Cloud Security
Cloud Security
Cloud Security
Reference Guide
Version -1.0
Year - 2024
BY
Faiz Kazi
1
CLOUD SECURITY REFERENCE GUIDE
Table of Contents
Cloud Security Preface........................................................................................................... 3
Introduction to Cloud Security ............................................................................................... 4
How Cloud Security Works? ............................................................................................... 5
Cloud Security Assessment .................................................................................................... 6
Cloud Native Security Features .............................................................................................. 8
Multi cloud Security Features Comparision ...................................................................... 10
Various CSP Security Checklists............................................................................................ 13
AWS Checklists ................................................................................................................ 13
Microsoft Azure Checklists ............................................................................................... 16
Google Cloud (GCP) Checklists ......................................................................................... 19
2
CLOUD SECURITY REFERENCE GUIDE
Cloud security is complex due to the shared responsibility model between the cloud service provider
(CSP) and the user. While CSPs ensure the security of the cloud infrastructure, customers are
responsible for securing their data, applications, and access. Key areas of focus include encryption,
identity and access management (IAM), threat detection, compliance, and disaster recovery.
With cloud environments constantly evolving, cloud security demands proactive measures,
continuous monitoring, and adherence to regulatory frameworks to ensure robust protection.
key references on cloud security with comparision with Top CSPs ( AWS, Azure & GCP) are highlighted
in this Guide.
3
CLOUD SECURITY REFERENCE GUIDE
By implementing cloud security measures, organizations can safeguard their sensitive data, ensure
compliance, and maintain trust in the digital services they offer.
Protection from Evolving Threats: Cloud environments store sensitive data, making them
prime targets for cyberattacks. Robust cloud security safeguards this information from
unauthorized access by hackers who employ ever-more sophisticated techniques. Measures
like encryption, access controls, and intrusion detection systems form the first line of defense.
Business Continuity and Disaster Recovery: Cloud security often involves data backups and
disaster recovery plans. This ensures business continuity in the event of outages caused by
unforeseen circumstances. This can range from natural disasters to power failures, minimizing
downtime and potential financial losses.
Compliance with Regulations: Many industries have strict regulations regarding data privacy
and security. Cloud security helps organizations meet these compliance requirements by
ensuring data is stored and accessed securely. This is especially important for businesses
dealing with sensitive data like financial information or healthcare records.
Reduced Costs: Cloud security can potentially reduce costs in the long run. Cloud providers
typically handle the underlying infrastructure security, potentially eliminating the need for
significant investments in in-house security hardware and expertise. Additionally, features like
automated threat detection and remediation can streamline security processes and reduce
manpower requirements.
4
CLOUD SECURITY REFERENCE GUIDE
1. Data Protection: Ensures that data stored in the cloud is protected against unauthorized
access, breaches, and leaks. This includes encryption (both in transit and at rest), access
control mechanisms, and secure data backups.
2. Identity and Access Management (IAM): Controls who can access cloud resources and under
what conditions. IAM involves managing users, roles, and policies to ensure the principle of
least privilege—only granting the minimum permissions necessary for users to perform their
tasks.
3. Compliance: Many industries have regulatory requirements regarding data protection and
privacy. Cloud security involves ensuring that cloud services comply with relevant laws and
standards (e.g., GDPR, HIPAA, SOC 2).
4. Threat Detection and Response: Cloud environments need continuous monitoring for
potential security threats. Cloud providers often offer tools for detecting anomalous behavior,
identifying vulnerabilities, and responding to security incidents in real-time.
5. Network Security: Includes strategies like firewalls, virtual private networks (VPNs), and micro-
segmentation to protect the cloud environment from external attacks.
6. Shared Responsibility Model: Cloud security operates under a shared responsibility model,
where the cloud provider (e.g., AWS, Azure, Google Cloud) is responsible for securing the
infrastructure, while the customer is responsible for securing their data, applications, and
configurations.
5
CLOUD SECURITY REFERENCE GUIDE
The Below Figure Demonstrates the Basic view of an Cloud Security Architecture for Various CSPs.
6
CLOUD SECURITY REFERENCE GUIDE
Following are basic questionnaires assessed by the security team while conducting under Cloud
Security Assessment.
2 Directory Service How often do you update security protocols for this directory in a way
that leverages the latest technologies and practices?
Are security specialists who manage this directory adequately vetted?
7
CLOUD SECURITY REFERENCE GUIDE
8
CLOUD SECURITY REFERENCE GUIDE
9
CLOUD SECURITY REFERENCE GUIDE
Comparision Table Outlining the Key Security Features of AWS, Microsoft Azure and GCP
Sr.no. Category AWS Azure GCP
Aws IAM:
centralized Azure active
Identity , MFA directory
and granular (AAD):
Identity & Access role based centralized Google cloud IAM:
1
Management (IAM) access control, Identity, MFA, Centralized Identity,
integration conditional MFA, fined grained
with aws sso access, role- access control, and
and aws based access integration with
organizations control google workspace
Aws Key Azure Key Google cloud KMS:
management Vault: Customer managed
Service (KMS): Customer keys and encryption
Customer managed keys for data at rest and in
managed keys ( and encryption transit with AES-256
CMKs) and for data at rest supported
2 Data Encryption
Server-side and in transit.
encryption for TTLS and AES-
data at rest 256 supported
and in transit.
TTLS and AES-
256 supported
AWS security VPC firewall II Rules,
Grous & Azure Network Cloud Armor for
NACLs: stateful Security DDoS protection,
and stateless Groups (NSGs), Google cloud Shield,
firewall, VPC Azure DDoS Private Google Access
3 Network Security peering, AWS protection,
WAF for web Azure Firewall,
applications Vnet Peering,
and AWS shield Azure web
for DDoS application
protection firewall ( WAF)
AWS Cloud Azure Monitor Google Cloud
Trail (for API or Azure Logging, Google cloud
calls), AWS Security Monitoring, Google
cloud watch Center, Azure cloud security
4 Monitoring & logging (for logs and Sentinel and command center
metrics), AWS Azure Activity (SCC), cloud Audit
config Log for Logs
(resource monitoring and
Compliance) auditing
10
CLOUD SECURITY REFERENCE GUIDE
11
CLOUD SECURITY REFERENCE GUIDE
12
CLOUD SECURITY REFERENCE GUIDE
AWS Checklists
13
CLOUD SECURITY REFERENCE GUIDE
14
CLOUD SECURITY REFERENCE GUIDE
15
CLOUD SECURITY REFERENCE GUIDE
16
CLOUD SECURITY REFERENCE GUIDE
17
CLOUD SECURITY REFERENCE GUIDE
18
CLOUD SECURITY REFERENCE GUIDE
19
CLOUD SECURITY REFERENCE GUIDE
20
CLOUD SECURITY REFERENCE GUIDE
21
CLOUD SECURITY REFERENCE GUIDE
***************************************************************************
22