SlideShare a Scribd company logo
CLOUD SECURITY
Nithin Raj
Rahul N
Cloud Computing
• Internet-based computing that provides shared processing resources
and data to computers and other devices on demand.
• Provide users and enterprises with various capabilities to store and
process their data in third-party data-centers.
• Availability of high-capacity networks, low-cost computers and
storage devices and hardware virtualization have led to a growth in
cloud computing.
• Advantages are high computing power, cheap cost of services, high
performance, scalability, accessibility and availability.
Service Models
• Infrastructure as a service (IaaS)
• Platform as a service (PaaS)
• Software as a service (SaaS)
Deployment models
• Private cloud
• Public cloud
• Hybrid cloud
Cloud Security
• It refers to a broad set of policies, technologies, and controls
deployed to protect data, applications, and the associated
infrastructure of cloud computing.
• Security issues fall into two categories : security issues faced by cloud
providers and security issues faced by their customers
Cloud Computing Threats
• Loss of governance : In a public cloud deployment, customers cede
control to the cloud provider over a number of issues that may affect
security.
• Responsibility ambiguity : Responsibility over aspects of security may
be split between the provider and the customer.
• Authentication and Authorization : Accessing cloud resources from
anywhere heightens the need for better authentication.
• Isolation failure : It covers the failure of mechanisms separating the
usage of storage, memory, routing and even reputation between
tenants.
• Compliance and legal risks : The cloud customer’s interest may be
lost if the cloud provider cannot provide evidence of their own
compliance with the relevant requirements.
• Handling of security incidents : If detection, reporting and
subsequent management of security breaches is not done, it may
have impact on customer.
• Data protection : Exposure or release of sensitive data as well as the
loss or unavailability of data.
• Business failure of the provider : Lead to unavailability of data and
application of customer over an extended period.
• Service unavailability : This could be caused by hardware, software or
communication network failures.
• Insecure or incomplete data deletion : The termination of a contract
with a provider may not result in deletion of the customer’s data.
Cloud Computing Security
• Ensure effective governance, risk and compliance processes exist
• Verify that agreement between the customer and the provider, along with
associated documents, contain all their requirements(i.e, applications and
data hosted are secured).
• Cloud service providers should notify about the occurrence of any breach of
their system, regardless of the parties or data directly impacted.
• Servers hosting customer data may be located in multiple data centers within
different jurisdictions. This influences the protection of personally identifiable
information (PII) and legal and jurisdictional authority access to this data.
• Audit operational & business processes
• Customers should expect to see a report of the cloud provider's operations by
independent auditors.
• Auditors may be employed by the customer or by the provider - but the key
element is that they should be independent.
• Audits should be carried out by appropriately skilled staff typically belonging
to an independent auditing organization.
• Manage people, roles and identities
• Two sets of people : employees of the provider – access to the customer’s
data and applications, and employees of the customer - perform operations
on the provider’s systems.
• Cloud providers must allow the customer to assign and manage the roles and
associated levels of authorization for each of their users in accordance with
their security policies.
• Ensure proper protection of data and information
• Data Confidentiality : Outsourced data is stored in a cloud and out of the
owners' direct control. Only authorized users can access the sensitive data
while others.
• Data Access Controllability : Legal users can be authorized by the owner to
access the data, while others can not access it without permissions.
• Data Integrity : Data should not be illegally tampered, improperly modified,
deliberately deleted, or maliciously fabricated. If so, the owner should be able
to detect the corruption or loss.
• Ensure cloud networks and connections are secure
• Provide tools to protect clients from one another, such as VPN, firewall,
hypervisor.
• Monitor for intrusion attempts using activity auditing and logging.
• Understand the security requirements of the exit process
• The provider must ensure that any copies of the data are permanently erased
from its environment, wherever they may have been stored.
• The exit process must allow the customer to retrieve their data in a suitably
secure form, backups must be retained for agreed periods before being
eliminated
Thank You

More Related Content

PPTX
Cloud security
PDF
Cloud Security - Security Aspects of Cloud Computing
PPTX
Cloud computing security issues and challenges
PPT
Cloud computing security
PPT
Cloud security
PPTX
Zero Trust Model
PPTX
Data security in cloud computing
PDF
Zero trust in a hybrid architecture
Cloud security
Cloud Security - Security Aspects of Cloud Computing
Cloud computing security issues and challenges
Cloud computing security
Cloud security
Zero Trust Model
Data security in cloud computing
Zero trust in a hybrid architecture

What's hot (20)

PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Cloud security
PPT
Security Issues of Cloud Computing
PDF
Data Leakage Prevention (DLP)
PPSX
Cloud computing
PDF
Cloud Security: A New Perspective
PDF
Cloud security
PPTX
Network security
PPTX
Data Loss Prevention
PPT
Cloud Security
PPTX
Cloud security
PPTX
Cloud Security
PPT
CLOUD COMPUTING AND STORAGE
PPTX
Cloud Computing Security
PPTX
Cloud Encryption
PPTX
Cloud security and security architecture
PPT
Cloud Computing Basics
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Introduction to Network Security
PPTX
Data Leakage Prevention
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Cloud security
Security Issues of Cloud Computing
Data Leakage Prevention (DLP)
Cloud computing
Cloud Security: A New Perspective
Cloud security
Network security
Data Loss Prevention
Cloud Security
Cloud security
Cloud Security
CLOUD COMPUTING AND STORAGE
Cloud Computing Security
Cloud Encryption
Cloud security and security architecture
Cloud Computing Basics
Cybersecurity 140713064844-phpapp01 (1)-converted
Introduction to Network Security
Data Leakage Prevention
Ad

Viewers also liked (20)

PPTX
Cloud security ppt
PPT
Attaining data security in cloud computing
PDF
Enhancing Cloud Computing Security for Data Sharing Within Group Members
PPTX
Ensuring data storage security in cloud computing
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PPTX
Data storage security in cloud computing
DOCX
CLOUD CPOMPUTING SECURITY
PPT
Cloud Computing & Security
PDF
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PPTX
Working in the Cloud: An Overview
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPT
Cloud Computing - Benefits and Risks
PPTX
Security in Cloud Computing
PDF
Dissertation on MF
PPTX
Green cloud computing
PPTX
Mobile Cloud Computing Challenges and Security
PPTX
I'm Cloud Confused!
PPT
Cloud Computing Security Issues
PPTX
Cloud computing and data security
Cloud security ppt
Attaining data security in cloud computing
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Ensuring data storage security in cloud computing
Enhancing Data Storage Security in Cloud Computing Through Steganography
Data storage security in cloud computing
CLOUD CPOMPUTING SECURITY
Cloud Computing & Security
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Ensuring data security in cloud computing. - Anusha Tuke
Working in the Cloud: An Overview
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing - Benefits and Risks
Security in Cloud Computing
Dissertation on MF
Green cloud computing
Mobile Cloud Computing Challenges and Security
I'm Cloud Confused!
Cloud Computing Security Issues
Cloud computing and data security
Ad

Similar to Cloud Computing Security (20)

PPTX
Computer security concepts
PPTX
Database systems and cloud computing.pptx
PDF
Software Defined Networking in the ATMOSPHERE project
PPTX
Cloud Security_Module_1_Module_2_3_4.pptx
PPT
Cloud security
PDF
Lecture27 cc-security2
PPT
Securing Apps & Data in the Cloud by Spyders & Netskope
PPTX
Chapter_5_Security_CC.pptx
PPT
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
PPTX
Cloud Security: A matter of trust?
PPT
Cloud Computing Legal Risks And Best Practices
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PDF
Cloud Security
PDF
Cloud security issues and concerns
PPT
Risks and Benefits of Cloud Computing
PDF
Logical Network Perimeter in Cloud Computing
PDF
Cloud Security
PDF
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
PPTX
40369A Microsoft Cloud Fundamentals - Chapter 1
Computer security concepts
Database systems and cloud computing.pptx
Software Defined Networking in the ATMOSPHERE project
Cloud Security_Module_1_Module_2_3_4.pptx
Cloud security
Lecture27 cc-security2
Securing Apps & Data in the Cloud by Spyders & Netskope
Chapter_5_Security_CC.pptx
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Cloud Security: A matter of trust?
Cloud Computing Legal Risks And Best Practices
28_Security-Privacy-inxssudusd_Cloud.ppt
28_Security-Privacy-in_Cloud_AND_real.ppt
Cloud Security
Cloud security issues and concerns
Risks and Benefits of Cloud Computing
Logical Network Perimeter in Cloud Computing
Cloud Security
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
40369A Microsoft Cloud Fundamentals - Chapter 1

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced IT Governance
PDF
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Advanced IT Governance
Electronic commerce courselecture one. Pdf

Cloud Computing Security

  • 2. Cloud Computing • Internet-based computing that provides shared processing resources and data to computers and other devices on demand. • Provide users and enterprises with various capabilities to store and process their data in third-party data-centers. • Availability of high-capacity networks, low-cost computers and storage devices and hardware virtualization have led to a growth in cloud computing. • Advantages are high computing power, cheap cost of services, high performance, scalability, accessibility and availability.
  • 3. Service Models • Infrastructure as a service (IaaS) • Platform as a service (PaaS) • Software as a service (SaaS)
  • 4. Deployment models • Private cloud • Public cloud • Hybrid cloud
  • 5. Cloud Security • It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. • Security issues fall into two categories : security issues faced by cloud providers and security issues faced by their customers
  • 6. Cloud Computing Threats • Loss of governance : In a public cloud deployment, customers cede control to the cloud provider over a number of issues that may affect security. • Responsibility ambiguity : Responsibility over aspects of security may be split between the provider and the customer. • Authentication and Authorization : Accessing cloud resources from anywhere heightens the need for better authentication. • Isolation failure : It covers the failure of mechanisms separating the usage of storage, memory, routing and even reputation between tenants.
  • 7. • Compliance and legal risks : The cloud customer’s interest may be lost if the cloud provider cannot provide evidence of their own compliance with the relevant requirements. • Handling of security incidents : If detection, reporting and subsequent management of security breaches is not done, it may have impact on customer. • Data protection : Exposure or release of sensitive data as well as the loss or unavailability of data. • Business failure of the provider : Lead to unavailability of data and application of customer over an extended period. • Service unavailability : This could be caused by hardware, software or communication network failures. • Insecure or incomplete data deletion : The termination of a contract with a provider may not result in deletion of the customer’s data.
  • 8. Cloud Computing Security • Ensure effective governance, risk and compliance processes exist • Verify that agreement between the customer and the provider, along with associated documents, contain all their requirements(i.e, applications and data hosted are secured). • Cloud service providers should notify about the occurrence of any breach of their system, regardless of the parties or data directly impacted. • Servers hosting customer data may be located in multiple data centers within different jurisdictions. This influences the protection of personally identifiable information (PII) and legal and jurisdictional authority access to this data.
  • 9. • Audit operational & business processes • Customers should expect to see a report of the cloud provider's operations by independent auditors. • Auditors may be employed by the customer or by the provider - but the key element is that they should be independent. • Audits should be carried out by appropriately skilled staff typically belonging to an independent auditing organization. • Manage people, roles and identities • Two sets of people : employees of the provider – access to the customer’s data and applications, and employees of the customer - perform operations on the provider’s systems. • Cloud providers must allow the customer to assign and manage the roles and associated levels of authorization for each of their users in accordance with their security policies.
  • 10. • Ensure proper protection of data and information • Data Confidentiality : Outsourced data is stored in a cloud and out of the owners' direct control. Only authorized users can access the sensitive data while others. • Data Access Controllability : Legal users can be authorized by the owner to access the data, while others can not access it without permissions. • Data Integrity : Data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If so, the owner should be able to detect the corruption or loss. • Ensure cloud networks and connections are secure • Provide tools to protect clients from one another, such as VPN, firewall, hypervisor. • Monitor for intrusion attempts using activity auditing and logging.
  • 11. • Understand the security requirements of the exit process • The provider must ensure that any copies of the data are permanently erased from its environment, wherever they may have been stored. • The exit process must allow the customer to retrieve their data in a suitably secure form, backups must be retained for agreed periods before being eliminated