Cloud Computing Unit
Cloud Computing Unit
Security Aspects – Platform Related Security – Audit and Compliance – Cloud Security
Challenges and Risks – Software–as–a–Service Security– Security Governance – Risk
Management – Security Monitoring – Security Architecture Design – Data Security –
Application Security – Virtual Machine Security – Identity Management and Access Control –
Autonomic Security – Advance Concepts in Cloud Computing.
Cloud security, also known as cloud computing security, is a collection of security measures
designed to protect cloud-based infrastructure, applications, and data. These measures ensure
user and device authentication, data and resource access control, and data privacy protection.
Security Aspects:
Security in cloud computing is a multifaceted concern that involves various aspects to consider.
Here are some key security considerations in cloud computing:
1. Data Protection: Ensuring the confidentiality, integrity, and availability of data stored in the
cloud is paramount. Data encryption, access controls, and robust authentication mechanisms
help in protecting sensitive information.
2. Compliance and Legal Issues: Adhering to regulatory requirements and industry standards
is crucial. Different regions and industries have specific compliance requirements that must
be followed when storing and processing data in the cloud.
3. Identity and Access Management (IAM): Properly managing user identities and their
access rights is essential. Implementing strong authentication mechanisms, least privilege
principles, and monitoring user activities help prevent unauthorized access to cloud
resources.
4. Network Security: Securing network connections between users, applications, and cloud
services is vital. Implementing measures like virtual private networks (VPNs), firewalls, and
intrusion detection/prevention systems (IDS/IPS) helps protect against network-based
attacks.
5. Physical Security: Although cloud providers manage physical data centers, ensuring their
security measures, such as access controls, surveillance, and environmental controls, is
essential to prevent unauthorized access and protect against physical threats.
6. Incident Response and Disaster Recovery: Having robust incident response plans and
disaster recovery strategies in place helps mitigate the impact of security breaches or service
outages. Regular testing and updating of these plans are necessary to ensure their
effectiveness.
8. Secure Development Practices: Following secure coding practices and conducting regular
security assessments of applications and services deployed in the cloud help identify and
mitigate vulnerabilities early in the development lifecycle.
9. Third-Party Security Risks: Assessing the security posture of third-party vendors and
service providers, such as cloud service providers (CSPs) and software-as-a-service (SaaS)
providers, is important. Ensuring they meet security standards and adhere to contractual
agreements helps mitigate risks associated with outsourcing services to them.
10. Data Privacy: Addressing privacy concerns related to the collection, storage, and processing
of personal or sensitive data in the cloud is critical. Compliance with data protection
regulations, such as the GDPR (General Data Protection Regulation), and implementing
privacy-enhancing technologies, like data anonymization and tokenization, helps protect user
privacy.
Platform-Related Security:
Platform-related security in cloud computing refers to the security measures and considerations
specific to the platforms or environments provided by cloud service providers (CSPs). Here are
some key aspects of platform-related security in cloud computing:
2. Network Security.
3. Data Encryption.
6. Vulnerability Management.
Audit and compliance refers to the internal and external processes that an organization
implements to:
• Identify the requirements with which it must abide—whether those requirements are driven
by business objectives, laws and regulations, customer contracts, internal corporate policies
and standards, or other factors
• Put into practice policies, procedures, processes, and systems to satisfy such requirements
• Monitor or check whether such policies, procedures, and processes are consistently followed
➢ Audit and compliance functions have always played an important role in traditional
outsourcing relationships. However, these functions take on increased importance in
the cloud given the dynamic nature of software-as-a-service (SaaS), infrastructure-as-
a-service (IaaS), and platform-as-a-service (PaaS) environments.
➢ Cloud service providers (CSPs) are challenged to establish, monitor, and demonstrate
ongoing compliance with a set of controls that meets their customers’ business and
regulatory requirements.
➢ Maintaining separate compliance efforts for different regulations or standards is not
sustainable. A practical approach to audit and compliance in the cloud includes a
coordinated combination of internal policy compliance, regulatory compliance, and
external auditing.
5.1.3 Portability
• The applications running on one cloud platform can be moved to new cloud platform and it should
operate correctly without making any changes in design, coding.
• The portability is not possible, because each of the cloud providers uses different standard languages
for their platform.
The customer should inform with the delay which causes due to any detection reporting and
subsequent management of security incidents. So there should be a proper management and the
customer should be familiar with the fact.
The applications on the cloud protect with a great security solution which based on physical and
virtual resources. The level of security is high and the same level of security must provide to
workloads which deploy in cloud services. There should centralize management across distributed
workload instances
Software–as–a–Service Security:
Software-as-a-Service (SaaS) security refers to the measures and protocols put in place to protect
data, applications, and infrastructure within a SaaS environment. With SaaS, users access
software applications hosted by a third-party provider over the internet, eliminating the need for
on-premises installation and maintenance.
➢ Cloud computing providers need to provide some solution to solve the common security challenges
that traditional communication systems face.
➢ At the same time, they also have to deal with other issues inherently introduced by the cloud
computing paradigm itself.
C. Availability
It ensures the reliable and timely access to cloud data or cloud
computing resources by the appropriate personnel. The availability is one of the big concerns
of cloud service providers, since if the cloud service is disrupted or compromised in any way; it affects
large no. of customers than in the traditional model.
D. Information Security
In the SaaS model, the data of enterprise is stored outside of the enterprise boundary, which is at the SaaS
vendor premises. Consequently, these SaaS vendor needs to adopt additional security features to ensure
data security and prevent breaches due to security vulnerabilities in the application or by malicious
employees. This will need the use of very strong encryption techniques for data security and highly
competent authorization to control access private data.
E. Data Access
Data access issue is mainly related to security policies provided to the users while accessing the data.
Organizations have their own security policies based on which each employee can have access to a
particular set of data. These security policies must be adhered by the cloud to avoid intrusion of data by
unauthorized users. The SaaS model must be flexible enough to incorporate the specific policies put
forward by the organization.
F. Network Security
In a SaaS deployment model, highly sensitive information is obtained from the various enterprises,
then processed by the SaaS application and stored at the SaaS vendor‘s premises.
All data flow over the network has to be secured in order to prevent leakage of sensitive information.
G. Data breaches
Since data from various users and business organizations lie together in a cloud environment, breaching
into this environment will potentially make the data of all the users vulnerable. Thus, the cloud
becomes a high potential target.
Risk management is a cyclically executed process comprised of a set of activities for overseeing
and controlling risks. Risk management follows a series of 5 steps to manage risk, it drives
organisations to formulate a better strategy to tackle upcoming risks.
These steps are referred to as Risk Management Process and are as follows:
This section involves the primary risks associated with cloud computing.
1. Data Breach - Data breach stands for unauthorized access to the confidential data of the
organisation by a third party such as hackers. In cloud computing, the data of the
organisation is stored outside the premise, that is at the endpoint of the cloud
service provider(CSP). Thus any attack to target data stored on the CSP servers may
affect all of its customers.
2. Cloud Vendor Security Risk - Every organisation takes services offered by different
cloud vendors. The inefficiency of these cloud vendors to provide data security and risk
mitigation directly affects the organisation's business plan and growth. Also, migrating
from one vendor to another is difficult due to different interfaces and services provided
by these cloud vendors.
3. Availability - Any internet connection loss disrupts the cloud provider's services, making
the services inoperative. It can happen at both the user's and the cloud service provider's
end. An effective risk management plan should focus on availability of services by
creating redunadancy in servers on cloud such that other servers can provide those
services if one fails.
4. Compliance - The service provider might not follow the external audit process, exposing
the end user to security risks. If a data breach at the cloud service provider's end exposes
personal data, the organisation may be held accountable due to improper protection and
agreements.
Apart from these risks, cloud computing possesses various security risks bound under 2 main
categories.
Cloud security monitoring encompasses several processes that allow organizations to review,
manage, and observe operational workflows in a cloud environment.
Cloud security monitoring combines manual and automated processes to track and assess the
security of servers, applications, software platforms, and websites.
Cloud security experts monitor and assess the data held in the cloud on an ongoing basis. They
identify suspicious behavior and remediate cloud-based security threats. If they identify an
existing threat or vulnerability, they can recommend remediations to address the issue quickly
and mitigate further damage.
Security in cloud computing is a major concern. Proxy and brokerage services should be
employed to restrict a client from accessing the shared data directly. Data in the cloud should be
stored in encrypted form.
Security Planning :
Before deploying a particular resource to the cloud, one should need to analyze several aspects of
the resource, such as:
• A select resource needs to move to the cloud and analyze its sensitivity to risk.
• Consider cloud service models such as IaaS, PaaS,and These models require the
customer to be responsible for Security at different service levels.
• Consider the cloud type, such as public, private, community, or
• Understand the cloud service provider's system regarding data storage and its transfer
into and out of the cloud.
• The risk in cloud deployment mainly depends upon the service models and cloud types.
The Cloud Security Alliance (CSA) stack model defines the boundaries between each service
model and shows how different functional units relate. A particular service model defines the
boundary between the service provider's responsibilities and the customer.
The following diagram shows the CSA stack model:
o IaaS is the most basic level of service, with PaaS and SaaS next two above levels of
services.
o Moving upwards, each service inherits the capabilities and security concerns of the model
beneath.
o IaaS provides the infrastructure, PaaS provides the platform development environment,
and SaaS provides the operating environment.
o IaaS has the lowest integrated functionality and security level, while SaaS has the
highest.
o This model describes the security boundaries at which cloud service providers'
responsibilities end and customers' responsibilities begin.
o Any protection mechanism below the security limit must be built into the system and
maintained by the customer.
Although each service model has a security mechanism, security requirements also
depend on where these services are located, private, public, hybrid, or community cloud.
Understanding data security:
Since all data is transferred using the Internet, data security in the cloud is a major concern. Here
are the key mechanisms to protect the data.
o access control
o audit trail
o certification
o authority
The service model should include security mechanisms working in all of the above areas.
Since the data stored in the cloud can be accessed from anywhere, we need to have a mechanism
to isolate the data and protect it from the client's direct access.
Broker cloud storage is a way of separating storage in the Access Cloud. In this approach, two
services are created:
1.A broker has full access to the storage but does not have access to the client.
2.A proxy does not have access to storage but has access to both the client and the
broker.
5.The client data request goes to the external service interface of the proxy.
7.The broker requests the data from the cloud storage system.
Encryption helps to protect the data from being hacked. It protects the data being transferred and
the data stored in the cloud. Although encryption helps protect data from unauthorized access, it
does not prevent data loss.
Data Security:
Data security refers to the practice of protecting digital data from unauthorized access,
corruption, or theft throughout its lifecycle. It encompasses various measures and technologies
aimed at ensuring the confidentiality, integrity, and availability of data.
Data security in cloud computing is paramount due to the shared responsibility model, where
both the cloud provider and the customer are responsible for various aspects of security.
Data privacy, integrity, and accessibility
Cloud data security best practices follow the same guiding principles of information security and
data governance:
• Data integrity: Data is trustworthy-in other words, it is accurate, authentic, and reliable.
The key here is to implement policies or measures that prevent your data from being
tampered with or deleted.
• Data availability: While you want to stop unauthorized access, data still needs to be
available and accessible to authorized people and processes when it’s needed. You’ll
need to ensure continuous uptime and keep systems, networks, and devices running
smoothly.
➢ Authorization: After a user has been authenticated, the user may be authorized to access and
use the application. The system can validate that a user has permission to access the
application by comparing the user’s identity with a list of authorized users. Authentication
must happen before authorization so that the application matches only validated user
credentials to the authorized user list.
➢ Encryption: After a user has been authenticated and is using the application, other security
measures can protect sensitive data from being seen or even used by a cybercriminal. In
cloudbased applications, where traffic containing sensitive data travels between the end user
and the cloud, that traffic can be encrypted to keep the data safe.
➢ Logging: If there is a security breach in an application, logging can help identify who got
access to the data and how. Application log files provide a time-stamped record of which
aspects of the application were accessed and by whom.
A necessary process to ensure that all of these security controls work properly.
1. Resource attacks:These kinds of attacks include manipulating the available resources into
mounting a large-scale botnet attack. These kinds of attacks target either cloud providers or
service providers.
2. Data attacks: These kinds of attacks include unauthorized modification of sensitive data at
nodes, or performing configuration changes to enable a sniffing attack via a specific device
etc. These attacks are focused on cloud providers, service providers, and also on service users.
3. Denial of Service attacks: The creation of a new virtual machine is not a difficult task, and
thus, creating rogue VMs and allocating huge spaces for them can lead to a Denial of Service
attack for service providers when they opt to create a new VM on the cloud. This kind of
attack is generally called virtual machine
sprawling.
4. Backdoor: Another threat on a virtual environment empowered by cloud computing is the use
of backdoor VMs that leak sensitive information and can destroy data privacy.
5. Having virtual machines would indirectly allow anyone with access to the host disk files of
the VM to take a snapshot or illegal copy of the whole System. This can lead to corporate
espionage and piracy of legitimate products.
Identification and authentication are the most important access control systems. Identification means
provision to identify a valid user usually with help of a username or user logon ID to the system. For
identity management following methods can be applied a. Finger print scan
b. Retina Scan
c. Iris Scan
d. Hand Geometry
e. Voice
f. Handwritten signature dynamics
Access controls help us restrict whom and what accesses our information resources, and they possess
four general functions:
These functions work together to grant access to resources and constrain what a subject can do with
them.
1. Identity Management :
Identity management consists of one or more processes to verify the identity of a subject attempting
to access an object.
However, the three pillars that support authorized access still define the tools and techniques
necessary to manage who gets access to what and what they can do when they get there:
authentication, authorization, and accountability.
• Authentication:-
When software developers build procedures into an application to ensure that only authorized users
gain access to it. Authentication procedures ensure that a user is who they say they are. This can be
accomplished by requiring the user to provide a user name and password when logging in to an
application. Multi-factor authentication requires more than one form of authentication—the factors
might include something you know (a password), something you have (a mobile device), and
something you are (a thumb print or facial recognition).
• Authorization:- After a user has been authenticated, the user may be authorized to access and use
the application. The system can validate that a user has permission to access the application by
comparing the user’s identity with a list of authorized users. Authentication must happen before
authorization so that the application matches only validated user credentials to the authorized user
list.
Accountability:-
Each step from identity presentation through authentication and authorization is logged. Further, the
object or some external resource logs all activity between the subject and object. The logs are stored
for audits, sent to a log management solution, etc. They provide insight into how well the access
control process is working: whether or not subjects abuse their access.
Approaches to Access Control :- Four common approaches exist to help with access challenges:
discretionary, role-based, mandatory, and rules-based.
ADVANTAGES
1. Different Ownership
2. Multi-user Access
3. Restriction from Ownership
DISADVANTAGES
1. Virus can easily attack.
2. Permission can be Granted or Revoked from anytime.
2. Role-based Access Control (RBAC):- Only Individual User can access it.It is the method of
restricting network access based on the roles of Individual user with an organization.
3.Mandatory Access Control (MAC)
Each user has no control over any priviledge Only system owner manages access control.
Inforrmation owner and system determines access of control.
Autonomic Security:
Autonomic security in cloud computing refers to the ability of a cloud system to automatically
detect, respond to, and mitigate security threats without human intervention. It involves the use of
advanced technologies such as artificial intelligence, machine learning, and automation to
continuously monitor the cloud environment and take appropriate actions to protect data,
applications, and infrastructure from cyber threats.
Here are some key aspects of autonomic security in cloud computing:
2. Self-Healing Mechanisms:
In case of a security breach or an attack, autonomic security systems can automatically trigger
response mechanisms to contain the threat and mitigate its impact. This may involve isolating
affected resources, applying patches or updates, or even shutting down compromised
instances.
Serverless Computing:
This paradigm allows developers to focus solely on writing code without worrying about server
management. Platforms like AWS Lambda, Google Cloud Functions, and Azure Functions execute
the code in response to events or triggers, automatically managing the infrastructure.
Containers and Orchestration:- Containers, such as Docker, encapsulate applications and
their dependencies, providing consistency across different environments. Orchestration tools
like Kubernetes automate the deployment, scaling, and management of containerized
applications, making it easier to handle complex distributed systems.
Edge Computing:- Edge computing brings computation and data storage closer to the
location where it is needed, reducing latency and bandwidth usage. It's particularly relevant
for IoT applications, real-time analytics, and scenarios requiring rapid decision-making.
AI and Machine Learning in the Cloud:- Cloud providers offer AI and machine learning
services, such as AWS AI, Google Cloud AI, and Azure AI, allowing developers to integrate
advanced capabilities like natural language processing, computer vision, and predictive
analytics into their applications without requiring expertise in these domains.
Blockchain as a Service (BaaS):- Some cloud providers offer blockchain services that
enable developers to build, deploy, and manage blockchain networks and applications
without the complexity of infrastructure management. Examples include Azure Blockchain
Service and AWS Blockchain Templates.
Serverless Databases:- Serverless databases, such as AWS DynamoDB and Google Cloud
Firestore, automatically scale and manage the underlying infrastructure based on application
demand, eliminating the need for capacity planning and provisioning.
Security and Compliance:- Advanced cloud security features, such as encryption, identity
and access management (IAM), and security monitoring, help organizations protect their data
and applications from unauthorized access, breaches, and compliance violations.