Cloud Security
Cloud Security
Infrastructure in IT = all the foundational systems, hardware, software, network resources, and
facilities required to operate an enterprise's IT environment.
Examples:
a) Network Security
Protects internal networks from intruders, whether it’s targeted attacks or opportunistic malware.
• Identity and Access Management (IAM) – Defining who can access what
• Encryption of data at rest & in transit
• Misconfiguration detection – Auto-detect public S3 buckets, exposed APIs
• Shared Responsibility Model – Cloud provider secures infra, client secures data/config
d) Physical Security
Even the best firewall won’t save you if someone walks in and unplugs your server.
Threat Description
DDoS Attacks Flooding server with traffic to crash it
Insider Threats Disgruntled employees or careless users
Malware & Ransomware Infiltrate systems and lock/encrypt data
Unpatched Vulnerabilities Old software with known bugs
Third-party Risk Insecure vendors/contractors
Best Practices for Protection:
Types:
Data Security ensures that digital information is protected from unauthorized access, corruption,
loss, or theft across its lifecycle.
1. Data Creation
2. Data Storage (At Rest)
3. Data Usage (In Use)
4. Data Transmission (In Transit)
5. Data Archival
6. Data Deletion
Techniques & Tools for Data Security:
a) Encryption
b) Access Control
Threats to Data:
Threat Description
Ransomware Locks data until ransom is paid
Phishing Trick users into giving access
SQL Injection Insert code to extract DB data
MITM Attacks Data intercepted mid-transit
Insider Theft Data stolen by employees or ex-employees
Countermeasures:
Privacy = Right of individuals to control their personal data — who collects it, why it’s
collected, how it’s used, and who it’s shared with.
Type Examples
Information Privacy Name, age, Aadhaar, browsing history
Bodily Privacy Biometrics, DNA, facial recognition
Communication Privacy Emails, texts, DMs
Locational Privacy GPS data, app location tracking
a) India:
🇺🇸 c) CCPA (California):
Once you upload your data to a cloud provider (like AWS, Azure, Google Cloud), do you still
own it? Or does the cloud provider own/control parts of it?
Risks:
• Cloud providers may use broad terms in their agreements to access, process, or even
monetize your data.
• Ambiguity in ownership can lead to disputes during data loss or service termination.
Best Practice:
Data stored in the cloud may reside in multiple countries — and each country has different data
protection laws.
For example:
• If you're in India, but your data is stored in Ireland (EU), GDPR laws apply.
• Some nations require local storage (like India’s RBI guidelines for banking data).
Risks:
Best Practice:
When personal data (name, contact, financial info) is stored on the cloud, privacy laws apply —
and these vary widely across the globe.
Examples:
Risks:
Best Practice:
Risks:
Best Practice:
You might want to move from AWS to Azure — but will they let you export your data easily,
or will it be trapped like a Pokémon in a Pokéball?
Risks:
Risks:
Best Practice:
If you develop code, content, or AI models on the cloud, who owns them?
Also, AI tools hosted on cloud may use your data for training. That’s a privacy AND IP issue!
Risks:
• IP theft or misuse
• Ambiguous ownership in multi-tenant platforms
• Cloud providers using your data to train LLMs or AI models (Yes, that happens )
Best Practice:
Risk:
Best Practice:
Final Thought:
Cloud computing is powerful, but it’s not a free-for-all. The law is very real in the cloud, and
ignoring legal issues is like using a Death Note without reading the manual.