Cloud Security Notes - Unit-I
Cloud Security Notes - Unit-I
At the same time, cloud computing has raised multiple eyebrows with IT management, especially when it
comes to data security in the cloud computing. Data security and privacy protection are two major
factors. These two factors are becoming more important for the future development of cloud computing
technology in business, industry, and government. While addressing this fear, Google claimed that data
stored in the cloud are much safer.
Every business faces this challenge. Snapshots and data backups are taken on a daily basis. They
automatically stored in the cloud. Are you aware where they have been stored and who can see and access
them? Can you identify and control unauthorised copying of your data?
Data Loss
Data loss can be a disaster for any business. Virtual data can be easily lost or exposed as it moves
between VMs or in the cloud. Are you sure that authorised users are accessing your data within
predefined policies? Do you have the authority to block any user who is violating data use policies?
New Class of Users
Cloud computing need cooperation between security, storage, application, and security admins. They all
manage your sensitive business data. With more number of users, the risk also increases. If one admin
went wrong, entire data in the system will be at risk.
Insecure APIs
Application Programming Interfaces (API) allow users to customize their cloud computing practices.
APIs can be a threat to cloud security because of their nature. APIs give developers the tools to build
solutions to integrate their applications with other software. The vulnerability of an API depends on the
communication that takes place between applications. While this can help developers and businesses, they
also issue serious security concerns.
Internal Threat
Never keep this point out of your mind. You may be thinking data is safe inside. But this is one of the
biggest challenge company’s face. Employees can use their access to an organisation’s cloud-based
services to misuse or access information related to finance, customer details etc.
How to Protect your Data?
You can protect your business data in the cloud from unauthorised access. All you need is a sharp eye and
an extra effort. Here are few practical tips to keep your cloud data safe and secure.
Always keep backup locally
When it comes to business data, you have to be extra conscious. Always have a backup for your data. It is
always good to create hard copies of your business data and keep it with yourself so that you can have
access them even if you lost the original one. You can use any cloud storage solutions to store your data.
You can set up a cloud account & can keep the backup copies.
Don’t store sensitive data
Technology is changing. Businesses are also changing as per the technology. Data is playing an important
role in businesses today. So, data privacy is one of the primary aspects of any business. But if something
is there on the internet, it is hard to trust it is safe. So, one should avoid storing the most sensitive files or
information in the cloud.
Data encryption
This is the best form of security because you need decryption before accessing the data. This will protect
data against service providers and users also. To make it more protected, you can also ensure cloud
encryption during uploading and downloading phases. But, this will make data sharing and sync in the
cloud platform little slow.
Encrypted cloud service
There are few cloud services which provide local encryption and decryption of your files and information
inside that other than storage and backup. This means the service takes care of both encrypting your files
and storing them safely in the cloud.
Using password
You can opt for 2-step verification for login if your cloud service offers that option. Google drive use 2
phase log in option, consist of password & code sent to the registered number. This added security will
make your data much safer.
Keep an eye on what you do online
The security of your cloud data largely depends on your online behaviour. While using a public computer,
never save your password, and always ensure that you logged out properly. Another biggest concern is
accessing cloud data in unsecured or open Wi-Fi hotspots. Such connections are unencrypted, hackers can
target your data easily. Never save your password in any of the public forum or social media. Change Wi-
Fi passwords frequently.
Anti-virus is a must
If you expose yourself to bugs and viruses, hackers can access your system easily. You need to choose a
very effective and robust anti-virus system for your system, which will protect all the files and
information inside that. If your system isn’t well protected, and if the system is not encrypted and secured
from bugs, hackers can get hold of your information.
Read your user agreement
Initially, it will be difficult to understand and at times it will test your patience, but you need to face this.
User agreements always carry essential information which can help you understand things in detail.
Access limitation
Give access to those users who really need. Internal users and third party vendors should only get access
to those files which will help them to do their jobs.
Platform, control & service monitoring
Platform, control & services monitoring is usually performed as a dashboard interface and makes it
possible to identify the operational status of the platform being monitored at any time. Each operational
element which is monitored provides an operational status indicator.
Continuous system updating
Cloud data security is enhanced with regular patching and upgrading of systems and application software
in the cloud platform. New patches, updates, and service packs for the operating system are required to
maintain high-end security levels and support new versions of installed products.
Legal & regulatory challenges
This should be the primary focus for cloud service providers. There are many legal & regulatory
challenges which needs to be addressed when data moves from one country to another.
Multinational Framework on privacy and security :
To ensure every business and country get full advantage of cloud computing, different countries have to
cooperate to develop a multinational framework on data privacy and security in the cloud. As cloud
computing evolves, and data flows from one country to another
Rules on Cross-border data transfers :
To enhance the efficiency and security of cloud solutions and deliver quick results, cloud service
providers must be able to operate datacentres in multiple locations and transfer data freely between them.
Conflicting legal obligations:
Different governments have different policies when it comes to data flow in their country. Cloud
providers will be in legal trouble if they won’t follow the predefined cyber laws. Divergent rules on
privacy, data retention, law enforcement access and other issues can lead to ambiguity.
3. Risk issues in cloud: (7 principles that support security assurance)
Confidentiality:
Risk: Inadequate protection of sensitive data stored in the cloud can lead to unauthorized access and
exposure of confidential information to unauthorized parties.
Impact: Loss of confidentiality can result in financial losses, reputational damage, and regulatory non-
compliance.
Mitigation: Implement strong encryption techniques, access controls, and secure data transmission
protocols to protect data confidentiality in the cloud.
Integrity:
Risk: The risk of data tampering or alteration during storage, transmission, or processing in the cloud.
Impact: Unauthorized modification or corruption of data can lead to data integrity violations, loss of trust,
and incorrect decision-making.
Mitigation: Implement data integrity checks, such as checksums or digital signatures, to detect and
prevent unauthorized modifications. Regularly monitor and audit data for integrity violations.
Availability:
Risk: The risk of service disruptions or unavailability of cloud services due to various factors such as
system failures, network outages, or cyber-attacks.
Impact: Downtime or unavailability of cloud services can result in business disruptions, financial losses,
and damage to customer trust.
Mitigation: Implement robust disaster recovery and business continuity plans, redundant infrastructure,
and proactive monitoring to ensure high availability of cloud services.
Other Important Concepts:
Privacy and Compliance Risks: Inadequate protection of personal information and non-compliance with
privacy regulations can result in legal consequences and reputational damage.
The Payment Card Industry Data Security Standard (PCI DSS): Non-compliance with PCI DSS
requirements can lead to financial penalties, loss of customer trust, and increased risk of payment card
data breaches.
Information Privacy and Privacy Laws: Failure to comply with privacy laws and regulations can result in
legal liabilities and damage to an organization's reputation.
Threats to Infrastructure, Data, and Access Control: Cloud environments face various threats such as
unauthorized access, data breaches, and compromised infrastructure that can lead to significant risks and
losses.
Common Threats and Vulnerabilities: Various threats such as logon abuse, eavesdropping, network
intrusion, and denial-of-service (DoS) attacks pose risks to cloud environments.
Cloud Access Control Issues: Inadequate access control mechanisms in the cloud can lead to
unauthorized access to sensitive data and resources.
Database Integrity Issues: Data integrity risks arise when databases in the cloud are not properly
secured and protected against unauthorized modifications or corruption.
Cloud Service Provider Risks: Risks associated with the reliance on cloud service providers include
vendor lock-in, service disruptions, and inadequate security practices.
Specific Threats:
Back-Door: Unauthorized access points or hidden functionalities in cloud systems that can be exploited
for malicious purposes.
Spoofing: Impersonating another entity or user to gain unauthorized access to cloud services.
Man-in-the-Middle: Interception and alteration of communication between cloud users and services,
allowing unauthorized access or data tampering.
Replay: Capturing and retransmitting network communications to perform unauthorized actions or gain
unauthorized access.
TCP Hijacking: Unauthorized takeover of a TCP connection between cloud users and services.
Social Engineering: Manipulating individuals to disclose sensitive information or perform actions that
compromise cloud security.
Dumpster Diving: Unauthorized access or retrieval of discarded physical or digital documents containing
sensitive information.
Password Guessing: Repeated attempts to guess or crack passwords to gain unauthorized access to cloud
accounts or systems.
Trojan Horses and Malware: Malicious software or code that can infect cloud systems, compromise
security, and steal or manipulate data.
4. Security challenges in cloud:
1. External data breaches.
1. A data breach is an incident where information is stolen or taken from a system without
the knowledge or authorization of the system’s owner. A small company or large
organization may suffer a data breach.
2. These attacks may be due to the provider’s failure to properly secure its network or the
customer’s failure to properly patch its operating systems and applications, which open
the organization up to external attacks, such as DDoS and other malware.
2. Misconfiguration.
1. Cloud security is naturally complex, and the risk of configuring something incorrectly is
high, particularly when an organization engages with a new service provider or expands
their cloud user base.
3. Poor authentication controls.
1. Controlling access to cloud resources is more complex than on an internal network,
creating more opportunities for misconfigurations.
4. Account hijacking via phishing.
1. The risk of data theft from a phishing attack targeted at stealing usernames and passwords
intensifies in cloud applications.
5. API insecurities.
1. Insecure APIs used to access cloud resources are increasingly common avenues for cyber
attackers attempting to gain access.
External Sharing of Data
External data sharing is one of the leading cloud security challenges businesses face.
This issue arises when data is shared with third-party providers who have to be examined and
approved by the organization.
As a result, external data sharing can lead to the loss of critical business information and theft and
fraud.
To prevent these risks, companies must implement robust security measures,
Encryption
Data management practices.
Unsecure Third-party Resources
Third-party resources are applications, websites, and services outside the cloud provider’s
control.
These resources may have security vulnerabilities, and unauthorized access to your data is
possible.
Additionally, unsecured third-party resources may allow hackers to access your cloud data.
These vulnerabilities can put your security at risk.
Therefore, it is essential to ensure that only trusted, and secure resources are used for cloud
computing.
Security Policy Implementation: Implementing security policies in cloud computing involves defining
and enforcing guidelines, rules, and practices to protect data and ensure the secure operation of cloud-
based systems. It typically includes the following steps:
o IaaS is the most basic level of service, with PaaS and SaaS next two above levels of services.
o Moving upwards, each service inherits the capabilities and security concerns of the model
beneath.
o IaaS provides the infrastructure, PaaS provides the platform development environment, and SaaS
provides the operating environment.
o IaaS has the lowest integrated functionality and security level, while SaaS has the highest.
o This model describes the security boundaries at which cloud service providers' responsibilities
end and customers' responsibilities begin.
o Any protection mechanism below the security limit must be built into the system and maintained
by the customer.
What is Cloud Security Architecture?
A cloud security architecture is defined by the
Security layers
Design, and
Structure of the platform,
Tools,
Software
infrastructure, and
Best practices that exist within a Cloud Security Architecture
A cloud security architecture provides the written and visual model to define how to configure and secure
activities and operations within the cloud.
Security Planning
Before deploying a particular resource to the cloud, one should need to analyze several aspects of the
resource, such as:
A select resource needs to move to the cloud and analyze its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS,and These models require the customer to be
responsible for Security at different service levels.
Consider the cloud type, such as public, private, community, or
Understand the cloud service provider's system regarding data storage and its transfer into and
out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.
Cloud infrastructure is made up of at least 7 basic components, including user accounts, servers,
storage systems, and networks.
Cloud environments are dynamic, with short-lived resources created and terminated many
times per day.
This means each of these building blocks must be secured in an automated and systematic
manner.
Securing 7 Key Components of Your Cloud Infrastructure
Here are key best practices to securing the key components of a typical cloud environment.
1.Accounts
Service accounts in the cloud are typically privileged accounts, which may have access to critical
infrastructure.
Once compromised, attackers have access to cloud networks and can access sensitive resources
and data.
Use identity and access management (IAM) to set policies controlling access and authentication
to service accounts.
Use a cloud configuration monitoring tool to automatically detect and remediate non-secured
accounts.
Finally, monitor usage of sensitive accounts to detect suspicious activity and respond.
2.Servers
While a cloud environment is virtualized, behind the scenes it is made up of physical hardware
deployed at multiple geographical locations.
This includes physical servers, storage devices, load balancers, and network equipment like
switches and routers.
Here are a few ways to secure a cloud server, typically deployed using a compute service like
Amazon EC2:
Control inbound and outbound communication—your server should only be allowed to connect
to networks, and specific IP ranges needed for its operations.
For example, a database server should not have access to the public internet, or any other IP,
except those of the application instances it serves.
Use SSH keys—avoid accessing cloud servers using passwords, because they are vulnerable to
brute force attacks and can easily be compromised.
Use SSH(Shell or Secure Socket Shell) keys, which leverage public/private key cryptography for
more secure access.
Minimize privileges—only users or service roles that absolutely need access to a server should
be granted access.
Carefully control the access level of each account to ensure it can only access the specific files
and folders, and perform specific operations, needed for their role.
Avoid using the root user—any operation should be performed using identified user accounts.
3.Hypervisors
A hypervisor runs on physical hardware, and makes it possible to run several virtual machines (VMs),
each with a separate operating system.
Therefore, hypervisors are a key security concern, because compromise of the hypervisor (an attack
known as hyperjacking) gives the attacker access to all hosts and virtual machines running on it.
Ensure machines running hypervisors are hardened, patched, isolated from public networks,
and physically secured in your data center
Assign least privileges to local user accounts, carefully controlling access to the hypervisor
Harden, secure, and closely monitor machines running the virtual machine monitor (VMM)
and virtualization management software, such as VMware vSphere
Secure and monitor shared hardware caches and networks used by the hypervisor
4.Storage
Storage systems become elastic pools of storage, or virtualized resources that can be provisioned and
scaled automatically.
Here are a few ways to secure your cloud storage services:
Identify which devices or applications connect to cloud storage, which cloud storage services
are used throughout the organization, and map data flows.
Block access to cloud storage for internal users who don’t need it
Classify data into sensitivity levels—a variety of automated tools are available. This can help you
focus on data stored in cloud storage that has security or compliance implications.
Remove unused data—cloud storage can easily scale and it is common to retain unnecessary
data, or entire data volumes or snapshots that are no longer used.
Carefully control access to data using identity and access management (IAM) systems, and
applying consistent security policies for cloud and on-premises systems.
Use cloud data loss prevention (DLP) tools to detect and block suspicious data transfers
5.Databases
Databases in the cloud can easily be exposed to public networks, and almost always contain sensitive
data, making them an imminent security risk.
If you use a managed database service, these concerns are typically handled by the cloud provider.
Database security policies—ensure database settings are in line with your organization’s security
and compliance policies. Map your security requirements and compliance obligations to specific
settings on cloud database systems.
Network access—as a general rule, databases should never be exposed to public networks and
should be isolated from unrelated infrastructure.
Permissions—grant only the minimal level of permissions to users, applications and service
roles. Avoid “super users” and administrative users with blanket permissions. Each administrator
should have access to the specific databases they work on.
End user device security—security is not confined to the cloud environment. You should be
aware what endpoint devices administrators are using to connect to your database.
6.Network
Use security groups to define rules that define what traffic can flow between cloud resources.
Use Network Access Control Lists (ACL) to control access to virtual private networks. ACLs
provide both allow and deny rules.
Use additional security solutions such as firewalls as a service (FWaaS) and web application
firewalls (WAF) to actively detect and block malicious traffic.
Deploy Cloud Security Posture Management (CSPM) tools to automatically review cloud
networks, detect non-secure or vulnerable configurations and remediate them.
7.Kubernetes
• Code—ensuring code in containers is not malicious and uses secure coding practices
• Clusters—protecting Kubernetes master nodes and ensuring cluster configuration is in line with
security best practices
• Cloud—using cloud provider tools to secure the underlying infrastructure, including compute
instances and virtual private clouds (VPC)
Developing secure software is based on applying the secure software design principles that form the
fundamental basis for software assurance.
The Data and Analysis Center for Software (DACS) Suggest three important properties are required to
ensure the security,
Dependability
Trustworthiness
Survivability (Resilience)
Dependability
Software that executes predictably and operates correctly under a variety of conditions, including when
under attack or running on a malicious host
Trustworthiness
Survivability (Resilience)
Software that is resistant to or tolerant of attacks and has the ability to recover as quickly as possible
with as little harm as possible
Confidentiality, Integrity, and Availability (CIA)
Confidentiality, integrity, and availability are sometimes known as the CIA triad of information system
security, and are important pillars of cloud software assurance.
1. Confidentiality
Covert channels
Traffic analysis
Encryption
Inference:
Intellectual property (IP) includes inventions, designs, and creative, musical, and literary works.
Rights to intellectual property are covered by copyright laws, which protect creations of the
mind, and patents, which are granted for new inventions.
A covert channel is an unauthorized and unintended communication path that enables the
exchange of information.
Traffic analysis is a form of confidentiality breach that can be accomplished by analyzing the
volume, rate, source, and destination of message traffic, even if it is encrypted.
Increased message activity and high bursts of traffic can indicate a major event is occurring.
1.4 Encryption
The amount of effort (work factor) required to decrypt the message is a function of the strength
of the encryption key and the robustness and quality of the encryption algorithm.
1.5 Inference
Inference is the ability of an entity to use and correlate information protected at one level of
security to uncover information that is protected at a higher security level.
2.Integrity
internal information is consistent both among all sub-entities and with the real-world, external situation
3.Availability
Availability ensures the reliable and timely access to cloud data or cloud computing resources
by the appropriate personnel.
Availability guarantees that the systems are functioning properly when needed.
Authentication
Authorization
Auditing
Accountability
Authentication
It establishes the user’s identity and ensures that users are who they claim to be.
For example, a user presents an identity (user ID) to a computer login screen and
1.Authorization
Authorization refers to rights and privileges granted to an individual or process that enable
access to computer resources and information assets.
Once a user’s identity and authentication are established, authorization levels determine the
extent of system rights a user can hold.
2.Auditing
System audits
Monitoring.
These methods can be employed by the cloud customer, the cloud provider, or both, depending on
asset architecture and deployment.
Monitoring refers to an ongoing activity that examines either the system or the users, such as
intrusion detection.
Information technology (IT) auditors are often divided into two types:
Internal
External
Backup controls
Contingency plans
In addition, an auditor should examine the audit logs for the following:
3.Accountability
Accountability is the ability to determine the actions and behaviors of a single individual
within a cloud system and to identify that particular individual.
Audit trails and logs support accountability and can be used to conduct examination studies in
order to analyze historical events and the individuals or processes associated with those events.
Since all data is transferred using the Internet, data security in the cloud is a major concern.
access control
audit trail
certification
authority
The service model should include security mechanisms working in all of the above areas.
Since the data stored in the cloud can be accessed from anywhere, we need to have a mechanism to
isolate the data and protect it from the client's direct access.
A broker has full access to the storage but does not have access to the client.
A proxy does not have access to storage but has access to both the client and the broker.
2. The client data request goes to the external service interface of the proxy.
4. The broker requests the data from the cloud storage system.
5. The cloud storage system returns the data to the broker.