0% found this document useful (0 votes)
23 views

Bcs 2417 Cloud Computing Lecture Notes Week 1-3

Uploaded by

njugunatracy10
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Bcs 2417 Cloud Computing Lecture Notes Week 1-3

Uploaded by

njugunatracy10
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

4th Year 2024 Cloud Computing (BCS 2417)

WEEK 1 & 2
Introduction to Cloud Computing

Clouds are distributed technology platforms that leverage sophisticated technology


innovations to provide highly scalable and resilient environments that can be remotely
utilized by organizations in a multitude of powerful ways. To successfully build upon,
integrate with, or even create a cloud environment requires an understanding of its
common inner mechanics, architectural layers, and models, as well as an understanding
of the business and economic factors that result from the adoption and real-world use
of cloud-based services.
Simply put, cloud computing is the delivery of computing services—including servers,
storage, databases, networking, software, analytics, and intelligence—over the Internet
(“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
OR
Cloud Computing is the delivery of computing services such as servers, storage,
databases, networking, software, analytics, intelligence, and more, over the Cloud
(Internet).

Nowadays, Cloud computing is adopted by every company, whether it is an MNC or


a startup many are still migrating towards it because of the cost-cutting, lesser
maintenance, and the increased capacity of the data with the help of servers maintained
by the cloud providers.
One more reason for this drastic change from the On-premises servers of the companies
to the Cloud providers is the ‘Pay as you go’ principle-based services provided by them
i.e., you only have to pay for the service which you are using. The disadvantage On-
premises server holds is that if the server is not in use the company still has to pay for
it.

Understanding How Cloud Computing Works?


Cloud computing helps users in easily accessing computing resources like storage, and
processing over internet rather than local hardwares. Here we discussing how it works
in nutshell:
• Infrastructure: Cloud computing depends on remote network servers hosted on
internet for store, manage, and process the data.
• On-Demand Acess: Users can access cloud services and resources based on-
demand they can scale up or down the without having to invest for physical
hardware.
• Types of Services: Cloud computing offers various benefits such as cost saving,
scalability, reliability and acessibility it reduces capital expenditures, improves
efficiency.

Emergence of Cloud Computing


Mainframe computing in the 1950s and the internet explosion in the 1990s came toget
her to give rise to cloud computing. Since businesses like Amazon, Google,
and Salesforce started providing web-based services in the early 2000s. The term
“cloud computing” has gained popularity. Scalability, adaptability, and cost-
effectiveness are to be facilitated by the concept’s on-demand internet-based access to
computational resources.
These days, cloud computing is pervasive, driving a wide range of services across
markets and transforming the processing, storage, and retrieval of data

There are four types forms of cloud computing:


Private
Public
Hybrid
Multiclouds
Within these there are also three main services of cloud computing:
Infrastructure-as-a-Service (IaaS),
Platforms-as-a-Service (PaaS), and
Software-as-a-Service (SaaS)

Public cloud

Public clouds deliver resources, such as compute, storage, network, develop-and-deploy


environments, and applications over the internet. They are owned and run by third-
party cloud service providers like Google Cloud.

Private cloud

Private clouds are built, run, and used by a single organization, typically located on-
premises. They provide greater control, customization, and data security but come with
similar costs and resource limitations associated with traditional IT environments.

Hybrid cloud

Environments that mix at least one private computing environment (traditional IT


infrastructure or private cloud, including edge) with one or more public clouds are called
hybrid clouds. They allow you to leverage the resources and services from different
computing environments and choose which is the most optimal for the workloads.

Cloud Based Services,

Infrastructure as a Service (IaaS)

IaaS delivers on-demand infrastructure resources, such as compute, storage,


networking, and virtualization. With IaaS, the service provider owns and operates the
infrastructure, but customers will need to purchase and manage software, such as
operating systems, middleware, data, and applications.
• Flexibility and Control: IaaS comes up with providing virtualized computing
resources such as VMs, Storage, and networks facilitating users with control over
the Operating system and applications.
• Reducing Expenses of Hardware: IaaS provides business cost savings with the
elimination of physical infrastructure investments making it cost-effective.
• Scalability of Resources: The cloud provides in scaling of hardware resources
up or down as per demand facilitating optimal performance with cost efficiency.

Platform as a Service (PaaS)

PaaS delivers and manages hardware and software resources for developing, testing,
delivering, and managing cloud applications. Providers typically offer middleware,
development tools, and cloud databases within their PaaS offerings.

• Simplifying the Development: Platform as a Service offers application


development by keeping the underlying Infrastructure as an Abstraction. It helps
the developers to completely focus on application logic ( Code ) and background
operations are completely managed by the AWS platform.
• Enhancing Efficiency and Productivity: PaaS lowers the Management of
Infrastructure complexity, speeding up the Execution time and bringing the
updates quickly to market by streamlining the development process.
• Automation of Scaling: Management of resource scaling, guaranteeing the
program’s workload efficiency is ensured by PaaS.

Software as a Service (SaaS)

SaaS provides a full application stack as a service that customers can access and use.
SaaS solutions often come as ready-to-use applications, which are managed and
maintained by the cloud service provider.

• Collaboration And Accessibility: Software as a Service (SaaS) helps users to


easily access applications without having the requirement of local installations. It is
fully managed by the AWS Software working as a service over the internet
encouraging effortless cooperation and ease of access.
• Automation of Updates: SaaS providers manage the handling of software
maintenance with automatic latest updates ensuring users gain experience with
the latest features and security patches.
• Cost Efficiency: SaaS acts as a cost-effective solution by reducing the overhead
of IT support by eliminating the need for individual software licenses.

Serverless computing (Function as a Service)

This is a relatively new cloud service model that provides solutions to build applications
as simple, event-triggered functions without managing or scaling any infrastructure.

• Event-Driven Execution: FaaS helps in the maintenance of servers and


infrastructure making users worry about it. FaaS facilitates the developers to run
code as a response to the events.
• Cost Efficiency: FaaS facilitates cost efficiency by coming up with the principle
“Pay as per you Run” for the computing resources used.
• Scalability and Agility: Serverless Architectures scale effortlessly in handing the
workloads promoting agility in development and deployment.

Differences between IaaS, PaaS, SaaS, and serverless


A simple analogy to help remember the difference between IaaS, PaaS, SaaS, and
serverless is to think of the models like eating fresh pasta. You could make your own
from scratch (on-premises data center), where you buy all the basic ingredients to
make everything like the sauce and dough.

However, most of us generally don’t have enough time or don’t want to spend so much
time and effort to eat a bowl of pasta. Instead you might choose from the following
options instead:

• IaaS: Buying pre-packed ingredients like fresh pasta and sauce made by someone else
that you use to cook at home.
• PaaS: Order takeout or delivery where your meal is prepared for you and you don’t
have to worry about the ingredients or how you’ll cook it, but you have to worry about
where you’ll eat, the utensils, and cleaning up after your meal.
• SaaS: Call ahead to the restaurant and order the exact meal you want. They prepare
everything ahead of time for you so that all you have to do is show up and eat.
• Serverless: Go out to dinner and order pasta at a restaurant, alone or with friends.
You pay and eat whatever you want and the restaurant makes sure there’s enough
ingredients and staff to create the order without a long wait.

Cloud computing technology continues to accelerate digital transformations, providing


organizations with everything from compute and storage to cloud databases and
development tools to advanced data analytics and AI/ML capabilities.
Grid Computing Vs. Cloud Computing,
Cloud Computing is the use of remote servers to store, manage, and process data
rather than using local servers while Grid Computing can be defined as a network of
computers working together to perform a task that would rather be difficult for a
single machine.

What is Grid Computing?

Grid computing is a type of system for computing that pools computer resources
located in several places to accomplish a single objective. All idle resources from several
computers are combined and made accessible for a single job. Grid computing is used
by businesses to conduct massive activities or solve complicated issues that might be
challenging to address on one computer. It is often conducted on a "data grid," a
collection of computers that interface directly with one another to coordinate
operations.

Overview of Grid Computing Architecture

In a standardized system known as a "grid," mixed categories of servers, networks, and


storage systems are joined together and presented to the user as the lone computing
unit. Three different machine types typically make up a grid computing network:

• A control node or server manages the whole network and keeps track of the
resources in an online pool. It can be a single server or a collection of servers.

• A computer that gives resources to the pool of network resources is referred to as a


"provider" or "grid node."

• A user is a machine that utilizes network resources to carry out a task, also known as
a resource user.

Every machine connected to the grid network runs specialized software for grid
computing. The software manages and coordinates all the jobs in the grid. The program
divides the primary work into smaller tasks and assigns each computer one of those
smaller tasks. This enables all computers to operate on their subtasks at the same time.
The results of every computer are combined when the subtasks are completed to finish
the bigger main task.
The program enables computers to interact and share information about the subtasks.
Consequently, computers can combine their output for the given main job. Grid
computing is a kind of distributed computing in which a virtual supercomputer
aggregates the resources of numerous separate computers deployed across
geographies. As part of a grid, computers share resources like power for processing,
internet connectivity, and storage space to carry out tasks requiring a lot of computing
power. Overall, the grid design is a single computational unit.

Use Cases and Applications of Grid Computing

Services in Finance

Grid computing is largely used by financial companies to handle risk management


obstacles. They can reduce the time needed to anticipate portfolio changes in unstable
markets by utilizing the pooled processing capability of the grid.

Medical Care

Massive volumes of patient data are being stored and analyzed using grid computing in
the healthcare sector. This can aid with the development of personalized therapy, the
advancement of medical research, and even the identification and control of disease
outbreaks.

Media

A robust computer is needed to generate the intricate special effects in some movies.
Grid computing is used by special effects creators to accelerate the production timeline.
They use grid-supported software that distributes processing resources to produce
special-effect visuals.

What is Cloud Computing?

Cloud computing refers to distributing computer services through the Internet, such as
computers, storage devices and software, and analytics, to promote quicker innovation,
adaptable resource use, and cost savings. Small and large businesses utilize cloud
computing technology to store information in the cloud and provide access to it through
a web connection from any location at any time.

Overview of Cloud Computing Architecture

To establish cloud computing environments, different cloud-based components, such as


technology, simulated resources, computer programming skills, and network-based
systems, must interact and be connected in a certain way. This is referred to as cloud
architecture. It serves as a roadmap that specifies how to effectively integrate
resources to create a cloud-based system for a particular business purpose. The
architecture of cloud computing combines event-based and service-driven design.

The architecture of cloud computing is separated into two parts: front end and back
end. Through the Internet, the front end and back end can communicate. In cloud
computing, frontend systems include the client facilities, such as user experiences,
user-side applications, and client networks or devices, which let users communicate
with and use cloud computing services. The cloud architecture's back end includes all
the parts that go into creating the cloud itself, such as the management, security, and
management systems, as well as the computing and storage resources.

In cloud architecture, all elements come together to deliver a foundation for cloud
computing that allows users to access various services and resources as needed. The
front end communicates user interactions through middleware with the back end,
where the application's service model executes the requested action. As cloud strategies
become more sophisticated, the skills and knowledge of cloud architects become more
important in assisting businesses in navigating the intricacies of cloud environments,
implementing effective strategies, and keeping the cloud's infrastructure working
smoothly.

Use Cases and Applications of Cloud Computing

Testing and Development

The cloud's versatility allows environments to be easily established, tested, and


decommissioned. An entirely new environment may be spun up on the cloud in a few
minutes, eliminating the need to wait weeks or even months for deployment. Your
company will be more productive because of cloud accessibility, which may also shorten
the time it takes for new products to hit the market.

Analytics on Large Amounts of Data

Through big data analytics, businesses may acquire significant insights and optimize
business operations by harnessing the computational power of cloud computing.
Corporate endpoints, cloud apps, and the consumers that utilize them interact with one
another daily, generating enormous amounts of data. Through the use of cloud
computing, businesses may access enormous amounts of organized and unorganized
information that are readily available and use it to their advantage to generate profit.

Analytics Based on Big Data

When obtaining further information, Big Data is a radical movement creating damage in
the corporate world. Big Data Powerhouses like Facebook and Amazon gather data on
consumer preferences, buying patterns, and likes and dislikes to predict potential
purchases and expand their companies.

Email

Email, which belongs to the SaaS category, is a service that has existed for a while.
Typical clients are embedded in essential business operations and can be accessed
online. Email has applications in every company area, whether sales, advertising, or IT,
and cloud accessibility is essential.

Infrastructure Services

Infrastructure construction and upkeep include several steps. There are hardware,
electricity, and overhead costs for building and maintaining it. Companies choose to
house their data in service provider-run data centers rather than invest in capital
equipment to focus on operating costs.
Differences Between Grid Computing and Cloud Computing

CLOUD COMPUTING GRID COMPUTING

The client-server computer architecture is used in The cloud functions as a


cloud computing. centralized management
platform.

Cloud computing is based on collaborative Grid is a management system


computer architecture. that is decentralized.

Infrastructure companies own the cloud servers Grids are controlled and
used in cloud computing. operated by the organization in
Grid computing.

It's really easy to use cloud computing. It may be When compared to cloud
accessed via standard web protocols. computing, grid computing is
less accessible. Grid framework
can be used to access it.
It is very scalable in comparison to grid computing. In contrast, cloud computing
offers greater scalability than
grid computing.

WEEK 1 & 2

Key Characteristics and Challenges of Cloud Computing;


1. Characteristics
There are many characteristics of Cloud Computing here are few of them:
1. On-demand self-services: The Cloud computing services does not require any
human administrators, user themselves are able to provision, monitor and manage
computing resources as needed.
2. Broad network access: The Computing services are generally provided over
standard networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that are able
to scale out and in quickly and on a need basis. Whenever the user require
services it is provided to him and it is scale out as soon as its requirement gets
over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage,
applications, and services) present are shared across multiple applications and
occupant in an uncommitted manner. Multiple clients are provided service from a
same physical resource.
5. Measured service: The resource utilization is tracked for each application and
occupant, it will provide both the user and the resource provider with an account
of what has been used. This is done for various reasons like monitoring billing and
effective use of resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants (users or
organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to
abstract underlying hardware resources and present them as logical resources to
users.
8. Resilient computing: Cloud computing services are typically designed with
redundancy and fault tolerance in mind, which ensures high availability and
reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing models,
including pay-per-use, subscription-based, and spot pricing, allowing users to
choose the option that best suits their needs.
10. Security: Cloud providers invest heavily in security measures to protect their
users’ data and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated, allowing
users to deploy and manage resources with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on sustainable practices,
such as energy-efficient data centers and the use of renewable energy sources, to
reduce their environmental impact.

Challenges of Cloud Computing and Solutions

1. Data security and privacy

When working with Cloud environments, data security is a major concern as users have

to take responsibility for their data, and not all Cloud providers can assure 100% data
privacy.

No identity access management, lack of visibility and control tools, data misuse, and

cloud misconfiguration are the common reasons behind cloud privacy leaks. There are

also concerns about malicious insiders, insecure APIs, and neglect or oversights in cloud
data management.

Solution:

Install and implement the latest software updates, as well as configure network

hardware to prevent security vulnerabilities. Using antivirus and firewalls, increasing


bandwidth for Cloud data availability, and implementing cybersecurity solutions are
some ways to prevent data security risks.

your audit with on demand guidance.


2. Multi-cloud environments

Multi-cloud environments present issues and challenges such as – configuration errors,

data governance, lack of security patches, and no granularity. It is difficult to apply data

management policies across various boards while tracking the security requirements of
multi-clouds.

Solution:

Implementing a multi-cloud data management solution can help you manage multi-

cloud environments. We should be careful while choosing the solution, as not all tools

offer specific security functionalities, and multi-cloud environments continue to become


highly sophisticated and complex.

3. Performance challenges

The performance and security of cloud computing solutions depend on the vendors, and
keep in mind that if a Cloud vendor goes down, you may lose your data too.

Solution:
Cloud Service Providers should have real-time SaaS monitoring policies.

4. Interoperability and flexibility

When you try to shift applications between two or multiple Cloud ecosystems,
interoperability is a challenge. Some of the most common issues are:

• Match the target cloud environment’s specifications by rebuilding application

stacks
• Managing services and apps in the target cloud ecosystem

• Working with data encryption during migration


• Configuring networks in the target cloud for operations
Solution:

Before starting work on projects, setting Cloud interoperability as well as portability

standards can help organizations solve this problem. The use of multi-layer

authorization and authentication tools is a good choice for account verifications in


hybrid, public, and private cloud ecosystems.

5. High dependence on network

When transferring large volumes of information between Cloud data servers, a lack of

sufficient internet bandwidth is a common problem. There is a risk of sudden outages,

and data is highly vulnerable. To help prevent business losses from sudden outages,
enterprises should ensure there is high bandwidth without sacrificing performance.

Solution:

Focus on improving operational efficiency and pay more for higher bandwidth to
address network dependencies.

6. Lack of knowledge and expertise

Hiring the right Cloud talent is another common challenge in cloud computing. There is

a shortage of working security professionals with the necessary qualifications in the


industry. As the workloads are increasing, so are the number of tools launched in the

market. Enterprises need good expertise in order to efficiently utilize these tools and
look out for the best fit.

Solution:
Hire Cloud professionals having specializations in DevOps as well as automation.
7. Reliability and availability

High unavailability of Cloud services, as well as lack of reliability, are the major

concerns in these ecosystems. In order to keep up with ever-changing business


requirements, businesses are forced to seek additional computing resources.

If a Cloud vendor gets hacked, the sensitive data of organizations using their services
gets compromised.

Solution:

Improve both aspects by implementing the NIST Framework standards in Cloud


environments.

8. Password security

Account managers manage all their cloud accounts using the same passwords.

Password management poses a critical problem, and it is often found that users resort
to using weak and reused passwords.

Solution:

Secure all your accounts by using a strong password management solution. To further

improve security, in addition to a password manager, use Multifactor Authentication


(MFA). Cloud-based password managers should alert users of security risks and leaks.

9. Cost management

Although Cloud Service Providers (CSPs) offer a pay-as-you-go subscription model for

services, hidden costs are charged as underutilized resources in enterprises, making the
costs can add up.
Solution:

Implementing resource utilization monitoring tools as well as auditing systems regularly

are some ways organizations can fix this. It’s one of the most efficient methods to deal
with major challenges and manage budgets in cloud computing.

10. Lack of expertise

Cloud computing is a highly competitive field, and there are many professionals who

lack the required knowledge and skills to be employed in the industry. There is also a
huge gap in supply and demand for certified individuals and many job vacancies.

Solution:

Companies should help existing IT staff in upskilling their careers and skills by investing
in Cloud training programs.

11. Control or governance

Good IT governance makes sure that the right tools are used and assets get

implemented as per procedures and agreed-on policies. Lack of governance is a

common problem in cloud computing, and companies utilize tools that do not align with

their vision. IT teams don’t get total control of compliance, data quality checks, and risk
management, thus creating many uncertainties when migrating to the cloud from
traditional infrastructures.

Solution:
Traditional IT operations should be adopted to accommodate Cloud migrations.
12. Compliance

When it comes to having the best data compliance policies, cloud Service Providers

(CSP) are not up-to-date. Organizations run into compliance issues with state laws and
regulations whenever a user transfers data from internal servers to the cloud.

Solution

The General Data Protection Regulation Act is expected to address compliance issues in
the future for CSPs.

Top leading Cloud Computing companies


1. Amazon Web Services(AWS)
One of the most successful cloud-based businesses is Amazon Web Services(AWS),
which is an Infrastructure as a Service(Iaas) offering that pays rent for virtual
computers on Amazon’s infrastructure.
2. Microsoft Azure Cloud Platform
Microsoft is creating the Azure platform which enables the .NET Framework
Application to run over the internet as an alternative platform for Microsoft
developers. This is the classic Platform as a Service(PaaS).
3. Google Cloud Platform ( GCP )
• Google has built a worldwide network of data centers to service its search engine.
From this service, Google has captured the world’s advertising revenue. By using
that revenue, Google offers free software to users based on infrastructure. This is
called Software as a Service(SaaS).
WEEK 3

What Are Cloud Deployment Models?


The following are the Cloud Deployment Models:
1. Private Deployment Model
It provides an enhancement in protection and customization by cloud resource
utilization as per particular specified requirements. It is perfect for companies which
looking for security and compliance needs./ Services are dedicated to a single
organization, either hosted on-premises or by a third-party provider.
-Examples: VMware vSphere, OpenStack.
- Advantages: Greater control over security, compliance, and customization.
- Disadvantages: Higher costs and maintenance requirements.

2. Public Deployment Model


• It comes with offering a pay-as-you-go principle for scalability and accessibility of
cloud resources for numerous users. it ensures cost-effectiveness by providing
enterprise-needed services/ Services are offered over the public internet and shared
across multiple organizations.
• Examples: AWS, Google Cloud, Microsoft Azure.
• Advantage: Cost-effective, scalable, and no maintenance overhead for users.
• Disadvantage: Less control over security and compliance.

3. Hybrid Deployment Model


It comes up with a combination of elements of both private and public clouds providing
seamless data and application processing in between environments. It offers flexibility in
optimizing resources such as sensitive data in private clouds and important scalable
applications in the public cloud/Combines public and private clouds, allowing data and
applications to be shared between them.
- Examples: Using AWS for general workloads while keeping sensitive data on a
private cloud.
- Advantages: Flexibility, optimized resources, and enhanced security for sensitive
data.
- Disadvantages: Complexity in management and potential security challenges.
4. A community cloud Model
is a cloud infrastructure in which multiple organizations share resources and services based on
common requirements/ A cloud environment shared by several organizations with similar
interests or requirements, such as regulatory compliance.
- Examples: Government agencies sharing a cloud for specific applications.
- Advantages: Cost-effective for shared infrastructure and tailored to specific
community needs.
- Disadvantages: Less control than a private cloud and potential resource contention.

5. Multi-Cloud

The use of multiple cloud services from different providers in a single architecture.
- Examples: Utilizing AWS for compute, Google Cloud for analytics, and Azure for
storage.
- Advantages: Avoids vendor lock-in, enhances redundancy, and allows for optimized
services.
- Disadvantages: Increased complexity in integration and management.

Clients in cloud computing


What are clients??????
The term cloud client describes a piece of hardware, a piece of software or both, that is specifically
designed for a cloud service.

Traditionally they were grouped into 3:

1. Hardware clients-

a. Thick client-consists of many interfaces,(Internal mem, I/O devices). Is a full-featured


computer

b. Thin Client- has only the necessary components for one specific task, doesn’t have a hard
drive and therefore no s/w instead runs programs and accesses data from a server. E.g Onlive H/w

c. Smart phones-let you access cloud services from everywhere


2. Software clients

Are applications that make use of the network support but can also run offline.

3. Cloud clients

Security in cloud computing is a critical concern for organizations using cloud services. Key aspects
related to clients and security:

Clients in Cloud Computing

1. Individual Users:

- End-users who access cloud services for personal or small business use.

- Concern areas: Protecting personal data, account credentials, and privacy.

2. Small and Medium Enterprises (SMEs):

- Businesses leveraging cloud services for cost efficiency and scalability.

- Concern areas: Data protection, compliance with regulations, and managing access controls.

3. Large Enterprises:

- Organizations that utilize cloud services for various applications, including critical business
operations.

- Concern areas: Comprehensive security strategies, data governance, and risk management.

4. Government and Regulatory Bodies:

- Agencies that require stringent security measures due to sensitive data handling.

- Concern areas: Compliance with laws and regulations, data sovereignty, and incident response.
Security in Cloud Computing

1. Data Security:

- Encryption: Protecting data at rest and in transit through encryption techniques.

- Access Controls: Implementing strict access controls and identity management to ensure only
authorized users can access sensitive data.

2. Network Security:

- Firewalls: Using virtual firewalls and intrusion detection systems to monitor and protect cloud
environments.

- Secure Connections: Utilizing secure protocols (like HTTPS, VPNs) for data transmission.

3. Compliance and Governance:

- Regulatory Compliance: Adhering to industry standards and regulations such as GDPR, HIPAA, and PCI
DSS.

- Audit Trails: Maintaining logs and audit trails for tracking access and changes to data.

4. Incident Response and Management:

- Incident Response Plan: Establishing a clear plan for responding to security breaches or incidents.

- Monitoring and Alerts: Continuous monitoring for suspicious activity and implementing alert systems.

5. Shared Responsibility Model:

- Understanding Roles: Cloud providers and clients share responsibility for security, where the provider
secures the cloud infrastructure while clients secure their applications and data.

- Best Practices: Clients must understand their responsibilities, including data encryption and user
management.

6. Security Tools and Solutions:

- Security Information and Event Management (SIEM): Solutions for real-time analysis of security alerts
generated by applications and network hardware.
- Identity and Access Management (IAM): Tools for managing user identities and permissions.

Types/popular of IAM

1. AWS Identity and Access Management (IAM)

- Fine-grained access control for AWS resources.

- Multi-factor authentication (MFA).

- Roles and policies for managing permissions.

- Integration with other AWS services.

2. Azure Active Directory (Azure AD)

- Single sign-on (SSO) for cloud applications.

- Conditional access policies.

- Identity protection and monitoring.

- Integration with Microsoft 365 and third-party applications.

3. Okta

- Universal directory for user profiles.

- SSO and adaptive MFA.

- Lifecycle management for user accounts.

- Integration with thousands of applications.

4. Google Cloud Identity

- Centralized identity management for Google services and third-party apps.

- SSO and MFA capabilities.

- User provisioning and de-provisioning.

- Security and compliance monitoring.


Conclusion

IAM tools play a crucial role in ensuring secure access to resources while enabling organizations to
maintain compliance with regulations. Choosing the right IAM solution depends on factors such as the
organization’s size, security needs, and existing infrastructure.

Data Leakage in cloud computing

Will talk about Cause, consequences, preventions

Data leakage in cloud computing refers to the unauthorized transmission of data from within an
organization to an external destination or recipient. This can occur unintentionally or due to malicious
intent. Here are the key aspects of data leakage in the cloud:

Causes of Data Leakage

1. Misconfigured Cloud Services:

- Improperly set access controls or permissions can expose sensitive data to unauthorized users.

2. Insider Threats:

- Employees with access to sensitive information may intentionally or unintentionally leak data.

3. Third-Party Applications:

- Integrating third-party applications without proper vetting can lead to data exposure.

4. Insecure APIs:

- Vulnerabilities in APIs used to access cloud services can be exploited to extract data.

5. Data In Transit:

- Unencrypted data transmitted over networks can be intercepted by malicious actors.


Consequences of Data Leakage

1. Reputation Damage:

- Organizations may suffer a loss of trust and credibility among customers and stakeholders.

2. Financial Loss:

- Data breaches can lead to significant financial penalties, legal fees, and remediation costs.

3. Regulatory Penalties:

- Non-compliance with data protection regulations (e.g., GDPR, HIPAA) can result in hefty fines.

4. Intellectual Property Theft:

- Leakage of proprietary information can lead to competitive disadvantages.

Prevention Strategies

1. Data Encryption:

- Encrypt data both at rest and in transit to protect it from unauthorized access.

2. Access Controls:

- Implement strict access controls and user authentication to limit who can access sensitive data.

3. Regular Audits and Monitoring:

- Conduct regular security audits and monitor for unusual access patterns or behavior.

4. Security Training:

- Educate employees about data security best practices and the importance of protecting sensitive
information.
5. Use of Data Loss Prevention (DLP) Tools:

- Deploy DLP solutions to monitor and control data transfer activities, preventing unauthorized data
sharing.

6. Configuration Management:

- Regularly review and correct cloud service configurations to ensure they align with security best
practices.

7. Incident Response Plan:

- Develop and maintain an incident response plan to quickly address any data leakage incidents.

Conclusion

Data leakage in cloud computing poses significant risks, but with appropriate security measures,
organizations can effectively mitigate these risks. A combination of technology, policies, and employee
training is essential for safeguarding sensitive data in the cloud.

You might also like