Virtualization and Cloud Computing
Virtualization and Cloud Computing
o NIST Defini on: A model enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable compu ng resources (networks, servers, storage, applica ons, services) rapidly
provisioned with minimal management effort.
o Simpler: Delivery of compu ng services over the Internet ("the cloud"), o en pay-as-you-go, offering
flexibility, scalability, and cost savings.
1. On-demand Self-service:
Users provision resources automa cally (via portal/API) without provider staff interac on.
Services accessible over the network (internet/private) via standard mechanisms (browsers,
apps) from diverse clients (phones, laptops, etc.).
3. Resource Pooling:
Provider’s resources (CPU, memory, storage) are pooled to serve mul ple users (mul -
tenancy).
Resources can be rapidly and elas cally scaled up (out) or down (in) based on demand, o en
automa cally.
5. Measured Service:
Virtualiza on Layer (Hypervisors): Creates and manages VMs, enables resource pooling.
Management So ware (Cloud Management Pla orm): For provisioning, orchestra on,
billing, monitoring, security.
o Network: Connects Front End and Back End (typically the internet).
1.2 Cloud Deployment Models, NIST Architecture of Cloud Compu ng, Advantages of Cloud Compu ng, Cloud
Compu ng Challenges
1. Public Cloud:
Infrastructure: Owned and operated by a third-party Cloud Service Provider (CSP) (e.g., AWS,
Azure, GCP).
Accessibility: Available to the general public or a wide industry group over the internet.
2. Private Cloud:
Infrastructure: Operated solely for a single organiza on. Can be on-premises (managed by
org) or hosted by a third party.
3. Hybrid Cloud:
Infrastructure: Composi on of two or more dis nct clouds (public, private, community)
integrated via technology enabling data/app portability.
Key Features: Flexibility, workload portability (e.g., cloud burs ng), balances control with
scalability.
4. Community Cloud:
Infrastructure: Shared by several organiza ons with common concerns (e.g., mission,
security, compliance). Managed by orgs or third party.
Key Features: Collabora ve, shared costs, tailored to specific community needs.
2. Cloud Provider: Makes services available; manages infra, pla orms, or so ware.
3. Cloud Auditor: Independently assesses cloud services, opera ons, performance, security.
4. Cloud Broker: Manages use/delivery of services, nego ates between providers & consumers
(intermedia on, aggrega on, arbitrage).
5. Cloud Carrier: Provides network connec vity and transport (e.g., ISPs).
3. High Availability & Reliability: Providers offer robust infra, redundancy, SLAs.
4. Accessibility & Flexibility: Access resources from anywhere, supports remote work.
9. Security (Poten ally): Large providers have sophis cated security, but shared responsibility applies.
1. Security & Privacy: Data protec on, compliance, mul -tenancy risks.
"Frames" refer to understanding characteris cs & suitability for different organiza onal needs.
o Suitability: Variable workloads, web apps, dev/test, DR, cost-sensi ve projects, startups, SaaS
consump on.
o Suitability: Strict security/compliance needs, sensi ve data, mission-cri cal apps with predictable
demand, control-focused environments.
o Iden fiers: Combina on of public & private, integrated, workload/data portability, flexibility.
o Suitability: Leveraging benefits of both (scalability + control), cloud burs ng, DR, phased cloud
adop on, specific compliance needs for certain data while using public cloud for other tasks.
1.4 Virtualiza on: Introduc on, Characteris cs of Virtualiza on, Full Virtualiza on, Paravirtualiza on, Hardware-
Assisted Virtualiza on, Opera ng System Virtualiza on, Applica on Server Virtualiza on, Applica on
Virtualiza on, Network Virtualiza on, Storage Virtualiza on, Service Virtualiza on
o Defini on: Crea ng a virtual (not actual) version of a compu ng resource (OS, server, storage,
network). Uses a hypervisor to abstract physical hardware.
o Core Idea: Decouple so ware from hardware; allows mul ple OSes/apps on one physical machine.
Key enabler for cloud.
Characteris cs of Virtualiza on
1. Isola on: VMs/containers are isolated from each other and the host.
3. Hardware Independence: VMs not ed to specific physical hardware (enables migra on).
4. Resource Sharing & Par oning: Physical resources (CPU, memory, storage, network) divided among virtual
instances.
5. Increased Server U liza on: Consolidate mul ple workloads onto fewer physical servers.
2. Paravirtualiza on (PV):
Mechanism: Leverages CPU hardware extensions (Intel VT-x, AMD-V) for efficient handling of
privileged instruc ons and memory management. Unmodified guest OS can run efficiently.
Mechanism: OS kernel supports mul ple isolated user-space instances (containers) that
share the host OS kernel. No hypervisor in the tradi onal VM sense.
Cons: Shared kernel (less isola on than VMs); guests must be compa ble with host kernel
type.
1. Applica on Server Virtualiza on: Running mul ple isolated instances of applica on servers (e.g., Tomcat) or
hos ng mul ple isolated applica ons on a single app server instance.
2. Applica on Virtualiza on: Decoupling apps from OS; run in an isolated environment on endpoint without
full install or streamed from server (e.g., Microso App-V).
3. Network Virtualiza on: Abstrac ng physical network into logical virtual networks (e.g., VLANs, SDN, NFV like
VMware NSX).
4. Storage Virtualiza on: Pooling physical storage into a centrally managed virtual storage en ty (e.g., SANs,
NAS, vSAN).
5. Service Virtualiza on (So ware Tes ng): Emula ng behavior of dependent services (e.g., third-party APIs,
databases) unavailable during tes ng to enable parallel development and comprehensive tes ng.
1.5 Compu ng Pla orms: Amazon Web Services (AWS) EC2 ,S3, Google App Engine, Microso Azure etc.
Overview: Introduces major public cloud compu ng pla orms offering IaaS, PaaS, SaaS.
o Descrip on: Leading, comprehensive, and mature cloud pla orm. Global infrastructure.
o Key Services:
Amazon EC2 (Elas c Compute Cloud) (IaaS): Scalable virtual servers (instances) with various
OS, CPU, memory, storage op ons. Features: Security Groups, EBS, Auto Scaling, ELB.
Amazon S3 (Simple Storage Service) (IaaS - Object Storage): Highly scalable, durable object
storage in "buckets." Features: Storage classes, versioning, access control, encryp on, sta c
website hos ng.
o Other AWS: Lambda (FaaS), RDS (Managed DBs), DynamoDB (NoSQL), VPC (Virtual Networks).
o Descrip on: Google's cloud suite, strong in data analy cs, ML, Kubernetes.
o Key Services:
Google App Engine (GAE) (PaaS): Fully managed pla orm for deploying web/mobile apps;
abstracts infra. Features: Auto scaling, versioning, mul ple languages. (Standard & Flexible
environments).
o Other GCP: Cloud Func ons (FaaS), Cloud SQL, Kubernetes Engine (GKE).
Microso Azure:
o Descrip on: Microso 's comprehensive cloud pla orm, strong enterprise integra on.
o Key Services:
Azure Blob Storage (IaaS - Object Storage): Massively scalable object storage.
Azure App Service (PaaS): Fully managed pla orm for web/mobile/API apps.
o Other Azure: Azure Func ons (FaaS), Azure SQL Database, Cosmos DB (NoSQL), Azure Kubernetes
Service (AKS), Azure Ac ve Directory.
2.1 Virtualiza on : Hypervisors: Hosted Structure (Type II Hypervisor) Bare-metal Structure (Type I Hypervisor)
Implementa on Levels of Virtualiza on.
Virtualiza on Recap: Crea on of a virtual version of compu ng resources (hardware, OS, storage, network),
typically managed by a hypervisor.
o Defini on: So ware, firmware, or hardware that creates, runs, and manages virtual machines (VMs).
Abstracts physical hardware from VMs.
o Func on: Manages host resources (CPU, memory, I/O) and allocates them to guest VMs, enforcing
isola on.
Pros: Easy to install and use (like any desktop app), leverages host OS hardware
compa bility.
Use Cases: Desktop virtualiza on, development/tes ng, running mul ple OSes on a
personal computer.
Architecture: Installs and runs directly on the physical hardware ("bare metal"),
ac ng as its own specialized OS for virtualiza on. Guest VMs run on top.
Pros: Higher performance and efficiency (direct hardware access, less overhead),
generally more secure and stable, be er scalability for server workloads.
Examples: VMware ESXi, Microso Hyper-V (server role), Xen, KVM (Kernel-based
Virtual Machine).
Emulates the hardware instruc on set of a target machine on a different host architecture.
Used for running legacy so ware or so ware for different CPU types (e.g., game console
emulators). Generally slow.
Where Type I and Type II hypervisors primarily operate, crea ng virtual hardware interfaces
(vCPU, vRAM, vNICs) for guest OSes. Standard for VM-based server/desktop virtualiza on.
Virtual machine within a language run me (e.g., Java Virtual Machine - JVM, .NET Common
Language Run me - CLR). Executes intermediate bytecode for pla orm independence.
2.2 Resource Virtualiza on CPU Virtualiza on, Memory Virtualiza on, Device and I/O Virtualiza on Technology
Examples.
o Defini on: Abstrac ng and pooling physical resources (CPU, memory, storage, network, I/O) and
presen ng them as logical/virtual resources for dynamic alloca on to VMs or applica ons. Core of
how mul ple VMs share a physical server.
o Goal: Share physical CPU(s) among VMs; each VM perceives dedicated virtual CPU(s) (vCPUs).
o Mechanisms:
Handles privileged instruc ons via trapping/emula on (older full virtualiza on) or more
efficiently via Hardware Assistance (Intel VT-x, AMD-V). These CPU extensions allow direct
execu on of most guest code while securely trapping privileged opera ons for hypervisor
handling (via VM exits/entries).
o Goal: Share physical RAM among VMs; each VM has its own private, con guous virtual address
space.
o Mechanisms:
Hypervisor maps guest physical addresses (GPAs) to host physical addresses (HPAs). Guest OS
maps guest virtual addresses (GVAs) to GPAs.
Hardware Assistance (Intel EPT - Extended Page Tables, AMD RVI/NPT - Nested Page
Tables) manages this two-level address transla on in hardware, significantly improving
performance over older so ware-based methods like shadow page tables.
Transparent Page Sharing (TPS)/Deduplica on: Hypervisor stores only one copy of
iden cal memory pages across VMs (copy-on-write).
o Approaches:
1. Full Emula on: Hypervisor emulates generic I/O devices for VMs. High compa bility, high performance
overhead.
2. Paravirtualized (PV) Drivers: Guest OS uses special "virtualiza on-aware" drivers (e.g., Vir o for KVM, Xen PV
drivers, VMware Tools drivers) that communicate efficiently with backend drivers in the hypervisor or management
VM. Offers much be er performance.
3. Direct I/O Passthrough (Intel VT-d, AMD-Vi/IOMMU): A physical I/O device is assigned exclusively to one
VM. VM uses na ve drivers, bypassing hypervisor for I/O. Near-na ve performance. Requires hardware IOMMU for
DMA/interrupt remapping for security. Device becomes unshareable (unless SR-IOV).
4. SR-IOV (Single Root I/O Virtualiza on): A hardware standard allowing a single PCIe device to appear as
mul ple "Virtual Func ons" (VFs), each assignable directly to a VM. Offers direct hardware access performance with
some sharing capabili es.
o Technology Examples: Virtual Switches (vSwitches), vNICs, virtual HBAs, Vir o, Intel VT-d/EPT, AMD-
V/RVI.
o Core Components:
kvm.ko (kernel module): Core virtualiza on infrastructure, CPU/memory virt using hardware
assist. Exposes /dev/kvm.
o Characteris cs: Open source, integrated with Linux (stable, leverages Linux scheduler/memory
mgmt), good performance, large ecosystem (OpenStack). Primarily Linux host.
Xen Architecture:
o Core Components:
Domain 0 (Dom0): Privileged guest VM (usually Linux) for management (toolstack) and
physical device drivers. Controls other domains.
Virtualiza on Modes:
o Characteris cs: Open source, mature, robust, good performance (esp. PV), strong security focus due
to design. Dom0 cri cal.
VMM (Virtual Machine Monitor) per VM: Handles guest OS execu on using hardware assist.
Management: DCUI (local), ESXi Host Client (web for single host), vCenter Server (centralized
management for mul ple hosts/clusters, enabling advanced features like vMo on, HA, DRS).
VMFS (Virtual Machine File System): Clustered file system for VM storage.
o Characteris cs: Market leader, proprietary (free ESXi limited), mature, reliable, rich enterprise
features, strong performance, large ecosystem.
Microso Hyper-V:
o Core Components:
Windows Hypervisor: Thin layer directly above hardware managing par ons, CPU/memory.
Parent Par on (Root Par on): Runs Windows OS, hosts Virtualiza on Stack (VMMS, WMI
providers), manages physical device drivers.
Child Par ons (Guest Par ons): Run guest OSes (VMs). No direct hardware access.
VMBus: High-speed inter-par on communica on for I/O (guest "Integra on Services" use
synthe c drivers over VMBus).
o Characteris cs: Tightly integrated with Windows, robust features (Live Migra on, Failover
Clustering), included with Windows Server/Pro edi ons. Parent par on offers larger surface than
pure microkernels.
2.4 Cloud Security : Risks in Cloud Compu ng: Introduc on, Risk Management, Cloud Impact, Enterprise-Wide,
Risk Management, Risks internal and external in Cloud Compu ng.
o Defini on: Policies, tech, controls to protect cloud assets (data, apps, infra).
o Shared Responsibility: CSP: security OF cloud (infra). Customer: security IN cloud (data, apps, config).
o Cloud Risk Amplifiers: Loss of physical control, mul -tenancy, expanded a ack surface, data loca on
issues, ease of misconfigura on.
o Defini on: Iden fying, assessing, analyzing, trea ng, monitoring cloud risks.
o Process:
1. Iden fica on: Iden fy threats/vulnerabili es (breaches, misconfigs, API flaws).
4. Treatment: Mi gate (controls), Transfer (insurance, CSP shared responsibility), Accept (if
within limits), Avoid (don't use service).
o Integra ng cloud risks into the overall organiza onal Enterprise Risk Management (ERM)
framework.
o Requires adapted governance, defined cloud risk appe te, cross-func onal collabora on.
1. Malicious Insiders: Inten onal data the , sabotage. Privileged users = higher risk.
4. Poor IAM Prac ces: Weak passwords, no MFA, overly permissive roles.
1. Malicious A ackers: Hackers, cybercriminals targe ng cloud resources via exploits, phishing,
malware.
2.5 Cloud Security Services: Security Authoriza on Challenges in the Cloud, Secure Cloud So ware Requirements,
Content level security, Cloud Hos ng risks.
o Defini on: Security solu ons offered by CSPs (na ve) or third-party vendors to protect cloud assets.
o Types (Examples):
Iden ty and Access Management (IAM): User IDs, auth (MFA), authoriza on (roles/policies)
(e.g., AWS IAM, Azure AD).
Data Security: Encryp on services, Key Management Services (KMS, CloudHSM), DLP.
o Complexity & Granularity: Managing numerous, fine-grained permissions across many resources is
hard and error-prone.
o Role Explosion: Too many narrow roles or too few broad roles are problema c.
o API-Driven Access Security: APIs are primary control planes; securing API auth is cri cal.
1. Secure SDLC Prac ces (DevSecOps): Threat modeling, secure code reviews, SAST/DAST.
o Techniques:
Data Loss Preven on (DLP): Iden fy & prevent exfiltra on of sensi ve content.
Watermarking.
o Key Risks: CSP security incidents/outages, shared environment vulnerabili es (mul -tenancy),
vendor lock-in, compliance/regulatory issues (if CSP can't meet specific needs), lack of direct
control/visibility over physical infra, geographic/provider viability risks, SLA shortcomings, data
ownership/access clarity with CSP, reliance on CSP security prac ces.
Module 3: Data Security in Cloud
3.1 Data Security in Cloud: Introduc on, Current state, Data Security.
o Defini on: Encompasses prac ces, policies, and technologies to protect digital data (sensi ve,
confiden al, personal) stored, processed, or transmi ed within cloud environments from
unauthorized access, use, disclosure, altera on, or destruc on.
o Core Goal: Ensure Confiden ality, Integrity, and Availability (CIA Triad) of data in the cloud.
o Importance: Data is a cri cal asset; breaches lead to financial loss, reputa onal damage, legal
penal es.
CSP (Cloud Service Provider): Responsible for "security OF the cloud" (underlying global
infrastructure: hardware, so ware, networking, facili es).
Customer (Cloud Consumer): Responsible for "security IN the cloud" (data placed in the
cloud, configura on of cloud services to protect that data, user access, applica ons).
Data Security in Cloud: Current State (Key Trends & Observa ons)
1. Increased Cloud Adop on & Data Volume: More data in the cloud means a larger a ack surface and higher
poten al impact from breaches.
2. Sophis ca on of Threats: A ackers constantly evolve TTPs (Tac cs, Techniques, Procedures) targe ng cloud
data (misconfigura ons, ransomware, APTs).
3. Misconfigura ons as a Leading Breach Cause: Human error in configuring cloud storage (e.g., public S3
buckets), databases, and IAM policies is a primary vulnerability.
4. Focus on Data-Centric Security: Shi towards protec ng the data itself (encryp on, tokeniza on) rather than
just relying on perimeter defenses.
5. Evolving Regulatory Landscape: Prolifera on of data privacy laws (GDPR, CCPA, HIPAA, PCI DSS) imposing
strict data handling and security requirements in the cloud.
6. Rise of DevSecOps: Integra ng security into the en re data/applica on lifecycle in the cloud (shi -le
security).
7. Advanced Security Tools & Automa on: CSPs and vendors offer sophis cated tools (AI-driven threat
detec on, CSPM, advanced encryp on, KMS).
8. Adop on of Zero Trust Principles: "Never trust, always verify"; strict authen ca on/authoriza on, micro-
segmenta on.
9. Skills Gap: Shortage of professionals with deep cloud data security exper se.
10. Hybrid and Mul -Cloud Complexity: Ensuring consistent data security, visibility, and control across diverse
environments is challenging.
Iden fy and categorize data based on sensi vity, value, and regulatory needs (e.g., public,
internal, confiden al, restricted, PII).
Allows applica on of propor onate security controls.
3. Encryp on:
Data at Rest: Encrypt data in cloud storage (object, block, file, databases) and backups.
Data in Transit: Encrypt data moving between user/cloud, between cloud services, or on-
prem/cloud.
Data in Use (Emerging): Confiden al compu ng (secure enclaves) to protect data during
processing.
4. Key Management:
Secure lifecycle of encryp on keys (genera on, storage, distribu on, rota on, revoca on,
backup).
Op ons: CSP Key Management Services (KMS), Hardware Security Modules (HSMs -
cloud/on-prem), Bring Your Own Key (BYOK), Hold Your Own Key (HYOK).
Replace sensi ve data with non-sensi ve equivalents for non-produc on use or limited-
access users.
Policies and tools to discover, monitor, and protect sensi ve data from unauthorized
exfiltra on or exposure (scans data at rest, in transit, at endpoints).
Ensure data is securely and permanently deleted from cloud storage. Understand CSP
dele on processes and data remanence. Cryptographic shredding (destroying keys) is a
method.
Regularly back up cloud data; store backups securely (encrypted, different region). Test
recovery.
Track data access, changes, admin ac ons. Use security tools to detect anomalous data
access pa erns. Conduct regular audits.
Ensure data is not tampered with or corrupted (hashing, digital signatures, version control).
3.2 Applica on Security in Cloud, Security in IaaS Environment, Security in PaaS, Environment, Security in SaaS.
o Defini on: Securing applica ons developed for, deployed to, or hosted in cloud environments
throughout their lifecycle.
Secure SDLC (DevSecOps): Integrate security (threat modeling, secure coding, SAST/DAST,
SCA, CI/CD security).
API Security: Authen ca on, authoriza on, input valida on, rate limi ng, encryp on for
APIs.
Iden ty Federa on & SSO: Integrate with cloud IAM or corporate IdPs.
Secrets Management: Securely manage API keys, DB creds (AWS Secrets Manager, Azure Key
Vault).
o Customer Responsibility (Highest): Manages Guest OS, middleware, applica ons, data. CSP manages
underlying physical infra & virtualiza on.
1. Virtual Machine (Guest OS) Security: OS hardening, patching, host-based firewalls, an -malware/EDR, guest
OS user account management.
2. Network Security (Virtual Network): Configure VPCs/VNets, subnets, security groups, NACLs. Deploy virtual
firewalls, WAFs, IDS/IPS. Secure traffic between VMs & external (VPNs, TLS).
3. Data Security: Encrypt data at rest (virtual disks, DBs on VMs), in transit. Manage keys.
5. IAM for IaaS Resources: Control admin access to VMs, storage, networks (MFA, PoLP for cloud console/APIs).
6. Logging & Monitoring: Guest OS, app, cloud infra logs (VPC flow logs).
o Shared Responsibility: CSP manages underlying infra, OS, middleware (run mes, DBs). Customer
manages deployed apps & data.
1. Applica on Security (Primary focus): Secure coding, vulnerability management for their PaaS-deployed apps.
App-level auth/authz. API security.
2. Data Security: Secure data processed/stored by their apps. Configure security features of PaaS data services
(encryp on, access policies).
3. IAM for PaaS Services: Control access to PaaS services & apps on them. Integrate app user auth with PaaS ID
system or IdPs.
4. Configura on of PaaS Services: Securely configure PaaS pla orm se ngs (network access rules for PaaS
service, scaling, auth methods).
5. Logging & Monitoring: App logs and PaaS service logs for security events.
o CSP Responsibility: Securing the PaaS pla orm itself (patching, secure run me).
o CSP Responsibility (Highest): Manages app, data, OS, middleware, underlying infra.
1. User IAM (Applica on-Level): Manage user accounts & access rights within the SaaS app. Enforce strong
passwords, use MFA if SaaS supports. RBAC within app.
2. Data Security & Privacy (Configura on & Usage): Configure SaaS app's data sharing, privacy, security
se ngs. Responsible for data input & compliant use.
3. Secure Configura on of SaaS App: Customize se ngs to align with org security policies.
6. Vendor Due Diligence: Assess SaaS provider's security/compliance. Review SLAs, certs.
o CSP Responsibility: Securing SaaS app itself, pla orm, infra, patching, vulnerability mgmt for their
code.
3.3 Environment, Cloud Service Reports by CPS, Security for Virtualiza on So ware.
Threat Environment.
o Securing the environment means holis c applica on of controls based on shared responsibility and
risk.
SOC 2: Controls for Security, Availability, Processing Integrity, Confiden ality, Privacy
(Trust Services Criteria - TSC). Very common for CSPs. Type II assesses design &
opera onal effec veness over me.
3. PCI DSS (Payment Card Industry Data Security Standard): For cardholder data. CSPs provide A esta ons of
Compliance (AoC).
4. HIPAA (US Health Info): CSPs may sign Business Associate Agreements (BAAs) for eligible services.
5. FedRAMP (US Government): Standardized security assessment/authoriza on for cloud services used by US
federal agencies.
6. CSA STAR (Cloud Security Alliance Security, Trust, Assurance and Risk):
Third-Party Audits (STAR A esta on - based on SOC 2 + CCM; STAR Cer fica on -
based on ISO 27001 + CCM).
o Customer Use: Vendor due diligence, risk assessment, mee ng own compliance, understanding CSP
controls. Usually available under NDA.
1. Hypervisor Hardening: Minimize a ack surface (install only necessary components), patch promptly, secure
configura ons.
2. Secure Hypervisor Management Interface: Strong auth (MFA), restricted network access (dedicated
management network, IP whitelis ng), encrypted communica on (HTTPS/SSH).
3. VM Isola on: Ensure effec ve hypervisor isola on of VM CPU, memory, I/O, network.
4. Protec on Against Hypervisor Escapes (VM Escape): Robust hypervisor design, mely patching, strong VM
isola on. Hardware assist helps.
6. Secure Virtual Storage: Protect virtual disk files (VMDKs, VHDs). Encrypt virtual disks.
10. Use Trusted Boot Technologies (Secure Boot, Intel TXT) to ensure hypervisor loads in known good state.
11. Consider specifics: KVM security (Linux kernel, QEMU), Xen security (Dom0), VMware ESXi (vCenter security),
Hyper-V (parent par on security).
3.4 Host Security in PasS, SaaS and IaaS, Security as a Service, Benefits of SaaS, Challenges with SaaS, Iden ty
Management as a Service (Id MaaS).
o IaaS:
Customer: Secures the guest OS within their VMs (patching, hardening, HBF, AV/EDR, user
accounts in guest OS).
o PaaS:
CSP: Secures physical hosts, hypervisor, OS of pla orm servers, pla orm middleware
(run mes, DB engines).
Customer: Primarily security of applica ons & data deployed on PaaS. No access to
underlying host OS.
o SaaS:
CSP: Secures physical hosts, hypervisor, OS, middleware, and the SaaS applica on itself.
Customer: Secure config of SaaS app se ngs, user access within the app, data input. No
visibility/responsibility for underlying host security.
o Defini on: Cloud-based model for delivering security services (subscrip on basis).
o How: Security func ons (IAM, email filtering, WAF, SIEM) hosted in cloud, accessed over internet.
o Examples: IDaaS, Cloud WAFs, CASBs, Email Security Gateways, Cloud SIEM, Vulnerability Scanning
services, MDR, Cloud Endpoint Protec on.
o Benefits: Reduced upfront costs, scalability, access to provider exper se, simplified management
(updates handled by provider), rapid deployment, predictable costs.
o Challenges: Trust/due diligence (reliance on third party), data privacy (where security data stored),
integra on with exis ng systems, vendor lock-in.
Benefits of SaaS (General Recap):
o Rapid Deployment.
o Vendor Lock-in.
o Internet Dependency.
1. Single Sign-On (SSO): Login once for mul ple apps (using SAML, OIDC).
4. Directory Services: Cloud-based user directory or sync with on-prem (e.g., AD).
o Examples: Okta, Microso Azure Ac ve Directory (Azure AD), Ping Iden ty, OneLogin, Auth0.
3.5 Security related to storage, Study various benefits of Maas, SaaS, PaaS and Iaas.
o Covers Object Storage (S3, Blob), Block Storage (EBS, Azure Disk), File Storage (EFS, Azure Files),
Databases.
2. Encryp on at Rest:
SSE-KMS (CSP manages keys, customer has more control/audit via AWS KMS,
Azure Key Vault).
Client-Side Encryp on: Customer encrypts data before upload. Customer fully
manages keys.
3. Encryp on in Transit: Use TLS/SSL (HTTPS) for all connec ons (upload, download, access).
4. Data Integrity: Many cloud services use checksums (MD5, CRC) to verify.
5. Logging & Monitoring: Enable storage access logs (S3 server access logs, Azure Storage
analy cs). Monitor for unusual access.
6. Versioning: Enable for object storage (S3, Blob) to keep mul ple object versions, aiding
recovery from accidental dele on/overwrite or ransomware.
7. Data Backup & Replica on: Replicate storage across availability zones/regions for HA/DR.
Regularly back up.
8. Secure Dele on: Understand CSP data dele on processes, data remanence.
9. Preven ng Unintended Public Access: Default to private. Use features like S3 Block Public
Access.
10. Data Loss Preven on (DLP): Tools to scan cloud storage for sensi ve data & prevent
exfiltra on.
o "MaaS" is not a standard primary cloud service model like the others. It can refer to many "X as a
Service" types (e.g., Monitoring as a Service, Management as a Service, Metal as a Service). Benefits
o en align with general cloud/SaaS benefits.
Faster Deployment.
Benefits: Maximum flexibility & control over OS & so ware stack (like on-prem but
virtual), run legacy apps, pay only for consumed resources. Ideal for migra ng
exis ng apps, custom environments.
Focus: Applica on development & deployment pla orm (run mes, databases,
messaging).
Benefits: Developers focus on code (not infra/OS management), faster dev cycles,
built-in scalability & HA for apps, integrated dev tools & services. Ideal for building
new cloud-na ve apps quickly.
o Offloads data storage and intensive processing from resource-constrained mobile devices to
powerful cloud pla orms.
o Mobile devices act as thin clients, focusing on UI/interac on, while leveraging cloud for computa on
and storage.
1. Mobile Devices (Clients): Smartphones, tablets, etc., running cloud-aware mobile apps.
2. Wireless Networks: Connec vity (Wi-Fi, 3G, 4G LTE, 5G). Quality (bandwidth, latency) is cri cal.
3. Cloud Infrastructure (Backend): Servers, storage, databases, applica on pla orms (CSPs).
Data Storage: Large-scale storage of user/app data, mul media in the cloud.
Service Provisioning: Cloud provides backend services (databases, auth, push no fica ons,
analy cs).
4. Cloud-Aware Mobile Applica ons: Designed to interact with cloud backends; may cache data locally.
2. Increased Processing Power: Access to cloud servers for complex tasks beyond device capability.
3. Improved Data Storage Capacity: Overcomes device storage limits with cloud storage.
4. Enhanced Reliability and Scalability: Cloud offers HA and can scale to meet demand.
5. Cross-Pla orm Accessibility & Data Synchroniza on: Data/apps accessible across devices via cloud.
6. Context-Aware & Personalized Services: Cloud analy cs enable richer mobile experiences.
7. Simplified Applica on Development (Backend as a Service - BaaS): Cloud pla orms provide ready-made
backend services for mobile apps.
8. Data Backup and Recovery: Convenient cloud backup for mobile data.
1. Network Dependency & Latency: Performance relies on wireless network quality. Latency impacts real- me
apps.
Data at Rest (Cloud): Needs robust encryp on and access controls in the cloud.
User Authen ca on/Authoriza on: Secure cloud access for mobile users.
Privacy Concerns: Collec on/storage of loca on, PII, usage pa erns.
3. Bandwidth Consump on: Data-intensive apps can incur costs for users.
4. Mobile Device Security: Compromised device can lead to compromised cloud access.
6. Power Consump on of Wireless Communica on: Constant network ac vity can drain ba ery.
o Cloud mobile gaming, mobile AR/VR, mHealth, real- me mobile analy cs, cloud-based
produc vity/social apps, loca on-based services.
o Edge Compu ng for MCC: Processing closer to mobile users for reduced latency.
o Defini on: Cloud systems designed to be self-managing (self-configuring, -healing, -op mizing, -
protec ng) with minimal human interven on, based on high-level objec ves. Inspired by human
autonomic nervous system.
o Core Principles (based on MAPE-K loop: Monitor, Analyze, Plan, Execute, over a Knowledge base;
CHOP characteris cs):
3. Self-Op miza on (Self-Tuning): Con nuously monitor and tune parameters/resources for
op mal efficiency & SLAs.
o Relevance to Cloud: Ideal for managing dynamic, complex, large-scale cloud environments.
o Defini on: Specialized cloud paradigm op mized for storage, processing, delivery, consump on of
mul media content (video, audio, images, interac ve media like VR/AR).
o Key Characteris cs and Requirements:
4. Content Delivery Networks (CDNs) for global caching and fast delivery.
8. Support for diverse mul media formats & streaming protocols (HLS, DASH).
o Services Offered: Video/audio streaming (Live & VOD), cloud video edi ng/produc on, image/video
hos ng, transcoding, cloud gaming, mul media archiving, RTC services (video conferencing), AI
content analysis.
o Benefits: Reduced upfront infra investment, scalability, global reach via CDNs, access to advanced
processing (GPUs, AI), pay-as-you-go.
o Challenges: Ensuring QoS/low latency, managing large data volumes & bandwidth costs, content
security/DRM, complex mul media workflows, regional content regula ons.
o Examples: AWS Elemental Media Services, Azure Media Services, Google Cloud Transcoder API.
Defini on (Green Cloud Compu ng): Design, development, opera on of cloud data centers/services to
minimize energy consump on and environmental impact, while mee ng performance/SLOs.
Mo va ons:
1. Environmental Concerns: Data centers are large electricity consumers (carbon emissions).
4. Heat Dissipa on Challenges: High energy use = more heat = more cooling energy.
1. Energy-Efficient Hardware: Low-power CPUs (e.g., ARM), memory, SSDs; efficient power
supplies/cooling (free cooling, liquid cooling).
2. Virtualiza on & Server Consolida on: Increase server u liza on, reduce idle servers.
5. Op mized Data Center Design & Management: Airflow management (hot/cold aisle), higher
opera ng temps, renewable energy, PUE op miza on.
8. Thermal-Aware Task Scheduling: Schedule tasks based on server thermal state to reduce cooling.
9. Leveraging Geographic Loca on: Cooler climates, access to renewables, "follow the
moon/renewables" workload shi ing.
Benefits: Reduced environmental footprint, lower opera onal costs, improved sustainability, poten ally
enhanced system reliability (less heat).
Challenges: Balancing energy efficiency with performance/QoS, complexity of dynamic energy management,
accurate energy measurement, workload variability.
Defini on: Paradigm to harness and coordinate massively distributed, heterogeneous, and loosely coupled
compu ng resources (HPC, grids, clouds, desktops, IoT) for complex, large-scale problems. "Jungle" implies a
diverse, untamed ecosystem.
o Grid Compu ng: Jungle implies greater scale, heterogeneity, less structure.
o Cloud Compu ng: Clouds can be components within a jungle; jungle might federate clouds.
o Volunteer Compu ng / P2P Compu ng: Can leverage these dynamic resources.
Challenges:
Use Cases (Grand Challenge Problems): Large-scale scien fic simula ons (climate, astrophysics), big data
analy cs, complex op miza on, drug discovery, global collabora ve research.
Vision: Global, self-organizing computa onal ecosystem. More conceptual than fully realized.
o Defini on: A distributed compu ng paradigm that brings computa on and data storage closer to the
sources of data genera on or points of consump on (e.g., IoT devices, sensors, end-user devices,
local machinery).
o Goal: Reduce latency, conserve network bandwidth, improve privacy/security by processing data
locally, and enable faster decision-making.
o Key Drivers:
1. IoT Data Deluge: Prolifera on of devices genera ng vast data needing local/quick
processing.
2. Low-Latency Applica ons: Autonomous vehicles, industrial robo cs, AR/VR, real- me
pa ent monitoring require near-instant responses not always feasible from centralized cloud.
3. Bandwidth Op miza on: Avoids sending all raw data to a central cloud, reducing costs and
conges on.
4. Data Privacy and Security: Processing sensi ve data locally can reduce exposure risks and
help comply with data residency.
5. Autonomous Opera on & Resilience: Edge systems can operate (par ally) even if
disconnected from the central cloud.
o Architectural Tiers:
Centralized Cloud: For overall management, large-scale storage, complex analy cs, model
training.
o Rela onship with Cloud: Extension of the cloud ("distributed cloud"), not a replacement. Cloud
provides central orchestra on, data aggrega on, and advanced services.
o Use Cases:
o Challenges:
Connec vity: Ensuring reliable connec vity for diverse edge deployments.
o Future Outlook: Cri cal for 5G-enabled applica ons, AI at the edge, and the expanding IoT
landscape. Will significantly reshape applica on architectures.
Focus Area: Serverless Compu ng Evolu on & Quantum Compu ng Integra on (Hypothe cal Future
Vision)
o Part 1: Evolu on of Serverless Compu ng (Recap & Future Steps - Building on current trends):
1. Minimized Cold Starts: Further reducing latency for first invoca ons (e.g., improved
provisioned concurrency, snapsho ng).
3. Stateful Serverless Advancements: More robust and integrated solu ons for
managing state in serverless applica ons beyond simple key-value stores.
6. AI/ML Op miza on: Serverless becoming the default pla orm for deploying and
scaling AI/ML inference models with op mized hardware (GPU/TPU) access.
7. Greater Abstrac on: Moving towards "business logic as a service," where developers
define workflows and outcomes, and the pla orm handles all underlying execu on
primi ves.
Current State of Quantum Compu ng: Nascent, specialized hardware, primarily accessible
via cloud pla orms for research and experimenta on (e.g., IBM Quantum Experience, AWS
Braket, Azure Quantum).
3. Seamless Integra on with Classical Cloud Services: Quantum results feeding back
into classical AI/ML pipelines, databases, or analy cs services within the same cloud
ecosystem.
5. Development of Quantum Algorithms and So ware Stacks: Cloud pla orms will
host comprehensive SDKs, simulators, and tools for quantum so ware development.
Algorithm Development: Discovering more prac cal quantum algorithms that offer
significant speedups.
Cost and Accessibility (Early Stages): QPU access will likely remain a premium
service ini ally.
Security Implica ons: Poten al for quantum computers to break current classical
encryp on (necessita ng Post-Quantum Cryptography - PQC).
o Synergis c Future: The evolved serverless paradigm, with its extreme abstrac on and event-driven
nature, could become an ideal way to manage and orchestrate hybrid quantum-classical applica ons.
A developer might define a complex workflow where certain steps, triggered by events, are
automa cally routed to classical serverless func ons, while specific computa onally hard steps are
transparently offloaded to a "Quantum Func on" running on a cloud QPU. The cloud pla orm would
handle all the underlying resource management, scaling, and billing for both classical and quantum
components.
o Overall Impact: This future involves a highly abstracted, intelligent, and specialized cloud where
developers focus even more on problem-solving logic, leveraging a diverse array of backend compute
resources—from ubiquitous serverless func ons for general tasks to highly specialized quantum
processors for intractable problems—all managed seamlessly by the cloud pla orm.