SlideShare a Scribd company logo
5
Most read
6
Most read
7
Most read
Cloud Security-Unit 4
By Dr. M Zunnun Khan
What is Cloud Security?
 Formal definition - Cloud Security is using effective guardrails to ensure
company assets (data, application, infrastructure) using cloud services can
function as expected and respond to unexpected threats.
What is Cloud Security?
 Cloud security is a set of control-based safeguards and technology protection designed to protect resources stored online from
 leakage,
 theft,
 data loss.
 Protection encompasses cloud infrastructure, applications, and data from threats.
 Security applications operate as software in the cloud using a Software as a Service (SaaS) model.
 The umbrella of security in the cloud include:
 Data center security
 Access control
 Threat prevention
 Threat detection
 Threat mitigation
 Redundancy
 Legal compliance
 Cloud security policy
Benefits of a Cloud Security System?
 Cloud-based security systems benefit your business through:
 Protecting your business from threats
 Guarding against internal threats
 Preventing data loss
Security On the Cloud - Design
Principles
 Learn about the five best practice areas for security in the cloud:
 Identity and Access Management
 Detective Controls
 Infrastructure Protection
 Data Protection
 Incident Response
 The security pillar includes the ability to protect information, systems, and
assets while delivering business value through risk assessments and mitigation
strategies.
 The security pillar provides an overview of design principles, best practices,
and questions
Design Principles
 There are six design principles for security in the cloud:
 Implement a strong identity foundation:
 Implement the principle of least privilege and enforce separation of duties with
appropriate authorization for each interaction with your AWS resources.
 Centralize privilege management and reduce or even eliminate reliance on long
term credentials.
 Enable traceability:
 Monitor, alert, and audit actions and changes to your environment in real time.
 Integrate logs and metrics with systems to automatically respond and take action.
 Apply security at all layers:
 Rather than just focusing on protecting a single outer layer, apply a defense-in-depth approach with
other security controls.
 Apply to all layers, for example, edge network, virtual private cloud (VPC), subnet, load balancer,
every instance, operating system, and application.
 Automate security best practices:
 Automated software-based security mechanisms improve your ability to securely scale more rapidly
and cost effectively.
 Create secure architectures, including the implementation of controls that are defined and managed
as code in version-controlled templates.
 Protect data in transit and at rest:
 Classify your data into sensitivity levels and use mechanisms, such as encryption and tokenization
where appropriate.
 Reduce or eliminate direct human access to data to reduce risk of loss or modification.
 Prepare for security events:
 Prepare for an incident by having an incident management process that aligns to
your organizational requirements.
 Run incident response simulations and use tools with automation to increase your
speed for detection, investigation, and recovery.
CLOUD SECURITY REQUIREMENTS
 Storage and transmission, integrity, data consistency and availability, data backup
and recovery, security tag, key management, remote platform attestation,
authentication, access control
 Workload state integrity, guest OS integrity, zombie protection, denial of service
attacks, malicious resource exhaustion, platform attacks, platform attacks
 Auditability, non-reputability, access control
 Auditing, attack detection, access control, non-repudiation, privacy and integrity
 Physical security, data integrity, auditability, privacy
 Trust, privacy Data handling
 Individual-stakeholder’s security Not-proposed
 CSU experience and security Not-proposed
 Privacy, integrity and non-repudiation
 Integrity, access control and attack/harm detection
Six simple cloud security policies
 1. Secure cloud accounts and create groups
 Ensure that the root account is secure.
 To make daily administration easier and still adhere to cloud security policies,
create an administrative group and assign rights to that group, rather than the
individual.
 Create additional groups for fine-grained security that fits with your organization.
 Some users need read-only access, as for people or services that run reports.
 Other users should be able to do some ops tasks, such as restart VMs, but not be
able to modify VMs or their resources.
 Cloud providers make roles available to users, and the cloud admin should research
when and where to use them.
 Do not modify existing roles, as this is a recipe for disaster: Copy them instead.
 2. Check for free security upgrades
 Every major cloud provider allows and encourages the use of two-factor
authentication (2FA).
 There is no reason not to have 2FA on your cloud security checklist for new
deployments, as it increases protection from malicious login attempts.
 3. Restrict infrastructure access via firewalls
 A lot of companies use webscale external-facing infrastructure when they adopt
cloud.
 They can quickly protect private servers from external access.
 Check for firewall polices.
 If the cloud provider makes it available, use firewall software to restrict access to
the infrastructure.
 Only open ports when there's a valid reason to, and make closed ports part of your
cloud security policies by default.
 4. Tether the cloud
 Some cloud-based workloads only service clients or customers in one geographic
region.
 For these jobs, add an access restriction to the cloud security checklist:
 Keep access only within that region or even better, limited to specific IP addresses.
 This simple administrator decision slashes exposure to opportunistic hackers,
worms and other external threats.
 5. Replace passwords with keys
 Passwords are a liability: cumbersome, insecure and easy to forget. Every seasoned
administrator knows that Monday morning user-has-forgotten-password scenario
 Make public key infrastructure (PKI) part of your cloud security policies. PKI relies
on a public and private key to verify the identity of a user before exchanging data.
 Switch the cloud environment to PKI, and password stealing becomes a nonissue.
PKI also prevents brute force login attacks.
 Without the private key, no one will obtain access, barring a catastrophic PKI code
failure.
 While this might seem obvious, include a note on the cloud security checklist that
the private key should not be stored on the computer or laptop in use.
 Investigate vendors, such as YubiKey, that provide secure key management. For
some programs, the user has to touch the device.
 Cloud key management for multiple users is easier with these tools.
 6. Turn on auditing and system monitoring
 A lot of administrators don't think about monitoring until it's too late.
 Systems create logs in huge amounts.
 Use tools that capture, scan and process these logs into something useful for cloud
capacity planning, audits, troubleshooting and other operations.
 Log monitoring and analysis tools sum up all those warnings, alerts and information
messages into something useful.
 Again, many cloud providers do offer auditing tools, and there are many good tools
you can try with no commitment, such as Splunk and its visual tools.

More Related Content

PPTX
Cloud security
PDF
Fundamentals of IoT Security
PDF
Microsoft Azure Sentinel
PPTX
Navigating the Zero Trust Journey for Today's Everywhere Workplace
PDF
Endpoint Security
PPT
Software security
PPTX
AI and ML in Cybersecurity
PPTX
Cyber Security Best Practices
Cloud security
Fundamentals of IoT Security
Microsoft Azure Sentinel
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Endpoint Security
Software security
AI and ML in Cybersecurity
Cyber Security Best Practices

What's hot (20)

PPT
Cloud Security
PPTX
SOC and SIEM.pptx
PPTX
Identity and Access Management (IAM)
PDF
Stopping zero day threats
PPTX
Insight into SOAR
PPTX
Cyber Security in AI (Artificial Intelligence)
PPT
The information security audit
PPTX
Splunk Phantom SOAR Roundtable
PDF
Security in the Internet of Things
PDF
MITRE ATT&CK Framework
PPTX
Identity & access management
PDF
IBM Infosphere Guardium - Database Security
PDF
NIST cybersecurity framework
PPTX
SEIM-Microsoft Sentinel.pptx
PPTX
Network defenses
PDF
Secure by Design - Security Design Principles for the Rest of Us
PPTX
Hybrid Cloud and Its Implementation
PPTX
Application Virtualization
PDF
Cloud computing
PPTX
Cloud computing and Cloud security fundamentals
Cloud Security
SOC and SIEM.pptx
Identity and Access Management (IAM)
Stopping zero day threats
Insight into SOAR
Cyber Security in AI (Artificial Intelligence)
The information security audit
Splunk Phantom SOAR Roundtable
Security in the Internet of Things
MITRE ATT&CK Framework
Identity & access management
IBM Infosphere Guardium - Database Security
NIST cybersecurity framework
SEIM-Microsoft Sentinel.pptx
Network defenses
Secure by Design - Security Design Principles for the Rest of Us
Hybrid Cloud and Its Implementation
Application Virtualization
Cloud computing
Cloud computing and Cloud security fundamentals
Ad

Similar to Cloud Security_ Unit 4 (20)

PPTX
Cloud-Architecture-Technology-Deovps-Eng
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PDF
Cloud Security Network – Definition and Best Practices.pdf
PDF
Cyber Security in Cloud Computing: Challenges and Solutions
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PPTX
Practical Security for the Cloud
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PDF
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
PPTX
Cloud_security.pptx
DOCX
How to implement cloud computing security
PDF
Cloud Security Risks Challenges and Preventive Solutions - DigitDefence
PDF
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
PPTX
GA-CSD4007.pptx
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
PDF
How We Protect Our Business in the Cloud (The Smart Way)
PDF
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
PDF
Top 20 Cloud Security Professional Interview Questions and Answers
PDF
Ready to Ace Your Cloud Security Interview.
PDF
Top 20 Cloud Security Professional Interview Q&A.pdf
PDF
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Cloud-Architecture-Technology-Deovps-Eng
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Cloud Security Network – Definition and Best Practices.pdf
Cyber Security in Cloud Computing: Challenges and Solutions
I am sharing 'Unit-2' with youuuuuu.PPTX
Practical Security for the Cloud
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
Cloud_security.pptx
How to implement cloud computing security
Cloud Security Risks Challenges and Preventive Solutions - DigitDefence
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
GA-CSD4007.pptx
18CSE442 Cloud Security Introduction SRM.pptx
How We Protect Our Business in the Cloud (The Smart Way)
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Top 20 Cloud Security Professional Interview Questions and Answers
Ready to Ace Your Cloud Security Interview.
Top 20 Cloud Security Professional Interview Q&A.pdf
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Ad

More from Integral university, India (18)

PPTX
Cloud resilience, provisioning
PPTX
Data and software privacy
PPTX
Unit5 Cloud Federation,
PPTX
PPTX
cloud Resilience
PPTX
Software Security
PPTX
Block Level and File Level
PPTX
Software Security
PPTX
Security threats
PPTX
Virtualization concepts in cloud computing
Cloud resilience, provisioning
Data and software privacy
Unit5 Cloud Federation,
cloud Resilience
Software Security
Block Level and File Level
Software Security
Security threats
Virtualization concepts in cloud computing

Recently uploaded (20)

PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Project quality management in manufacturing
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
web development for engineering and engineering
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
composite construction of structures.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Project quality management in manufacturing
bas. eng. economics group 4 presentation 1.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Geodesy 1.pptx...............................................
web development for engineering and engineering
Operating System & Kernel Study Guide-1 - converted.pdf
composite construction of structures.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
OOP with Java - Java Introduction (Basics)
CYBER-CRIMES AND SECURITY A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CH1 Production IntroductoryConcepts.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Cloud Security_ Unit 4

  • 1. Cloud Security-Unit 4 By Dr. M Zunnun Khan
  • 2. What is Cloud Security?  Formal definition - Cloud Security is using effective guardrails to ensure company assets (data, application, infrastructure) using cloud services can function as expected and respond to unexpected threats.
  • 3. What is Cloud Security?  Cloud security is a set of control-based safeguards and technology protection designed to protect resources stored online from  leakage,  theft,  data loss.  Protection encompasses cloud infrastructure, applications, and data from threats.  Security applications operate as software in the cloud using a Software as a Service (SaaS) model.  The umbrella of security in the cloud include:  Data center security  Access control  Threat prevention  Threat detection  Threat mitigation  Redundancy  Legal compliance  Cloud security policy
  • 4. Benefits of a Cloud Security System?  Cloud-based security systems benefit your business through:  Protecting your business from threats  Guarding against internal threats  Preventing data loss
  • 5. Security On the Cloud - Design Principles  Learn about the five best practice areas for security in the cloud:  Identity and Access Management  Detective Controls  Infrastructure Protection  Data Protection  Incident Response  The security pillar includes the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.  The security pillar provides an overview of design principles, best practices, and questions
  • 6. Design Principles  There are six design principles for security in the cloud:  Implement a strong identity foundation:  Implement the principle of least privilege and enforce separation of duties with appropriate authorization for each interaction with your AWS resources.  Centralize privilege management and reduce or even eliminate reliance on long term credentials.  Enable traceability:  Monitor, alert, and audit actions and changes to your environment in real time.  Integrate logs and metrics with systems to automatically respond and take action.
  • 7.  Apply security at all layers:  Rather than just focusing on protecting a single outer layer, apply a defense-in-depth approach with other security controls.  Apply to all layers, for example, edge network, virtual private cloud (VPC), subnet, load balancer, every instance, operating system, and application.  Automate security best practices:  Automated software-based security mechanisms improve your ability to securely scale more rapidly and cost effectively.  Create secure architectures, including the implementation of controls that are defined and managed as code in version-controlled templates.  Protect data in transit and at rest:  Classify your data into sensitivity levels and use mechanisms, such as encryption and tokenization where appropriate.  Reduce or eliminate direct human access to data to reduce risk of loss or modification.
  • 8.  Prepare for security events:  Prepare for an incident by having an incident management process that aligns to your organizational requirements.  Run incident response simulations and use tools with automation to increase your speed for detection, investigation, and recovery.
  • 9. CLOUD SECURITY REQUIREMENTS  Storage and transmission, integrity, data consistency and availability, data backup and recovery, security tag, key management, remote platform attestation, authentication, access control  Workload state integrity, guest OS integrity, zombie protection, denial of service attacks, malicious resource exhaustion, platform attacks, platform attacks  Auditability, non-reputability, access control  Auditing, attack detection, access control, non-repudiation, privacy and integrity  Physical security, data integrity, auditability, privacy  Trust, privacy Data handling  Individual-stakeholder’s security Not-proposed  CSU experience and security Not-proposed  Privacy, integrity and non-repudiation  Integrity, access control and attack/harm detection
  • 10. Six simple cloud security policies  1. Secure cloud accounts and create groups  Ensure that the root account is secure.  To make daily administration easier and still adhere to cloud security policies, create an administrative group and assign rights to that group, rather than the individual.  Create additional groups for fine-grained security that fits with your organization.  Some users need read-only access, as for people or services that run reports.  Other users should be able to do some ops tasks, such as restart VMs, but not be able to modify VMs or their resources.  Cloud providers make roles available to users, and the cloud admin should research when and where to use them.  Do not modify existing roles, as this is a recipe for disaster: Copy them instead.
  • 11.  2. Check for free security upgrades  Every major cloud provider allows and encourages the use of two-factor authentication (2FA).  There is no reason not to have 2FA on your cloud security checklist for new deployments, as it increases protection from malicious login attempts.  3. Restrict infrastructure access via firewalls  A lot of companies use webscale external-facing infrastructure when they adopt cloud.  They can quickly protect private servers from external access.  Check for firewall polices.  If the cloud provider makes it available, use firewall software to restrict access to the infrastructure.  Only open ports when there's a valid reason to, and make closed ports part of your cloud security policies by default.
  • 12.  4. Tether the cloud  Some cloud-based workloads only service clients or customers in one geographic region.  For these jobs, add an access restriction to the cloud security checklist:  Keep access only within that region or even better, limited to specific IP addresses.  This simple administrator decision slashes exposure to opportunistic hackers, worms and other external threats.
  • 13.  5. Replace passwords with keys  Passwords are a liability: cumbersome, insecure and easy to forget. Every seasoned administrator knows that Monday morning user-has-forgotten-password scenario  Make public key infrastructure (PKI) part of your cloud security policies. PKI relies on a public and private key to verify the identity of a user before exchanging data.  Switch the cloud environment to PKI, and password stealing becomes a nonissue. PKI also prevents brute force login attacks.  Without the private key, no one will obtain access, barring a catastrophic PKI code failure.  While this might seem obvious, include a note on the cloud security checklist that the private key should not be stored on the computer or laptop in use.  Investigate vendors, such as YubiKey, that provide secure key management. For some programs, the user has to touch the device.  Cloud key management for multiple users is easier with these tools.
  • 14.  6. Turn on auditing and system monitoring  A lot of administrators don't think about monitoring until it's too late.  Systems create logs in huge amounts.  Use tools that capture, scan and process these logs into something useful for cloud capacity planning, audits, troubleshooting and other operations.  Log monitoring and analysis tools sum up all those warnings, alerts and information messages into something useful.  Again, many cloud providers do offer auditing tools, and there are many good tools you can try with no commitment, such as Splunk and its visual tools.