4 Cloud Computing.pptx
4 Cloud Computing.pptx
S5 BCA
MODULE 4
⦿ Data Storage and Security
◼ Data storage- Introduction to Enterprise Data
Storage
◼ Data Storage Management
◼ File Systems
◼ Cloud Data Stores
◼ Cloud Computing and Security – Risks in Cloud
Computing
◼ Types of Risks
◼ Risk Management Process
CLOUD COMPUTING SECURITY
⦿ Security in cloud computing is a major concern. Data in cloud
should be stored in encrypted form. To restrict client from
accessing the shared data directly, proxy and brokerage services
should be employed.
⦿ Security Planning
⦿ Before deploying a particular resource to cloud, one should need
to analyze several aspects of the resource such as:
⦿ Select resource that needs to move to the cloud and analyze its
sensitivity to risk.
⦿ Consider cloud service models such as IaaS,
PaaS, and SaaS. These models require customer to be
responsible for security at different levels of service.
⦿ Consider the cloud type to be used such as public, private,
community or hybrid.
⦿ Understand the cloud service provider's system about data
storage and its transfer into and out of the cloud.
⦿ The risk in cloud deployment mainly depends upon the service
models and cloud types.
TYPES OF CLOUD COMPUTING
SECURITY CONTROLS
⦿ There are 4 types of cloud computing security
controls i.e.
◼ Deterrent Controls : Deterrent controls are designed to
block nefarious attacks on a cloud system. These come in
handy when there are insider attackers.
◼ Preventive Controls : Preventive controls make the
system resilient to attacks by eliminating vulnerabilities
in it.
◼ Detective Controls : It identifies and reacts to security
threats and control. Some examples of detective control
software are Intrusion detection software and network
security monitoring tools.
◼ Corrective Controls : In the event of a security attack
these controls are activated. They limit the damage
caused by the attack.
CLOUD SECURITY ALLIANCE
(CSA) STACK MODEL
⦿ A particular service model defines the
boundary between the responsibilities of
service provider and customer. Cloud
Security Alliance (CSA) stack model defines
the boundaries between each service model
and shows how different functional units
relate to each other. The following diagram
shows the CSA stack model:
CLOUD SECURITY ALLIANCE
(CSA) STACK MODEL
CLOUD SECURITY ALLIANCE
(CSA) STACK MODEL
⦿ IaaS is the most basic level of service with PaaS and
SaaS next two above levels of services.
⦿ Moving upwards, each of the service inherits
capabilities and security concerns of the model
beneath.
⦿ IaaS provides the infrastructure, PaaS provides
platform development environment, and SaaS
provides operating environment.
⦿ IaaS has the least level of integrated functionalities
and integrated security while SaaS has the most.
⦿ This model describes the security boundaries at
which cloud service provider's responsibilities end
and the customer's responsibilities begin.
⦿ Any security mechanism below the security boundary
must be built into the system and should be
maintained by the customer.
UNDERSTANDING DATA SECURITY
⦿ Since all the data is transferred using Internet, data security is
of major concern in the cloud. Here are key mechanisms for
protecting data.
⦿ Access Control
⦿ Auditing
⦿ Authentication
⦿ Authorization
⦿ All of the service models should incorporate security mechanism
operating in all above-mentioned areas.
⦿ Isolated Access to Data
⦿ Since data stored in cloud can be accessed from anywhere, we
must have a mechanism to isolate data and protect it from
client’s direct access.
⦿ Brokered Cloud Storage Access is an approach for isolating
storage in the cloud. In this approach, two services are created:
⦿ A broker with full access to storage but no access to client.
⦿ A proxy with no access to storage but access to both client and
broker.
WORKING OF BROKERED CLOUD
STORAGE ACCESS SYSTEM
⦿ When the client issues request to access data:
⦿ The client data request goes to the external
service interface of proxy.
⦿ The proxy forwards the request to the broker.
⦿ The broker requests the data from cloud storage
system.
⦿ The cloud storage system returns the data to the
broker.
⦿ The broker returns the data to proxy.
⦿ Finally the proxy sends the data to the client.
BROKERED CLOUD STORAGE
ACCESS SYSTEM
RISK MANAGEMENT
⦿ Risk management is the process of identifying,
assessing, and controlling threats to an organisation's
system security, capital and resources.
⦿ Effective risk management means attempting to
control future outcomes proactively rather than
reactively.
⦿ In the context of cloud computing, risk management
plans are curated to deal with the risks or threats
associated with the cloud security.
⦿ Every business and organisation faces the risk of
unexpected, harmful events that can cost the
organisation capital or cause it to permanently close.
⦿ Risk management allows organisations to prevent and
mitigate any threats, service disruptions, attacks or
compromises by quantifying the risks below the
threshold of acceptable level of risks.
TYPES OF SECURITY RISKS OF CLOUD
COMPUTING
⦿ Cloud computing provides various advantages, such as improved
collaboration, excellent accessibility, Mobility, Storage capacity,
etc. But there are also security risks in cloud computing.
⦿ Some most common Security Risks of Cloud Computing are given
below-
⦿ Data Loss
◼ Data loss is the most common cloud security risks of cloud computing.
It is also known as data leakage. Data loss is the process in which data
is being deleted, corrupted, and unreadable by a user, software, or
application. In a cloud computing environment, data loss occurs when
our sensitive data is somebody else's hands, one or more data
elements can not be utilized by the data owner, hard disk is not
working properly, and software is not updated.
⦿ Hacked Interfaces and Insecure APIs
◼ Cloud computing is completely depends on Internet, so it is
compulsory to protect interfaces and APIs that are used by external
users. APIs are the easiest way to communicate with most of the cloud
services. In cloud computing, few services are available in the public
domain. These services can be accessed by third parties, so there may
be a chance that these services easily harmed and hacked by hackers.
TYPES OF SECURITY RISKS OF CLOUD
COMPUTING
⦿ Data Breach
◼ Data Breach is the process in which the confidential data
is viewed, accessed, or stolen by the third party without
any authorization, so organization's data is hacked by the
hackers.
⦿ Vendor lock-in
◼ Vendor lock-in is the of the biggest security risks in cloud
computing. Organizations may face problems when
transferring their services from one vendor to another. As
different vendors provide different platforms, that can
cause difficulty moving one cloud to another.
⦿ Increased complexity strains IT staff
◼ Migrating, integrating, and operating the cloud services is
complex for the IT staff. IT staff must require the extra
capability and skills to manage, integrate, and maintain
the data to the cloud.
TYPES OF SECURITY RISKS OF CLOUD
COMPUTING
⦿ Spectre & Meltdown
◼ Spectre & Meltdown allows programs to view and steal data which is
currently processed on computer. It can run on personal computers,
mobile devices, and in the cloud. It can store the password, your
personal information such as images, emails, and business documents
in the memory of other running programs.
⦿ Denial of Service (DoS) attacks
◼ Denial of service (DoS) attacks occur when the system receives too
much traffic to buffer the server. Mostly, DoS attackers target web
servers of large organizations such as banking sectors, media
companies, and government organizations. To recover the lost data,
DoS attackers charge a great deal of time and money to handle the
data.
⦿ Account hijacking
◼ Account hijacking is a serious security risk in cloud computing. It is the
process in which individual user's or organization's cloud account (bank
account, e-mail account, and social media account) is stolen by
hackers. The hackers use the stolen account to perform unauthorized
activities.
PROCESS OF RISK MANAGEMENT
⦿ Risk management is a cyclically executed process
comprised of a set of activities for overseeing and
controlling risks. Risk management follows a series
of 5 steps to manage risk, it drives organisations to
formulate a better strategy to tackle upcoming risks.
These steps are referred to as Risk Management
Process and are as follows:
⦿ Identify the risk
⦿ Analyze the risk
⦿ Evaluate the risk
⦿ Treat the risk
⦿ Monitor or Review the risk