of laws called HIPAA make stringent
guidelines and security protocols mandatory for certain kinds of patient health data.
Another example is new financial privacy regulations that have stemmed from
changes in the finance world over the last couple of decades.
Essentially, cloud customers need to look at the effective security provisions of their
vendors the same way they would look at their own internal security. They will need
to figure out whether their cloud vendor services match the compliance that they need.
There are several ways to go about this. In some cases, companies can just look for
vendors that certify compliance, and choose their services without any further input.
However, sometimes clients may need to actually get involved in accessing the cloud
vendor’s security, to make sure that it complies with the industry standards and
regulations.
In assessing cloud security, experts suggest that cloud customers ask certain kinds of
questions, such as — where is the data going to be stored? And who will be able to
access it? In addition, companies are choosing between public, private and hybrid
cloud computing services. This is also relevant to security, in that private cloud
solutions can sometimes be more secure than public cloud solutions. In public cloud
services, clients essentially share the same data platforms, and that means that in some
cases, there is a concern about data crossover or unauthorized access.
One way to think about this is in an analogy to housing, where private cloud systems
would resembled gated mansions and public systems resemble connected apartments.
There will be more security issues in a set of connected apartment units, where there’s
less separation between different tenants. Cloud compliance will remain an issue as
engineers and designers work on how to provide the most secure and best options for
customers.
Cloud computing unit 3 and 4
To satisfy the requirements of applicable standards and regulations, both you and
your public cloud vendor will need to demonstrate compliance.
So, in addition to your own set of responsibilities, you’ll need to make sure your
cloud platform also has the appropriate certifications or attestations.
Moreover, you’ll need to monitor validation, as data protection laws change, new
regulations come into force, and cloud providers can lose their compliance status at
any time.
Data Residency
As most data protection laws only allow you to host personal data within permitted
territories, you’ll need to make careful choices about which cloud regions you intend
to use.
Cloud Complexity
You cannot protect what you don’t know you have. However, the cloud is a much
more complex environment with lots of moving parts. This presents challenges to
visibility and control over the data you need to protect.
Furthermore, this complexity makes it more difficult to assess the risk to your data
so you can formulate an informed strategy to suitably protect it.
Most compliance requirements for security are very general in nature and merely
state you should take appropriate technical and organizational measures to
protect personal data.
But traditional security tools are simply not up to the job, as they’re designed for
static environments and difficult to adapt to the cloud. You’ll therefore need security
solutions specifically designed for cloud-based infrastructure — where IP addresses
Cloud computing unit 3 and 4
frequently change and resources are routinely launching and closing down. This will
mean a different approach to security with more focus on configuration
management and individual workload protection.
1. User Interface: This is where users interact with your application. It can be a
web browser, mobile app, or any other client that sends requests to your
application.
2. Client Library: Google provides client libraries for various programming
languages to make it easy for developers to interact with App Engine services.
This library helps developers send requests and receive responses from the
App Engine services.
3. App Engine Application: This is your custom application code. It can be
written in multiple languages like Python, Java, Go, or Node.js. You write your
code to handle incoming requests, process data, and produce responses.
4. Runtime Environment: App Engine provides a runtime environment for your
application. This environment includes libraries, services, and tools that help
run your code, manage HTTP requests, and handle various tasks like
authentication, logging, and more.
5. Scaling Service: One of the key features of App Engine is its automatic
scaling. It can handle spikes in traffic by creating new instances of your
application when needed and scaling down when traffic decreases. The scaling
service takes care of this automatically.
6. Request Routing: Incoming HTTP requests are routed to the appropriate
instances of your application. Google's load balancers manage this process,
distributing requests to available instances.
7. Data Storage: Google Cloud Datastore (NoSQL database) or Google Cloud
SQL (relational database) are often used for data storage in App Engine
applications. These services are fully managed and scalable, which simplifies
data management.
Cloud computing unit 3 and 4
8. Caching: Google Cloud provides services like Cloud Memorystore for in-
memory caching to improve the performance of your application by reducing
the need to retrieve data from your primary data store.
9. File Storage: Google Cloud Storage can be used to store and serve static files
like images, videos, and other assets in your application.
10. Task Queues: App Engine provides task queues for handling background
tasks, such as sending emails or processing data asynchronously. These
queues are used to manage and distribute tasks across instances of your
application.
11. Services and APIs: App Engine can make use of other Google Cloud services
and APIs, such as Cloud Pub/Sub, BigQuery, or Cloud Machine Learning
Engine, to extend your application's capabilities.
12. Service Modules: App Engine allows you to break your application into
multiple service modules, each with its own version and scaling settings. This
can be useful for microservices architecture or separating components of your
application.
13. Security and Authentication: Google provides built-in security features, such
as Identity-Aware Proxy (IAP) for controlling access to your application and
Firebase Authentication for user authentication.
14. Monitoring and Logging: You can use Google Cloud's Stackdriver suite to
monitor, log, and trace the behavior and performance of your application.
15. Deployment: Google provides tools for deploying your application code,
managing versions, and rolling back to previous versions if needed.
16. Global Distribution: App Engine can serve your application from multiple
geographical regions to reduce latency and improve reliability. This is known
as the App Engine Standard environment (multi-region) or the App Engine
Flexible environment (which can be deployed in multiple regions).
Runtime lifecycle
The App Engine flexible environment runtimes use open source components
that are maintained by their respective communities. The runtimes are
identified by their language version, for example, Java 17, Python 3.10, and
so forth.
Cloud computing unit 3 and 4
Google provides support for a runtime during General availability (GA). During
this support window:
Runtime components are regularly updated with security and bug fixes.
Runtime lifecycle
GA-level
End of Support Deprecated Decommissioned
support
Notification period
App Engine will begin issuing in-app notifications 90 days before the
application reaches end of support. Upon notification, you should prepare to
upgrade your application to a newer runtime that is supported in the flexible
environment .
End of support
Deprecated
Decommissioned
Cloud computing unit 3 and 4
To create an application for an app engine, you can use Go, Java, PHP,
or Python. You can develop and test an app locally using the SDK’s
deployment toolkit. Each language’s SDK and nun time are unique. Your
program is run in a:
Java Run Time Environment version 7
Python Run Time environment version 2.7
PHP runtime’s PHP 5.4 environment
Go runtime 1.2 environment