0% found this document useful (0 votes)
17 views

Unit 1 Cloud

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Unit 1 Cloud

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Unit 1

1. Shared Responsibility Model::

Introduction:

The shared responsibility model in cloud security divides security tasks between the
cloud service provider (CSP) and the customer.

This helps both parties to understand their roles in maintaining security and compliance.

Cloud Service Provider Responsibilities

1. Physical Security:

Secure facilities with surveillance, access controls, and environmental controls.

2. Network Security:

Use firewalls, intrusion detection systems, and network segmentation to protect


the network.

3. Hardware Security:

Protect physical hardware components.

4. Virtualization Security:

Manage security of the virtualization layer.

5. Cloud Services and Platforms:

Secure operating systems, databases, and middleware provided as part of the


service.

6. Compliance:

Maintain compliance with industry standards and regulation


Customer Responsibilities

1. Data Security:

Encrypt data at rest and in transit, and manage encryption keys.

2. Access Controls:

Set user access permissions, roles, and authentication, including multi-factor


authentication (MFA).

3. Application Security:

Use secure coding practices, application testing, and vulnerability management.

4. Network Security:

Manage network security settings like firewalls and security groups.

5. Operating System and Software:

Keep systems and applications up to date with security patches.

6. Compliance:

Ensure cloud-stored data complies with regulations and standards.

Examples of Responsibility Distribution

1. Infrastructure as a Service (IaaS):

- Provider: Secures physical hardware, network, virtualization, and infrastructure.

- Customer: Manages operating systems, applications, data, and access controls on


virtual machines.

2. Platform as a Service (PaaS):

- Provider: Secures infrastructure, operating systems, and runtime environment.

- Customer: Manages applications, data, and access controls.


3. Software as a Service (SaaS):

- Provider: Secures the entire infrastructure, including applications.

- Customer: Manages user access, data within the application, and specific
configurations.

Importance of the Shared Responsibility Model

1. Clear Accountability:

Helps both parties know their specific responsibilities, reducing security and
compliance gaps.

2. Effective Security Management:

Encourages cooperation to address security challenges and implement measures.

3. Compliance Assurance:

Helps organizations comply with regulations by understanding shared


responsibilities.

4. Risk Mitigation:

Allows providers to focus on infrastructure security while customers secure their


applications and data.
2. Small Startup(adopting cloud computing)::

Introduction:

Adopting cloud computing can offer significant benefits to a small startup, particularly in
terms of cost, scalability, and time-to-market. Here’s a simplified point-by-point
explanation:

Cost Efficiency:

1. Pay-as-You-Go Model:

- Startups only pay for the resources they use.

- No need for expensive upfront investments in hardware and infrastructure.

- Reduces initial capital expenditures.

2. Lower Maintenance Costs:

- Cloud providers handle hardware and software maintenance.

- Less need for in-house IT staff and infrastructure management.

Scalability:

1. On-Demand Resources:

- Easily scale resources up or down based on needs.

- Quickly add more resources during high-demand periods, like product launches.

2. Global Reach:

- Cloud providers have data centers worldwide.

- Allows startups to reach a global audience with minimal effort.


Time-to-Market:

1. Rapid Deployment:

- Cloud platforms offer pre-configured services and tools.

- Enables quick deployment of products and services.

2. Flexibility and Innovation:

- Startups can experiment with different technologies without long-term


commitments.

- Encourages rapid iteration and innovation.

Overall Benefits:

- Efficient Resource Management: Cloud computing helps startups manage resources


efficiently.

- Adaptability: Allows quick adaptation to changing demands.

- Faster Launch: Accelerates the time it takes to bring products to market.


3. Cloud Security Architecture::

Cloud Security Architecture refers to the framework of tools, processes, policies, and
technologies designed to protect cloud-based systems, applications, and data. It ensures
the confidentiality, integrity, and availability of resources in the cloud

Cloud Security for Financial Institutions: Key Components and Strategies

1. Governance and Compliance

- Follow industry regulations like GDPR, PCI-DSS, SOX.

- Use frameworks like CSA Cloud Controls Matrix or NIST Cybersecurity Framework.

2. Data Protection

- Encrypt data at rest and in transit.

- Use secure key management solutions, such as HSMs.

3. Identity and Access Management (IAM)

- Implement Multi-Factor Authentication (MFA).

- Assign permissions based on roles.

- Monitor and manage high-level access accounts.

4. Security Monitoring and Incident Response

- Track and analyze security events continuously.

- Use Security Information and Event Management (SIEM) tools.

- Develop and test a response plan for breaches.

5. Network Security

- Use firewalls, intrusion detection systems and network segmentation to protect the
system.
6. Data Backup and Recovery

- Ensure automated and regular data backups.

- Develop and test plans for major disruptions.

7. Application Security

- Follow secure coding practices in development.

- Regularly scan and fix vulnerabilities.

8. Vendor and Third-Party Risk Management

- Evaluate security of vendors and service providers.

- Include security requirements in service level agreements (SLAs).

9. Security Policies and Training

- Enforce comprehensive security policies.

- Provide ongoing security awareness and training programs.

Architectural Diagram:
4. Data Leakage::

Introduction

Data leakage refers to the unauthorized or unintentional exposure of sensitive or


confidential information to external parties or unauthorized users.

How Data Leakage Can Occur in the Cloud

Misconfigured Cloud Storage: Incorrect permissions can make data accessible to


unauthorized users.

Weak Access Control: Inadequate authentication allows unauthorized access to


sensitive data.

Insecure APIs: Poorly secured APIs can lead to data exposure.

Data Transmission Vulnerabilities: Unencrypted data can be intercepted during


transfer.

Human Error: Accidental sharing or handling of data can cause exposure.

Inadequate Encryption: Unencrypted data is vulnerable to unauthorized access.

Shared Resources: Vulnerabilities in shared environments can expose data between


tenants.

Preventive Measures

1. Governance and Compliance

- Follow industry regulations like GDPR, PCI-DSS, SOX.

- Use frameworks like CSA Cloud Controls Matrix or NIST Cybersecurity Framework.

2. Data Protection

- Encrypt data at rest and in transit.

- Use secure key management solutions, such as HSMs.


3. Identity and Access Management (IAM)

- Implement Multi-Factor Authentication (MFA).

- Assign permissions based on roles.

- Monitor and manage high-level access accounts.

4. Security Monitoring and Incident Response

- Track and analyze security events continuously.

- Use Security Information and Event Management (SIEM) tools.

- Develop and test a response plan for breaches.

5. Network Security

- Use firewalls, intrusion detection systems and network segmentation to protect the
system.

6. Data Backup and Recovery

- Ensure automated and regular data backups.

- Develop and test plans for major disruptions.

7. Application Security

- Follow secure coding practices in development.

- Regularly scan and fix vulnerabilities.

8. Vendor and Third-Party Risk Management

- Evaluate security of vendors and service providers.

- Include security requirements in service level agreements (SLAs).

9. Security Policies and Training

- Enforce comprehensive security policies.

- Provide ongoing security awareness and training programs.


5. Client-side Encryption::

Introduction

Client-side encryption can significantly enhance the security of shared proprietary


designs in the cloud while maintaining accessibility for authorized collaborators. Here's
how:

 Data Encryption Before Uploading


 Encryption Keys Controlled by the Client
 Secure Key Sharing with Collaborators
 Compatibility with Cloud Collaboration Tools
 Enhanced Security During File Transfers
 Protection Against Cloud Service Provider Breaches
 Safe Data Transfer
 Compatibility with Collaboration Tools
 Prevention of Unauthorized Access
 Secure and Efficient Collaboration

You might also like