0% found this document useful (0 votes)
156 views16 pages

Cloud Security Notes

Cloud security involves policies and technologies to protect data and systems in the cloud, preventing cyber-attacks and unauthorized access. It is crucial for businesses as they face risks like data breaches and compliance violations, and it offers benefits such as centralized security and cost reduction. Key challenges include data breaches, access management, and malware attacks, with solutions like encryption, regular audits, and employee training to enhance security.

Uploaded by

Raaz gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views16 pages

Cloud Security Notes

Cloud security involves policies and technologies to protect data and systems in the cloud, preventing cyber-attacks and unauthorized access. It is crucial for businesses as they face risks like data breaches and compliance violations, and it offers benefits such as centralized security and cost reduction. Key challenges include data breaches, access management, and malware attacks, with solutions like encryption, regular audits, and employee training to enhance security.

Uploaded by

Raaz gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Cloud Security Notes

What is Cloud Security?


Cloud security, also called cloud computing security, is the use of security policies, technologies,
and practices to protect cloud-based data, systems, and infrastructure.
It helps prevent cyber-attacks, unauthorized access, and data loss.
Example: If a company stores customer data in the cloud, cloud security ensures the data
remains safe from hackers or accidental deletion.

Why is Cloud Security Important?


As businesses use cloud computing, they face risks like hacking and data breaches. Cloud
security helps protect sensitive information and systems from these threats.
Benefits of Cloud Security:
1. Centralized Security
o Security is managed from a central location.
o Helps in monitoring, web filtering, and disaster recovery.
o Example: If an employee’s laptop is stolen, cloud security ensures sensitive data
is still safe.
2. Cost Reduction
o No need to buy expensive security hardware.
o Reduces manual security updates.
o Example: A small business saves money by using cloud security instead of hiring
a large IT team.
3. Less Administration Work
o Security updates happen automatically.
o No need for manual security configurations.
o Example: IT teams can focus on other important tasks instead of managing
security updates.
4. Reliability
o Users can securely access data from anywhere.
o Works on different devices without issues.
o Example: A remote employee can safely log in to their company’s system from
home.
Challenges in Cloud Security
1. Data Breaches
o What it is: When sensitive data like health records or bank details is stolen or
exposed due to human mistakes, weak security, or system flaws.
o Example: A hacker gets into a cloud system and steals personal health records.
2. Access Management Issues
o What it is: Making sure only authorized people can access important data.
o Impact: If access is not properly controlled, unauthorized users may see sensitive
information.
o Example: Only senior managers should view financial reports, but others may
gain access by mistake.
3. Data Encryption
o What it is: Encrypting data turns it into unreadable code to keep it safe.
o Impact: If data is not encrypted, it can be accessed by anyone during storage or
transfer.
o Example: A bank encrypts customer transactions to protect them from being
stolen.
4. Denial of Service (DoS/DDoS) Attacks
o What it is: Hackers overwhelm a cloud server with too much traffic, causing it to
slow down or crash.
o Example: A website goes offline because hackers flood it with fake traffic.
5. Advanced Persistent Threats (APTs)
o What it is: Hackers secretly access a system and steal data over a long period of
time.
o Example: Hackers steal financial data for months without being noticed.
Cloud Security Risks and Solutions
Cloud computing is becoming increasingly popular as companies use it to store, share, and
process data.
While cloud computing has many benefits like lower costs, faster work, and better productivity,
it also comes with security risks. Below are some common risks and their solutions explained
simply with examples.

Cloud Security Risks


1. Theft or Loss of Intellectual Property
 Problem: Sensitive company data can be stolen if employees unknowingly upload it to
unsecured cloud storage or if the storage doesn’t have strong security measures like
encryption.
 Example: An employee saves confidential project details on a public cloud without
encrypting it, and hackers steal the data.
 Solution: Encrypt all files and use multi-factor authentication for access.

2. Compliance Violations
 Problem: Organizations may unknowingly violate rules set by laws like HIPAA (for
patient data) or FERPA (for student records) by improperly storing sensitive information
in the cloud.
 Example: A hospital stores patient records on a cloud service that does not comply with
healthcare privacy regulations.
 Solution: Use cloud services certified to meet regulatory standards and educate
employees about data compliance rules.

3. Malware Attacks
 Problem: Hackers use creative methods like uploading infected files or links to spread
malware through cloud services.
 Example: A hacker uploads a virus-hidden video to a shared cloud folder, and employees
accidentally download it.
 Solution: Use antivirus tools, scan all uploaded files, and train employees to avoid
suspicious links or files.

4. End-User Control (Insider Threats)


 Problem: Employees may misuse cloud services to leak or misuse company data.
 Example: A salesperson leaving the company downloads customer lists from the cloud to
take to a competitor.
 Solution: Monitor employee activity, restrict access to sensitive data, and disable access
when employees leave.

5. Denial of Service (DoS) Attacks


 Problem: Hackers flood servers with fake traffic, making cloud services unavailable to
legitimate users.
 Example: A retail website hosted on the cloud is bombarded with fake requests during a
sale, preventing real customers from shopping.
 Solution: Use firewalls, traffic filters, and cloud providers with DoS protection services.

6. Insecure APIs
 Problem: APIs allow developers to customize cloud services but can create
vulnerabilities if not secured.
 Example: An insecure API for a company’s app allows hackers to bypass security and
access sensitive customer data.
 Solution: Regularly test APIs for vulnerabilities and use secure authentication methods.

7. Data Loss
 Problem: Data can be lost due to natural disasters, cyberattacks, or accidental deletion by
the provider.
 Example: A cloud provider loses customer data during a power outage caused by
lightning strikes.
 Solution: Regularly back up data to multiple locations and review the provider’s disaster
recovery plan.

8. Loss of Customer Trust


 Problem: Data breaches lead to customers losing confidence in the company.
 Example: A breach exposing customer credit card details causes people to stop using the
company’s services.
 Solution: Invest in strong security measures and be transparent with customers about
how their data is protected.

Simple Solutions to Manage Cloud Security


1. Governance and Compliance
o What it means: Create rules and policies that explain how data should be handled
and who is responsible for what in the cloud.
o Example: A company writes a policy that only managers can access certain files,
and everyone must follow the privacy rules when using cloud services.

2. Auditing and Business Procedures


o What it means: Regularly check cloud systems to look for problems like
malware or violations of security rules.
o Example: A company does a monthly check on cloud data and reviews logs to
ensure no one is accessing the files they shouldn’t.
Key areas to check:
o Security features of the cloud service.
o Access logs to track who is using the system.
o Cloud provider’s internal controls to ensure they are following security standards.

3. Identity and Access Management


o What it means: Control who can access what data in the cloud and make sure
only authorized people can see sensitive information.
o Example: A company requires employees to log in with a password and a
fingerprint scan before accessing sensitive customer data.

4. Security Training for Employees


o What it means: Teach employees about cloud security risks and the best ways to
protect data from hackers or accidental leaks.
o Example: The company holds training sessions where employees learn how to
spot phishing emails and avoid uploading sensitive data to unsecured cloud
services.
5. Backup and Disaster Recovery Plans
o What it means: Regularly save copies of important data and have a plan to
recover data in case something goes wrong, like a system failure or a cyberattack.
o Example: A company saves daily backups of its customer database and has a plan
to restore it in case the cloud service goes down or is hacked.

6. Advanced Security Measures


o What it means: Use extra tools like firewalls, encryption, and special systems
that can detect attacks to protect cloud data.
o Example: The company installs a firewall to block unauthorized access, encrypts
sensitive files, and uses software to monitor for signs of hacking attempts.
Other key measures:
o Secure APIs to prevent unauthorized apps from accessing data.
o Limit data access to only those who really need it.

By following these steps, a company can keep its cloud data secure and protect it from various
risks.
What is SaaS Security?
SaaS Security refers to the practices, policies, and technologies used to protect user data,
privacy, and corporate information in cloud-based Software-as-a-Service (SaaS)
applications.
These applications are typically accessed via subscription and are used over the internet, storing
sensitive data that can be vulnerable to unauthorized access, breaches, or loss.
SaaS security ensures that data is protected against threats, remains compliant with regulatory
standards, and can be restored in case of incidents.
Since SaaS applications are typically hosted externally (often by third-party providers), security
is a major concern for both users and service providers
Key Aspects of SaaS Security:
 Privileged User Access
Ensuring only authorized users can access sensitive data and systems, especially those
with special privileges like admins.
Example: Admins have full access, but their actions are monitored and require strong
authentication to prevent misuse.
 Regulatory Compliance
Making sure the SaaS provider follows the necessary security rules and allows audits to
check compliance.
Example: A company should confirm that the provider has certifications like ISO 27001
to meet global security standards.
 Data Location
Checking where data is stored to ensure it follows legal and regulatory rules.
Example: A company in the EU must store data according to GDPR, either in the EU or
a country with similar protection laws.
 Data Segregation
Keeping data from different customers separate and safe, especially in shared cloud
environments.
Example: The provider ensures that one customer’s data is encrypted and cannot be
accessed by another.
 Recovery
Having a clear plan for recovering data in case of system failures, corruption, or security
breaches.
Example: The provider provides a recovery plan with steps to restore data and fix the
issue after a breach or attack.
 Investigative Support
Ensuring the provider can help investigate security problems, like breaches or data leaks.
Example: If a breach happens, the provider helps find out how it occurred, traces the
affected data, and helps reduce the damage.
 Long-Term Viability
Making sure data can be retrieved if the provider shuts down or faces issues.
Example: If the provider goes out of business, they should offer a way to export data in a
format like CSV or JSON for easy transfer to another platform.
In summary, SaaS security requires both providers and customers to work together to ensure the
confidentiality, integrity, and availability of data and services in the cloud

Security Monitoring and Incident Response


Definition:
 Security Monitoring is the continuous process of tracking systems, networks, and
applications to detect and respond to security threats in real-time.
 Incident Response is a structured approach to handling and recovering from security
breaches or cyberattacks.
Examples:
 Security Monitoring Example: If an employee’s login credentials are stolen and large
amounts of data are accessed, the system detects this unusual activity and alerts the
security team.
 Incident Response Example: If a company’s website is hacked, the response team
identifies the breach, removes the hacker, restores data, and improves security measures.
Purpose:
The purpose of security monitoring is to detect and respond to threats early, preventing major
security breaches.
The purpose of incident response is to minimize damage, recover quickly, and strengthen
security to prevent future attacks.
Security Architecture Design
Introduction
Cloud computing allows businesses to store and manage data over the internet, but with this
comes the need for strong security to protect sensitive information.
Security architecture design to a strategic framework that defines the policies, controls, and
technologies used to protect cloud systems and data from unauthorized access, cyber threats, and
disruptions.
A good security system includes rules, technology, and processes to stop security threats. To
build a strong security system, we must consider some important processes.

Important Security Processes


1. Authentication – Checking if a user is real.
Example: Entering a username and password to log into an account.
2. Authorization – Giving permission based on roles.
Example: Employees can check emails, but only managers can see salary details.
3. Access Control – Blocking unauthorized people from entering.
Example: Only IT staff can change server settings.
4. Confidentiality – Keeping data private.
Example: Messages are encrypted before sending to keep them secret.
5. Integrity – Making sure data is correct and unchanged.
Example: A bank checks if a transaction has been tampered with.
6. Nonrepudiation – Making sure no one denies their actions.
Example: A digital signature proves who sent an important email.
By following these steps, organizations can keep their systems safe, prevent cyber-attacks,
and protect user data.

Security Boundaries
In cloud computing, Security Boundaries define the division of responsibility between the
service provider (cloud provider) and the customer (company using the cloud).
The Cloud Security Alliance (CSA) Stack Model helps clarify these boundaries by showing
how responsibilities change depending on the cloud service model.
Key Points to the CSA Model:
1. IaaS (Infrastructure as a Service): This is the most basic level. The cloud provider
offers infrastructure like virtual machines and storage, but the customer is responsible for
securing the software, operating systems, and applications they run on that infrastructure.
2. PaaS (Platform as a Service): This model provides a platform for developing
applications. The provider secures the platform and operating system, but the customer is
still responsible for the applications they build on it.
3. SaaS (Software as a Service): Here, the cloud provider delivers fully functional software
applications (like email or CRM). The provider takes care of most of the security aspects,
and the customer primarily manages user access.
As you move from IaaS to SaaS, the provider takes on more responsibility for security, leaving
the customer with fewer security tasks.
Example:
 IaaS: The cloud provider ensures the physical hardware and the network are secure. The
customer must secure the virtual machines and any applications they run on top of that
infrastructure.
 SaaS: The provider secures the entire application, and the customer only manages who
can access it.

Vulnerability Assessment
What is Vulnerability Assessment?
Vulnerability Assessment is a process of identifying, analyzing and mitigating weaknesses in a
company’s systems or networks.
These weaknesses could be used by hackers to steal data or damage systems.
By finding and fixing these problems early, companies can prevent cyber-attacks.

Key Points of Vulnerability Assessment


1. Classification of Network Assets – Identifying and organizing network resources to
understand which areas need the most protection.
Example: A company lists all its servers, computers, and databases to check which ones
need stronger security.
2. Scanning and Analysis:
Use tools to scan for security problems like outdated software, weak passwords, and
wrong settings. Then, rank them based on how risky they are.
3. Risk Mitigation – Fixing security weaknesses before hackers can use them.
Example: If a software has a security flaw, updating it (patching) can fix the issue.
4. Continuous Monitoring – Regularly checking for new security problems.
Example: Running security scans every month to detect any new threats.

Vulnerability Assessment in the Cloud


 It should be done regularly to ensure cloud security.
 The cloud provider and customer must agree on security testing schedules.
 Companies should test before and after moving their data to the cloud.

Example
A company stores customer data in the cloud. During a security check, they find that their
database has a security flaw that could let hackers steal customer information.
To fix this, they apply a security update (patch), making their system safer.
By performing vulnerability assessments, businesses can stay ahead of cyber threats and
protect their data from hackers.
Data Security
Data security in cloud computing means protecting data stored, processed, and shared on cloud
services from hackers, data leaks, or loss.
Since cloud computing stores data on third-party servers instead of a company’s own computers,
keeping data safe is very important.
How Data Storage Has Changed
1. Old Method (On-Premise Storage):
 Companies stored data on their own physical servers.
 They could protect data by keeping it on separate servers.
2. Cloud Storage (Third-Party Servers):
 Data is stored on servers owned by a cloud provider.
 Companies still control their data, but they don’t own the physical servers.
Ways to Keep Cloud Data Secure
1. Avoid Storing Sensitive Data in the Cloud
o Risk: Storing sensitive information in the cloud can expose it to unauthorized
access or breaches.
o Solution: If possible, do not store personal or financial information in the cloud.
o Example: A company keeps customer payment details on its own secure servers.
2. Read the User Agreement
o Risk: If you don't understand your cloud provider's security policies, you could
unknowingly expose your data to risks.
o Solution: Always check what security measures the cloud provider offers.
o Example: A company checks if the provider encrypts data and shares it with
others.
3. Use Strong Passwords
o Risk: Weak passwords make cloud accounts vulnerable to hacking and
unauthorized access.
o Solution: Choose complex passwords with letters, numbers, and symbols.
o Example: A company uses two-factor authentication (2FA), requiring both a
password and a phone verification code.
4. Encrypt Your Data
o Solution: Encryption turns data into unreadable code that only authorized users
can decode.
o Example: A company encrypts files before uploading them to the cloud.
5. Use Encrypted Cloud Services
o Risk: Without encryption, data is vulnerable to unauthorized access during
transfer or storage.
o Solution: Make sure the cloud provider encrypts your data when it’s stored and
when it’s being transferred.
By following these security practices, organizations can protect their data from hackers and
ensure privacy in cloud computing.
Application Security
Application security refers to the process of protecting software applications from cyber threats,
vulnerabilities, and attacks.
This is done by securing the app’s code, design, and data through testing, monitoring, and
updates.
The goal of application security is to safeguard sensitive data and ensure the software remains
secure, reliable.
For example, a company that provides software services (SaaS) might test its systems regularly
to prevent attacks like SQL injection, where hackers try to steal or change data in a database.
Cloud applications are more exposed to online threats, so businesses need to be aware of the
following risks:
Common Security Risks & Solutions
1. Unauthorized Access or Cyberattacks
o If data is not properly encrypted, hackers can steal it.
o Solution: Always encrypt sensitive data when storing it (at rest) and when
sending it (in transit).
2. Trusting Third-Party Cloud Providers
o Trusting third-party cloud providers can cause problems like poor control over
security, privacy issues, weak security measures, data breaches, shared resources
risks.
o Solution: Use extra security tools like firewalls and intrusion detection systems
for protection.
3. Shared Resources (Multitenancy)
o Cloud providers store data from multiple customers on shared servers, which can
create security risks.
o Solution: Choose a provider that ensures strong data isolation to prevent
unauthorized access.
4. Weak APIs (Application Programming Interfaces)
o Unsecured APIs can let hackers break into an application.
o Solution: Use authentication and authorization to control API access.
5. Denial of Service (DoS) Attacks
o Hackers can send too many requests to a cloud app, causing it to crash.
o Solution: Use Web Application Firewalls (WAF) and rate-limiting to block
these attacks.
By following these security measures, businesses can protect their cloud applications and keep
their data safe.
Virtual Machine Security
A Virtual Machine (VM) is like a separate computer running inside a real (physical) computer.
It allows different operating systems and applications to run on the same hardware while staying
isolated from each other.
Even though multiple VMs share the same physical resources like CPU, memory, and storage,
they are kept separate to ensure security.
How Virtual Machine Isolation Works
 Each VM has its own private space, even though it runs on shared hardware.
 Example: If two VMs (VM1 and VM2) are on the same server, VM1 cannot access
VM2’s resources (memory, CPU, storage).
Virtual Machine Isolation in the Cloud
 Security measures prevent data leaks between VMs.
 Cloud providers use firewalls, intrusion detection, and log monitoring to protect each
VM.
Key Security Measures for Virtual Machines
1. Firewalls
 A firewall acts as a security filter, allowing only safe network traffic while blocking
harmful connections.
 Example: If one VM is a web server and another is a database server, firewalls can
ensure that only web traffic (e.g., HTTP) reaches the web server and only database
queries (e.g., SQL) reach the database server.
2. Intrusion Detection and Prevention (IDP)
 IDP tools monitor VMs for suspicious activities, such as unauthorized access attempts or
cyberattacks.
 If an attacker tries to exploit a VM, IDP can detect and block the attack before it causes
harm.
3. Integrity Monitoring
 This process ensures that a VM’s files and settings remain unchanged unless authorized.
 Example: If a hacker tries to modify system files to install malware, integrity monitoring
will alert administrators.
4. Log Inspection
 Logs record system activities such as login attempts and network access. Regular
inspection of these logs helps detect security threats.
 Example: If multiple failed login attempts come from an unknown IP address, log
analysis can help identify a potential attack.
By implementing these security measures, organizations can keep their virtual machines
secure, protecting them from cyber threats while maintaining performance and efficiency.
Identity Management and Access Control (IAM)
Identity Management and access control is essential for controlling who can access cloud
resources and what actions they can perform.
IAM ensures that only authorized users or systems can interact with resources such as virtual
machines, storage, and databases.
Identity Management
Identity refers to unique attributes that distinguish a person or user.
Identity Management (IdM) is the process of managing user accounts, assigning roles,
controlling access, and ensuring secure authentication.
For example, a company manages employee accounts and access to resources, and removes
accounts when employees leave to prevent unauthorized access.
Authentication Factors in Cloud Computing:
Authentication factors are used to verify a user's identity and ensure they are who they claim to
be.
 Something the user knows: This is typically a username and password.
Example: A user logs into their AWS account using their password, which the platform
checks to verify their identity.
 Something the user has: This includes authentication methods like one-time codes from
apps or hardware tokens.
Example: A user enters a one-time password received on their phone to access their AWS
account.
 Something the user is: This involves biometric data like fingerprints or facial
recognition for authentication.
Example: A user uses their fingerprint or facial recognition to access cloud services on
their mobile device.

Access Control in Cloud Computing:


Access Control not only defines who can access which resources but also the level of
permissions granted to each user or system.
Access control keeps cloud resources secure by blocking unauthorized access to data, storage,
and infrastructure.
Types of Access Control Methods
1. Role-Based Access Control (RBAC)
o How it works: Access is granted based on a person's job role. Permissions are
linked to specific roles, and users can only access resources they need for their
job.
o Example: An admin can manage all files, but an employee can only view them.
2. Mandatory Access Control (MAC)
o How it works: Access is controlled by strict security policies, and users need
specific clearances to access data. The user cannot change these policies.
o Example: In military settings, only people with “Top Secret” clearance can
access highly sensitive documents.
3. Discretionary Access Control (DAC)
o How it works: The owner of a resource decides who can access their files or data.
The owner can assign permissions to others.
o Example: If you create a document, you can decide who can view or edit it.
4. Attribute-Based Access Control (ABAC)
o How it works: Access is based on conditions like role, location, or time. It’s
flexible and adapts based on multiple factors.
o Example: Employees can only access certain systems during work hours or when
in the office.

You might also like