0% found this document useful (0 votes)
6 views35 pages

unit 4 & 5 easy notes

The document provides an overview of three major cloud platforms: Google App Engine (GAE), Amazon Web Services (AWS), and Microsoft Azure. GAE is a serverless PaaS for scalable applications, AWS offers a comprehensive suite of cloud services including compute and storage, while Azure provides a wide range of cloud services with a focus on integration and development. Each platform has unique features, use cases, and pricing models, catering to various business needs.

Uploaded by

Mrithul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views35 pages

unit 4 & 5 easy notes

The document provides an overview of three major cloud platforms: Google App Engine (GAE), Amazon Web Services (AWS), and Microsoft Azure. GAE is a serverless PaaS for scalable applications, AWS offers a comprehensive suite of cloud services including compute and storage, while Azure provides a wide range of cloud services with a focus on integration and development. Each platform has unique features, use cases, and pricing models, catering to various business needs.

Uploaded by

Mrithul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

1)Google App Engine (GAE)

Google App Engine (GAE) is a Platform-as-a-Service (PaaS) that enables web


developers and enterprises to build, deploy, and host scalable applications in
Google’s fully managed cloud environment. It is a serverless application
development platform that handles infrastructure provisioning and
management.

Key Features of Google App Engine


1. Fully Managed Infrastructure

●​ Google manages all infrastructure needs, allowing developers to focus on writing code.​

2. Support for Multiple Programming Languages

●​ Supports languages like Python, Java, Node.js, Go, Ruby, PHP, and .NET.​

●​ Allows developers to run custom containers with their preferred language.​

3. Application Diagnostics

●​ Monitors app health and performance.​

●​ Provides debugging and issue-resolution tools.​

4. Security Features

●​ GAE Firewall for defining access policies.​

●​ Free SSL/TLS certificates for secure communication.​

5. Traffic Splitting

●​ Routes requests to different versions of an application.​


●​ Enables A/B testing and feature rollout.​

6. Versioning

●​ Supports multiple versions of an app in different environments.​

7. Custom Runtimes

●​ The flexible environment supports custom runtimes using Docker images.​

8. API Selection

●​ Blobstore: Manages large data objects.​

●​ GAE Cloud Storage: Reads and writes files during app runtime.​

●​ Page Speed Service: Optimizes webpage load times.​

●​ URL Fetch Service: Handles HTTP requests efficiently.​

●​ Memcache: Caches data in-memory for faster database operations.​

Google App Engine Apps


A GAE app consists of:

●​ Services: Configured to use different runtimes and performance levels.​

●​ Versions: Different versions of a service can run simultaneously.​

●​ Instances: Handle varying traffic loads.​

Capabilities

●​ Deploy multiple versions of an app in Google Cloud.​


●​ Perform A/B testing by splitting traffic between versions.​

●​ Debug applications in any stage, including production.​

Environments Available in Google App Engine


GAE provides two app development environments:

1. Standard Environment

●​ Runs in a sandbox with pre-configured runtimes.​

●​ Scales rapidly in response to traffic spikes.​

●​ Suitable for apps that run for free or at low cost.​

●​ Offers seconds-level startup and deployment times.​

●​ Supports automatic in-place security patches.​

●​ Provides access to Google Cloud APIs (Cloud Storage, Cloud SQL, etc.).​

2. Flexible Environment

●​ Supports apps with consistent or fluctuating traffic.​

●​ Runs custom runtimes using Docker containers.​

●​ Can access Google Cloud project resources within Google Compute Engine.​

●​ Offers minutes-level startup and deployment times.​

●​ Supports manual and automatic scaling.​

●​ Includes SSH debugging and security patching.​


Use Cases of GAE Flexible Environment
●​ Apps with consistent traffic.​

●​ Apps experiencing traffic fluctuations.​

●​ Apps using custom runtimes or frameworks with native code.​

●​ Apps needing access to Google Compute Engine resources.​

Google App Engine is a powerful platform for building and deploying scalable applications
with minimal infrastructure management. Whether using the Standard or Flexible
Environment, developers can optimize their apps for performance, security, and cost efficiency.

Amazon Web Services (AWS)

The Amazon Web Services (AWS) platform provides more than 200 fully featured services
from data centers located all over the world. It is the world's most comprehensive cloud
platform offering scalable and cost-effective cloud computing solutions. AWS is widely
adopted for on-demand operations such as compute power, database storage, content
delivery, and more to help organizations scale and grow.

AWS works in multiple configurations based on user requirements. Users can view the type of
configuration used and the corresponding server map for AWS services.

2)AWS Key Services


Amazon offers multiple services in the AWS ecosystem. Some key services include:

●​ Compute Service​

●​ Storage​

●​ Database​
●​ Networking & Content Delivery​

●​ Security Tools​

●​ Developer Tools​

●​ Management Tools​

Compute Service
These services help developers build, deploy, and scale applications in the cloud.

AWS EC2

●​ A web service that allows developers to rent virtual machines.​

●​ Automatically scales compute capacity when needed.​

●​ Offers various instance types for CPU, memory, storage, and networking
configurations.​

AWS Lambda

●​ A serverless compute service that executes code without managing servers.​

●​ Helps in running applications efficiently without infrastructure concerns.​

Storage Services
AWS offers cloud-based storage solutions with high durability and disaster recovery
capabilities.

Amazon S3

●​ An open cloud-based storage service used for online data backup.​


●​ Designed for web-scale computing with high accessibility.​

Amazon EBS

●​ Provides high availability storage volumes for persistent data.​

●​ Used primarily by Amazon EC2 instances for file, database, and block-level storage.​

Database Services
AWS offers cost-efficient, secure, and scalable database solutions.

DynamoDB

●​ A NoSQL database service offering fast and reliable performance.​

●​ Multi-region, durable, with built-in security, backup, and restore features.​

RDS (Relational Database Service)

●​ A managed relational database service to simplify database setup, operation, and


scaling.​

Networking & Content Delivery


AWS offers a secure cloud platform with high-speed networking capabilities.

Amazon VPC

●​ Helps deploy AWS resources in a private virtual cloud.​


●​ Provides full control over IP addresses, subnets, route tables, and network
gateways.​

Amazon Route 53

●​ A highly available DNS service that translates domain names into IP addresses.​

●​ Provides a cost-effective method of routing users to AWS applications.​

Developer Tools
These tools help developers build, deploy, and manage applications seamlessly.

AWS CodeStar

●​ Manages application development in one place, allowing rapid development and


deployment.​

AWS CodeBuild

●​ Automates compiling, testing, and deploying code with continuous scaling.​

Security, Identity & Compliance


AWS offers multiple security tools to ensure safe access and data encryption.

AWS IAM (Identity and Access Management)

●​ Manages secure access to AWS services.​


●​ Provides shared access and secure authentication for AWS resources.​

AWS KMS (Key Management Service)

●​ Enables users to create and manage encryption keys for data protection.​

Management Tools
AWS provides tools for cost optimization, risk management, and automation.

Amazon CloudWatch

●​ A monitoring tool for AWS resources and applications.​

●​ Collects logs and operational data in a single interface.​

AWS CloudFormation

●​ Allows developers to manage cloud infrastructure using text files or templates.​

AWS Pricing Model


AWS follows a pay-as-you-go model, meaning users only pay for what they use.

●​ No long-term commitments.​

●​ AWS Free Tier offers free services across 58 AWS products to help users explore the
platform.​

Applications of AWS
AWS is widely used for various applications, including:
1. Storage & Backup

●​ Businesses use AWS for file storage, indexing, and critical business applications.​

2. Website Hosting

●​ Organizations host their websites and applications on AWS.​

3. Gaming

●​ AWS provides the necessary compute power for seamless gaming experiences.​

4. Mobile, Web & Social Applications

●​ AWS helps companies build and scale mobile, e-commerce, and SaaS applications.​

5. Big Data & Analytics

●​ Amazon EMR: Processes large datasets with Hadoop.​

●​ Amazon Kinesis: Analyzes real-time streaming data.​

●​ AWS Glue: ETL (Extract, Transform, Load) jobs.​

●​ Amazon Athena: Query engine for analyzing large datasets.​

●​ Amazon QuickSight: Data visualization tool.​

6. Artificial Intelligence (AI)

●​ Amazon Lex: Chatbots with voice and text capabilities.​

●​ Amazon Polly: Converts text to speech (e.g., Alexa).​

●​ Amazon Rekognition: Image and facial recognition.​

7. Messaging & Notifications


●​ Amazon SNS: Business communication service.​

●​ Amazon SES: Email sending service for marketing and IT professionals.​

●​ Amazon SQS: Message queuing for businesses.​

8. Augmented Reality (AR) & Virtual Reality (VR)

●​ Amazon Sumerian: AR & VR application development platform.​

9. Game Development

●​ AWS provides backend services, analytics, and hosting for game development.​

10. Internet of Things (IoT)

●​ AWS IoT: Manages IoT devices and data storage.​

●​ AWS IoT Button: Limited IoT functionality for hardware.​

●​ AWS Greengrass: On-device computing for IoT.​

Advantages of AWS
1.​ User-friendly programming model and architecture.​

2.​ Cost-effective, no long-term commitments.​

3.​ Centralized billing and hybrid computing.​

4.​ No need to maintain physical data servers.​

5.​ Lower total cost of ownership compared to private cloud services.​


Disadvantages of AWS
1.​ Paid support packages for immediate assistance.​

2.​ Cloud computing issues such as downtime and limited control.​

3.​ Resource limitations on certain AWS services.​

4.​ Performance issues with sudden hardware changes.​

Companies Using AWS


Over 1,000,000 active AWS users, including:

●​ Netflix​

●​ Intuit​

●​ Coinbase​

●​ Finra​

●​ Johnson & Johnson​

●​ Capital One​

●​ Adobe​

●​ Airbnb​

●​ AOL​

●​ Hitachi​

With this, we conclude the comprehensive overview of Amazon Web Services (AWS).
Here is a neatly formatted and easy-to-study version of the key points about Microsoft Azure:

3)Microsoft Azure Overview

Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing
platform. It provides a broad range of cloud services, including compute, analytics, storage and
networking. Users can pick and choose from these services to develop and scale new
applications or run existing applications in the public cloud.

●​ Formerly known as Windows Azure, it is Microsoft’s public cloud computing


platform.​

●​ Offers compute, analytics, storage, and networking services.​

●​ Provides IaaS, PaaS, SaaS, and Serverless computing models.​

●​ Compatible with open-source technologies.​

●​ Pay-as-you-go (PAYG) pricing model—users pay only for what they use.​

How Microsoft Azure Works

●​ Users subscribe to Azure and get access to its services via the Azure portal.​

●​ Can create and manage virtual machines (VMs), databases, and cloud-based
resources.​

●​ Services can be integrated to build custom cloud solutions.​

Microsoft Azure Uses


1.​ Application Development – Create web applications.​

2.​ Testing – Test applications after development.​

3.​ Application Hosting – Host applications after testing.​

4.​ Virtual Machines (VMs) – Deploy and configure VMs.​

5.​ Integration & Sync – Sync virtual devices and directories.​

6.​ Metric Collection & Storage – Collect and store performance metrics.​

7.​ Virtual Hard Drives – Provides large data storage for VMs.​

Azure Products & Services (Categories)

1. Compute

●​ Deploy & manage VMs, containers, batch jobs.​

●​ Supports public or private IP addresses.​

2. Mobile

●​ Build cloud applications for mobile devices.​

●​ Provides notifications, back-end support, API tools, geospatial integration.​

3. Web

●​ Develop & deploy web applications.​

●​ Features include search, content delivery, API management, notifications,


reporting.​

4. Storage

●​ Scalable storage for structured & unstructured data.​


●​ Supports big data, persistent, and archival storage.​

5. Analytics

●​ Provides real-time analytics, big data, data lakes, ML, BI, IoT streams, data
warehousing.​

6. Networking

●​ Virtual networks, dedicated connections, gateways.​

●​ Traffic management, load balancing, DNS hosting, DDoS protection.​

7. Media & CDN

●​ On-demand streaming, digital rights protection, encoding, indexing.​

8. Integration

●​ Server backup, site recovery, private & public cloud connectivity.​

9. Identity

●​ Ensures authorized access to Azure services.​

●​ Supports Azure Active Directory & Multi-Factor Authentication (MFA).​

10. IoT

●​ Capture, monitor, and analyze IoT data.​

●​ Supports notifications, analytics, monitoring, execution.​

11. DevOps

●​ Project collaboration, Azure DevOps tools.​

●​ Supports application diagnostics, test labs, DevOps integration.


●​ This group provides project and collaboration tools, such as Azure DevOps -- formerly
Visual
●​ Studio Team Services -- that facilitate DevOps software development processes. It also
offers features for
●​ application diagnostics, DevOps tool integrations and test labs for build tests and
experimentation.​

12. Development

●​ Helps developers share code, test applications, track issues.​

●​ Supports JavaScript, Python, .NET, Node.js.​

13. Security

●​ Threat identification & response.​

●​ Manages encryption keys & sensitive assets.​

14. AI & Machine Learning

●​ AI, ML, cognitive computing services.​

●​ Helps integrate AI capabilities into applications.​

15. Containers

●​ Deploy, register, manage containers.​

●​ Supports Docker, Kubernetes.​

16. Databases

●​ Database as a Service (DBaaS) for SQL, NoSQL.​

●​ Azure Cosmos DB, PostgreSQL, SQL Data Warehouse.


●​ Azure SQL is the platform's flagship database service. It is a relational database that
provides SQL functionality without the need for deploying a SQL server. ​

17. Migration

●​ Workload migration tools from local data centers to Azure.​

18. Management & Governance

●​ Backup, recovery, compliance, automation, scheduling, monitoring.​

19. Mixed Reality

●​ Develop content for Windows Mixed Reality.​

20. Blockchain

●​ Azure Blockchain Service for joining or creating blockchain networks.​

21. Intune

●​ Enroll devices, push security policies, track app usage.​

●​ Remote wipe for secure data removal.​

😊
This structured format makes it easy to study and remember. Let me know if you need further
simplifications!

Absolutely! Here's a simple explanation for those two topics, great for beginners:
✅ 11. DevOps (Development + Operations)
What it means:​
DevOps is a set of practices that combines software development and IT operations. It helps
teams work together to build, test, and deliver apps faster.

In Azure:

●​ Project collaboration: Teams can work together on code.​

●​ Azure DevOps tools: A set of tools to plan, build, test, and release software.​

●​ Application diagnostics: Helps find and fix problems in apps.​

●​ Test labs: A space to test apps before launching.​

●​ Tool integration: Easily connect with other popular tools (like GitHub, Jenkins, etc.).​

✅ 12. Development
What it means:​
These services help software developers write and manage code easily on Azure.

In Azure:

●​ Developers can share their code, test it, and track issues/bugs.​

●​ Supports many popular programming languages like:​

○​ JavaScript (used in websites)​

○​ Python (easy & versatile)​

○​ .NET (Microsoft’s language for Windows apps)​

○​ Node.js (used for fast, scalable web apps)​


Let me know if you'd like beginner-friendly notes for other topics too!

Here’s a beginner-friendly explanation of Intune in simple terms:

✅ 21. Intune
What it means:​
Microsoft Intune is a cloud service that helps manage mobile devices and apps in a safe
and organized way.

In Azure:

●​ Enroll devices: Register laptops, phones, tablets so the company can manage them.​

●​ Push security policies: Send rules (like password requirements or app restrictions) to
all devices.​

●​ Track app usage: See which apps are being used on devices.​

●​ Remote wipe: If a device is lost or stolen, Intune can erase only company data (not
personal files), keeping everything secure.​

Let me know if you want a full beginner summary of all 21 points too!

Unit 5
Thanks for the heads-up! Here's the correct and complete revision notes for IAM Functions,
followed by the rest of the sections you asked for. These are compact, clear, and include all key
points, as you requested.

IAM-Identity and access management architecture

1)✅ IAM Functions: Basic Concepts and Definitions


1. Authentication

●​ Verifies the identity of a user or system.​


●​ In service-to-service use cases, it involves verifying a network service.​

●​ More robust than simple identification.​

2. Authorization

●​ Determines what operations a verified user/system can perform.​

●​ Happens after authentication.​

●​ Grants permissions according to roles or policies.​

3. Auditing

●​ Reviews authentication and authorization records.​

●​ Checks compliance with policies.​

●​ Detects breaches and recommends countermeasures.​

✅ IAM Architecture and Practices


●​ IAM = combination of technology, processes, and standards, not a
MONOLITHIC(single) tool.​

●​ Core Component: Directory service (e.g., LDAP, Active Directory).​

●​ Supports components like authentication, user management, provisioning,


federation.​

Major IAM Process Areas:

1.​ User Management​

○​ Manages identity lifecycle (creation to deletion).​

2.​ Authentication Management​


○​ Verifies identity claims reliably.​

3.​ Authorization Management​

○​ Grants rights to access resources based on policies.​

4.​ Access Management​

○​ Enforces access policies during access requests.​

5.​ Data Management and Provisioning​

○​ Propagates user data/attributes to systems.​

6.​ Monitoring and Auditing​

○​ Tracks and audits access to verify compliance.​

Operational Activities:You're right! Let's revise and improve the IAM Operational
Activities section properly. Here's a clear, complete, and well-structured summary
covering all key points from the original content:

✅ IAM Operational Activities (Well-Structured and Complete)


These activities support the implementation of IAM processes effectively within an
organization.

1. Provisioning

●​ Definition: The process of creating and assigning user accounts and access rights
to systems, applications, and databases.​

●​ Purpose: Grants access based on a unique user identity.​

●​ Departments Involved: Often a combination of Human Resources and IT.​

●​ Deprovisioning:​
○​ The reverse process: removes or disables access when a user leaves or
changes roles.​

○​ Critical for preventing unauthorized access and security risks.​

2. Credential and Attribute Management

●​ Credentials: Include passwords, OTPs, certificates, biometrics, etc.​

●​ Attributes: User details like name, role, department, etc.​

●​ Key Processes:​

○​ Creating, issuing, managing, and revoking credentials and attributes.​

○​ Use of strong credentials (e.g., OTPs, hashed passwords).​

○​ Enforcing password standards (e.g., password strength, expiration).​

○​ Encryption of credentials at rest and during transmission.​

○​ Protecting user attributes for privacy and regulatory compliance.​

●​ Goal: Prevent identity impersonation and ensure secure access.​

3. Entitlement Management

●​ Entitlements: Also known as authorization policies or privileges.​

●​ Objective: Ensure users have only the necessary access rights (principle of least
privilege).​

●​ Processes:​

○​ Assigning/revoking access to resources like systems, apps, databases.​

○​ Ensuring access aligns with user roles and job responsibilities.​


○​ Avoiding privilege creep (users retaining unnecessary access).​

4. Compliance Management

●​ Purpose: Tracks and verifies that access control policies are followed.​

●​ Key Practices:​

○​ Monitoring user access activities.​

○​ Supporting audits and internal policy checks.​

○​ Ensuring adherence to regulatory standards (e.g., GDPR, HIPAA).​

○​ Implementing Segregation of Duties (SoD).​

○​ Conducting periodic user access reviews (e.g., user certification process).​

●​ Example: Application owners regularly verify that only authorized users have
access to sensitive data.​

5. Identity Federation Management

●​ Definition: Managing identity across multiple organizational boundaries.​

●​ Purpose: Enables collaboration by sharing identity information between trusted


organizations.​

●​ Example: Allowing users to log in to cloud services using their enterprise


credentials.​

●​ Approaches:​

○​ Create trust relationships (circles of trust).​

○​ Use of Federation protocols like SAML, OAuth, OpenID Connect.​


Here is a clear and complete revision note for the topic:

✅ Centralization of Authentication (authN) and Authorization (authZ)


🔐 Definition:
Centralization of authN (authentication) and authZ (authorization) refers to using a unified
infrastructure or system that handles all authentication and authorization tasks across
applications and services, rather than implementing them individually in each application.

🎯 Key Benefits:
●​ ✅ Simplifies Development:​

○​ App developers do not need to build custom login or access control logic.​

○​ Reduces coding errors and increases consistency.​

●​ ✅ Loose Coupling Architecture:​


○​ Applications become agnostic (independent) of specific auth methods or
policies.​

○​ Increases modularity and flexibility in system design.​

●​ ✅ Improved Security:​
○​ Centralized enforcement of security policies, password rules, and identity
verification.​

○​ Easier to apply multi-factor authentication and role-based access controls.​

●​ ✅ Efficiency and Scalability:​


○​ Central system handles all authN/authZ requests, improving efficiency.​
○​ Easier to scale and update policies across the organization.​

🛠️ Also Known As:


●​ Externalization of authN and authZ​

○​ Means moving these functions outside the application logic and managing
them in a central IAM or identity service.​

🏢 Examples in Practice:
●​ Using Active Directory, OAuth2.0, or Identity Providers (IdPs) like Okta, Azure AD,
or Keycloak to manage logins and permissions for multiple apps.​

Let me know if you’d like a diagram or comparison with decentralized auth systems!

●​

✅ IAM Standards and Specifications


Challenge Standard

Avoid duplicate identities, enable SSO SAML (Security Assertion Markup Language)

Automate provisioning and deprovisioning SPML (Service Provisioning Markup Language)

✅ IAM Practices in the Cloud


Cloud IAM Challenges:
●​ Traditional IAM ≠ Cloud IAM. Traditional IAM is built for internal enterprise systems,
while Cloud IAM is built for the dynamic, distributed, and scalable nature of cloud
environments. They solve the same problems but in very different ways.​

●​ Cloud Service Providers (CSPs) vary in IAM maturity.​

●​ Google, Microsoft, Salesforce offer basic IAM but may lack enterprise-level controls.​

Four Key Cloud IAM Functions:

1.​ User Management – New Users​

2.​ User Management – Modifications​

3.​ Authentication Management​

4.​ Authorization Management​

IAM Adjustments for Cloud:

1.​ Cloud Identity Administration​

○​ Identity lifecycle (provision, deprovision)​

○​ Federation, SSO​

○​ Credential and profile management​

2.​ Authorization Management​

○​ Control over access to cloud resources.​

3.​ Compliance Management​

○​ Ensures secure access and tracks rights and policies.​

✅ Federated Identity and SSO in Cloud


Two Architecture Options:
1.​ Enterprise Identity Provider (IdP)​

○​ Hosted inside the organization.​

○​ Organization manages user identities and policies.​

○​ Cloud apps delegate auth to internal IdP.​

○​ Greater control and security.​

2.​ Cloud-based Identity Provider​

○​ External service handles authentication.​

○​ Synced with internal directories.​

○​ Acts as a proxy IdP.​

Circle of Trust:

●​ Group of trusted domains allowed to use the IdP for authentication.​

Let me know if you want this in a downloadable PDF or PowerPoint too!

2)Data Security and Storage

## **Data Security and Storage – Revision Content**

### **Cloud Data Security Overview**

Cloud data security involves a set of technologies, policies, services,


and controls that aim to protect data in the cloud from:

- Loss

- Leakage

- Misuse
- Breaches and unauthorized access

A strong cloud data security strategy must ensure:

- **Security and privacy** across networks, applications, containers,


workloads, and all cloud environments

- **Access control** for users, devices, and software

- **Complete visibility** of all data on the network

---

### **Types of Data Protection**

A proper cloud data strategy must address all three types of data:

1. **Data in Use**

- Data actively being used by applications or endpoints

- Secured using user authentication and access control

2. **Data in Motion**

- Data being transmitted across networks

- Protected through encryption and messaging/email security


3. **Data at Rest**

- Stored data on cloud or network locations

- Secured by access restrictions and authentication mechanisms

You're right — let's enhance those two sections with more clarity,
completeness, and bullet-wise points for better revision. Here’s a
refined and complete version of:

Data Security Mitigation Strategies


Cloud computing introduces new risks, and mitigating those risks
requires layered strategies. Here are key strategies for protecting
your data in the cloud:

🔒 1. Avoid Putting Sensitive Data in Public Cloud


●​ Do not store sensitive or regulated data in public cloud
environments unless absolutely necessary.​

●​ Regulatory compliance (GDPR, HIPAA, etc.) often restricts how


data can be stored and processed.​

🛡️ 2. Encrypt Data at All Times


●​ Data at rest and data in motion must be encrypted using
strong, modern encryption standards (e.g., AES-256, TLS 1.3).​
●​ Encryption protects data from unauthorized access during
transfer and storage.​

🔑 3. Use Strong Key Management Practices


●​ Secure cryptographic keys using a dedicated Key
Management System (KMS).​

●​ Keys should never be stored in plaintext or with the data they


encrypt.​

👥 4. Implement Access Controls


●​ Enforce least privilege access — give users the minimum
permissions they need.​

●​ Use Multi-Factor Authentication (MFA) and role-based


access controls (RBAC).​

👁️ 5. Monitor Data Usage and Movement


●​ Use Data Loss Prevention (DLP) tools to detect and stop
unauthorized sharing.​

●​ Monitor logs to track data lineage and data access patterns.​

🔄 6. Consider Data Lineage and Remanence


●​ Understand the origin, movement, and transformation of your
data (data lineage).​
●​ Ensure that deleted data is fully wiped and not recoverable
(data remanence).​

🧠 7. Plan for Future: “Regulatory Clouds”


●​ Use regulatory-specific cloud services that offer higher
compliance guarantees (e.g., AWS GovCloud, Microsoft Azure
Government).​

●​ These clouds may offer stronger controls tailored to legal or


sensitive data requirements.​

Provider Data and Its Security


Cloud Service Providers (CSPs) collect and generate their own
metadata and logs while managing your services. Understanding
what they store and how they protect it is essential.

🔍 1. What Kind of Data Do Providers Collect?


➤ Customer Metadata

●​ Information about the data you store and use (not the data itself)​

●​ Examples: File types, timestamps, usage stats, service logs​

➤ Security-Related Logs

●​ Network-Level:​
○​ Firewall logs​

○​ Intrusion Detection/Prevention System (IDS/IPS) logs​

○​ Router flow logs (NetFlow)​

●​ Host-Level:​

○​ Operating system logs​

○​ Virtual machine or container logs​

●​ Application-Level (especially SaaS):​

○​ Application activity logs​

○​ Authentication and authorization events​

○​ API access logs​

🧩 2. Why This Data Matters


●​ These logs help CSPs:​

○​ Track security events​

○​ Detect suspicious behavior​

○​ Provide evidence for audits (e.g., SOC 2, ISO 27001)​


○​ Assist in digital forensics and incident response​

🔐 3. Security of Provider-Collected Data


●​ Is the metadata encrypted?​

●​ Who has access to logs and for how long?​

●​ Customers should:​

○​ Ask providers about log retention policies​

○​ Verify if data is included in compliance certifications​

○​ Use shared responsibility models — ensure your side is


secure too​

Let me know if you’d like these broken into flashcards or converted


into a one-page cheat sheet!

Importance:

- Crucial for **audit purposes** (e.g., SAS 70)

- Necessary for **incident response** and **digital forensics**

---
### **Storage in Cloud Environments**

Refers mainly to **Infrastructure-as-a-Service (IaaS)** and not PaaS


or SaaS data.

#### **Three Key Security Concerns:**

1. **Confidentiality**

- **Access control** (authentication + authorization) often weak in


public clouds

- CSPs offer **basic controls** (admin and user-level only) – no


fine-grained roles

- **Encryption** is essential to protect stored data

2. **Integrity**

- Encryption alone ≠ integrity

- Use **Message Authentication Codes (MACs)** for verifying data


integrity

- Prefer **block symmetric algorithms in CBC mode** + one-way


hash

- Ask providers about **key management** and **integrity


mechanisms**

3. **Availability**
- Even with confidentiality and integrity, data must be available

- **Three major threats** to availability:

1. **Network-based attacks**

2. **CSP service availability**

3. **Natural failures or outages**

- No CSP currently provides the ideal **“five 9s” (99.999%) uptime**

| Availability | Daily Downtime | Monthly Downtime | Yearly Downtime |

|--------------------|-------------------|---------------------|-----------------|

| **99.999%** | 00:00:00.4 | 00:00:26 | 00:05:15 |

| **99.99%** | 00:00:08 | 00:04:22 | 00:52:35 |

| **99.9%** | 00:01:26 | 00:43:49 | 08:45:56 |

| **99%** | 00:14:23 | 07:18:17 | 87:39:02 |

✅ **Summary**
Cloud data security is critical and multi-faceted, involving:

- **Confidentiality, Integrity, and Availability (CIA)**

- Strong **encryption and access control**

- Vigilant **provider data monitoring**


- Thoughtful **mitigation strategies** for data at risk

- Realistic expectations from CSPs, as perfect uptime or full


encryption guarantees may not always be achievable

---

Let me know if you'd like a PDF or PPT version for easy revision!

You might also like