SlideShare a Scribd company logo
11
Cloud Security
Keep your data and services secured in the Cloud
Baruch Menahem, CISSP, CCSK
InfoSec Strategy Manager, Comsec
2
2
Challenges to Cloud
• Lack of control over resources:
Concerns related to lack of physical control, data and applications.
• Less security visibility and control capabilities:
The IT is not able to dictate things such as version control, patch
frequency and code reviews. Therefore they will be forced to update their
development, QA, administration and operations processes.
• Internet dependency - performance and availability:
Cloud computing services relies fully on the availability, speed, quality and
performance of the internet.
• Difficult to migrate:
It is not very easy to move the applications from an enterprise to cloud
computing environment or even within different cloud computing platforms.
3
3
Critical Threats to Cloud Security
Cloud Security Alliance (CSA) has identified 8 critical threats to cloud
security:
1. Enterprise cloud services are not enterprise-ready
95% of cloud services used in the average enterprise are not enterprise-ready
from a security standpoint.
2. Data breaches
Due to the huge amount of data stored on cloud servers, providers are an
increasingly attractive target to cyber criminals.
3. Lack of encryption
Encryption is one of the most basic methods for securing data, but many
enterprises make the mistake of failing to encrypt sensitive data in the cloud.
4
4
Critical Threats to Cloud Security
4. Weak authentication and identity management
A lack of proper authentication and identity management is responsible for
data breaches within organizations. Cloud provider are usually support
2FA/MFA mechanisms but unfortunately, clients are not making use of it.
5. Insider threat
An insider (a former employee, system administrator, contractor, or business
partner) could destroy infrastructure or permanently delete data. Systems that
depend entirely on cloud service providers for security are at greatest risk.
6. Account Hijacking
Techniques like phishing and fraud are well known cyber threats, but cloud
adds a new dimension to these threats as successful attackers are able to
eavesdrop on activities and modify data.
5
5
Critical Threats to Cloud Security
7. Lacking due diligence
Due diligence is the process of evaluating cloud vendors to ensure that best
practices are in place. Part of this process includes verifying whether the
cloud provider can offer adequate cloud security controls and meet the level
of service expected by an enterprise.
8. DDoS attacks
DDoS attacks often affect availability and for enterprises that run critical
infrastructure in the cloud, this can be debilitating and systems may slow or
simply time out.
DDoS attacks also consume large amounts of processing power – a bill that
the cloud customer (you) will have to pay.
6
6
Critical Threats to Cloud Security
In order to reduce the risk of using cloud services, the following should
be considered:
• Use of encryption to protect data at rest as well as in transit.
• Manage encryption key via HSM system.
• Use MFA for accessing cloud resources.
• Create and enforce dedicate security policy for cloud usage.
• Monitor cloud accounts to make sure that every transaction can be traced
back to a human owner.
• Review accreditations and standards gained by cloud providers, including
ISO 9001, DCS, PCI and HIPAA.
• Use dedicated security systems such as IPS, WAF and DDoS protection to
protect against external attacks.
• Conduct security assessments and penetration tests.
Remediation
7
7
Cloud Trends
Centrally manage security from a private cloud
Using a private cloud (either on premise or
external) to centrally manage endpoint
security.
Especially useful when working with
distributed networks (multiple branches /
sites) or when distributed users are required
to be protected according to the standard
used in the organization.
Can also reduce maintenance and licensing
cost (managed by the cloud provider).
8
8
Cloud Trends
Using the cloud as a front-end DMZ network
Using the cloud as the internet gateway
of the corporate network to transfer the
handling of network attacks from the
internet to the cloud provider.
The cloud is used as a network
extension (the Front-End DMZ) of the on
premise network and used to host all
internet facing services, while the on
premise external network becomes the
mediating layer (Back-End DMZ) which
connects the two networks (by VPN /
Direct Line connection).
This implementation can also reduce
cost to the organization by using
managed cloud security services.
9
9
Cloud Trends
Implementing a Cloud Stack
Enjoy cloud benefits (e.g. scalability,
flexibility, efficiency, cost and security)
without relying on cloud vendors, by
building an on premise private cloud
using OpenStack, Azure Stack or any
other cloud platform.
Very useful for organizations that can
not use cloud services due to regulatory
and security constraints that do not
allow them to store sensitive information
in the cloud or to transfer core systems
to the cloud.
10
10
Cloud Trends
Private Cloud - Azure Stack
11
11
Cloud Trends
Private Cloud - OpenStack
12
12
Sources
• ComparetheCloud.com: 8 Public Cloud Security Threats to Enterprises in 2017
• Azure Stack: An extension of Azure
• Azure Stack datasheet
13
+972 (0)3-9234277
Baruchm@comsecglobal.com
Yegia Kapayim St. 21D, P.O. Box 3474,
Petach-Tikva, Israel, 49130
www.comsecglobal.com
Innovation, knowledge & Experience
To keep you ahead of the
curve
Contact Us

More Related Content

PPTX
Rik Ferguson
PPTX
Can Cloud Solutions Transform Network Security
PPT
Cloud Security
PPTX
cloud Resilience
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
PPTX
Cloud Security_ Unit 4
PPTX
Cloud Computing Security Threats and Responses
PDF
Microsegmentation for enterprise data centers
Rik Ferguson
Can Cloud Solutions Transform Network Security
Cloud Security
cloud Resilience
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Cloud Security_ Unit 4
Cloud Computing Security Threats and Responses
Microsegmentation for enterprise data centers

What's hot (19)

PPTX
Top 5 Cloud Security Threats in Healthcare
PDF
Csathreats.v1.0
PDF
Cloud Security Top Threats
PPTX
Cloud computing security
PDF
Disaster recovery glossary
PPTX
Software Security
PDF
Cloud Security Myths Vs Facts
PDF
Migrating to the Cloud: Lessons Learned from Federal Agencies
PDF
Top Application Security Threats
PDF
Threats and risks to cloud computing
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
PPT
Cloud security
PPTX
Cloud with Cyber Security
PDF
Data security in cloud environment
PPT
Data security in the cloud
PDF
Is it an internal affair
PPTX
VMware vRealize Network Insight 3.5 - Whats New
PPTX
Security on Cloud Computing
PPTX
Cloud Computing Security
Top 5 Cloud Security Threats in Healthcare
Csathreats.v1.0
Cloud Security Top Threats
Cloud computing security
Disaster recovery glossary
Software Security
Cloud Security Myths Vs Facts
Migrating to the Cloud: Lessons Learned from Federal Agencies
Top Application Security Threats
Threats and risks to cloud computing
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Cloud security
Cloud with Cyber Security
Data security in cloud environment
Data security in the cloud
Is it an internal affair
VMware vRealize Network Insight 3.5 - Whats New
Security on Cloud Computing
Cloud Computing Security
Ad

Similar to Cloud security risks (20)

PPTX
The Top Cloud Security Issues
PDF
Cloud Computing Security
PDF
Top 5 Cloud Security Threats in 2025 and Ways to Avoid Them
PPTX
Cloud Computing Security Essentials for beginners
PDF
Lecture27 cc-security2
PDF
Cloud Security - Kloudlearn
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PDF
Cyber Security in Cloud Computing: Challenges and Solutions
PPTX
Cloud-Architecture-Technology-Deovps-Eng
PDF
Cloud Security Network – Definition and Best Practices.pdf
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PPTX
Cloud Security: A matter of trust?
PPTX
9 Things You Need to Know Before Moving to the Cloud
PPTX
Practical Security for the Cloud
PDF
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
PPTX
Cloud Cmputing Security
POT
Automation alley day in the cloud presentation - formatted
PPTX
Cloud Security: Risks and Recommendations for New Entrants
PPTX
Cloud security: Risks and Rewards for New Entrants
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
The Top Cloud Security Issues
Cloud Computing Security
Top 5 Cloud Security Threats in 2025 and Ways to Avoid Them
Cloud Computing Security Essentials for beginners
Lecture27 cc-security2
Cloud Security - Kloudlearn
Cloud_security_v2_chpater_9_s_version.pdf
Cyber Security in Cloud Computing: Challenges and Solutions
Cloud-Architecture-Technology-Deovps-Eng
Cloud Security Network – Definition and Best Practices.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security: A matter of trust?
9 Things You Need to Know Before Moving to the Cloud
Practical Security for the Cloud
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Cloud Cmputing Security
Automation alley day in the cloud presentation - formatted
Cloud Security: Risks and Recommendations for New Entrants
Cloud security: Risks and Rewards for New Entrants
Cloud computing - Assessing the Security Risks - Jared Carstensen
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Cloud security risks

  • 1. 11 Cloud Security Keep your data and services secured in the Cloud Baruch Menahem, CISSP, CCSK InfoSec Strategy Manager, Comsec
  • 2. 2 2 Challenges to Cloud • Lack of control over resources: Concerns related to lack of physical control, data and applications. • Less security visibility and control capabilities: The IT is not able to dictate things such as version control, patch frequency and code reviews. Therefore they will be forced to update their development, QA, administration and operations processes. • Internet dependency - performance and availability: Cloud computing services relies fully on the availability, speed, quality and performance of the internet. • Difficult to migrate: It is not very easy to move the applications from an enterprise to cloud computing environment or even within different cloud computing platforms.
  • 3. 3 3 Critical Threats to Cloud Security Cloud Security Alliance (CSA) has identified 8 critical threats to cloud security: 1. Enterprise cloud services are not enterprise-ready 95% of cloud services used in the average enterprise are not enterprise-ready from a security standpoint. 2. Data breaches Due to the huge amount of data stored on cloud servers, providers are an increasingly attractive target to cyber criminals. 3. Lack of encryption Encryption is one of the most basic methods for securing data, but many enterprises make the mistake of failing to encrypt sensitive data in the cloud.
  • 4. 4 4 Critical Threats to Cloud Security 4. Weak authentication and identity management A lack of proper authentication and identity management is responsible for data breaches within organizations. Cloud provider are usually support 2FA/MFA mechanisms but unfortunately, clients are not making use of it. 5. Insider threat An insider (a former employee, system administrator, contractor, or business partner) could destroy infrastructure or permanently delete data. Systems that depend entirely on cloud service providers for security are at greatest risk. 6. Account Hijacking Techniques like phishing and fraud are well known cyber threats, but cloud adds a new dimension to these threats as successful attackers are able to eavesdrop on activities and modify data.
  • 5. 5 5 Critical Threats to Cloud Security 7. Lacking due diligence Due diligence is the process of evaluating cloud vendors to ensure that best practices are in place. Part of this process includes verifying whether the cloud provider can offer adequate cloud security controls and meet the level of service expected by an enterprise. 8. DDoS attacks DDoS attacks often affect availability and for enterprises that run critical infrastructure in the cloud, this can be debilitating and systems may slow or simply time out. DDoS attacks also consume large amounts of processing power – a bill that the cloud customer (you) will have to pay.
  • 6. 6 6 Critical Threats to Cloud Security In order to reduce the risk of using cloud services, the following should be considered: • Use of encryption to protect data at rest as well as in transit. • Manage encryption key via HSM system. • Use MFA for accessing cloud resources. • Create and enforce dedicate security policy for cloud usage. • Monitor cloud accounts to make sure that every transaction can be traced back to a human owner. • Review accreditations and standards gained by cloud providers, including ISO 9001, DCS, PCI and HIPAA. • Use dedicated security systems such as IPS, WAF and DDoS protection to protect against external attacks. • Conduct security assessments and penetration tests. Remediation
  • 7. 7 7 Cloud Trends Centrally manage security from a private cloud Using a private cloud (either on premise or external) to centrally manage endpoint security. Especially useful when working with distributed networks (multiple branches / sites) or when distributed users are required to be protected according to the standard used in the organization. Can also reduce maintenance and licensing cost (managed by the cloud provider).
  • 8. 8 8 Cloud Trends Using the cloud as a front-end DMZ network Using the cloud as the internet gateway of the corporate network to transfer the handling of network attacks from the internet to the cloud provider. The cloud is used as a network extension (the Front-End DMZ) of the on premise network and used to host all internet facing services, while the on premise external network becomes the mediating layer (Back-End DMZ) which connects the two networks (by VPN / Direct Line connection). This implementation can also reduce cost to the organization by using managed cloud security services.
  • 9. 9 9 Cloud Trends Implementing a Cloud Stack Enjoy cloud benefits (e.g. scalability, flexibility, efficiency, cost and security) without relying on cloud vendors, by building an on premise private cloud using OpenStack, Azure Stack or any other cloud platform. Very useful for organizations that can not use cloud services due to regulatory and security constraints that do not allow them to store sensitive information in the cloud or to transfer core systems to the cloud.
  • 12. 12 12 Sources • ComparetheCloud.com: 8 Public Cloud Security Threats to Enterprises in 2017 • Azure Stack: An extension of Azure • Azure Stack datasheet
  • 13. 13 +972 (0)3-9234277 Baruchm@comsecglobal.com Yegia Kapayim St. 21D, P.O. Box 3474, Petach-Tikva, Israel, 49130 www.comsecglobal.com Innovation, knowledge & Experience To keep you ahead of the curve Contact Us