SlideShare a Scribd company logo
Isolation of users/VMs from each
other.
How the cloud provider can provide
this?
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
G.Nagarajan
Assistant Professor
Galgotias University, Greater Noida, UP
What is a virtual machine?
• A virtual machine (VM) is a software-based computer
that exists within another computer’s operating system,
often used for the purposes of testing, backing up data,
or running SaaS applications.
• A virtual machine is a virtual representation, or
emulation, of a physical computer. They are often
referred to as a guest while the physical machine they
run on is referred to as the host.
• To fully grasp how VMs work, it’s important to first
understand how computer software and hardware are
typically integrated by an operating system.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
What is an operating system?
• Traditional computers are built out of physical hardware, including
hard disk drives, processor chips, RAM, etc. In order to utilize this
hardware, computers rely on a type of software known as an
operating system (OS). Some common examples of OSes are Mac
OSX, Microsoft Windows, Linux, and Android.
• The OS is what manages the computer’s hardware in ways that are
useful to the user.
• For example, if the user wants to access the Internet, the OS directs
the network interface card to make the connection.
• If the user wants to download a file, the OS will partition space on
the hard drive for that file. The OS also runs and manages other
pieces of software. For example, it can run a web browser and
provide the browser with enough random access memory (RAM) to
operate smoothly.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Can you have two or more operating systems on one
computer?
• Some users want to be able to run multiple
operating systems simultaneously on one computer,
either for testing or one of the other reasons.
• This can be achieved through a process called
virtualization. In virtualization, a piece of software
behaves as if it were an independent computer.
• This piece of software is called a virtual machine,
also known as a ‘guest’ computer. (The computer on
which the VM is running is called the ‘host’.) The
guest has an OS as well as its own virtual hardware.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
• Virtualization makes it possible to create multiple virtual
machines, each with their own operating system (OS) and
applications, on a single physical machine. A VM cannot
interact directly with a physical computer.
• Instead, it needs a lightweight software layer called
a hypervisor to coordinate between it and the underlying
physical hardware. The hypervisor allocates physical
computing resources—such as processors, memory, and
storage—to each VM. It keeps each VM separate from
others so they don’t interfere with each other.
• With virtualization, one computer can run two or more
operating systems. The number of VMs that can run on
one host is limited only by the host’s available resources.
The user can run the OS of a VM in a window like any
other program, or they can run it in fullscreen so that it
looks and feels like a genuine host OS.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Popular reasons people run virtual machines
include:
1. Testing - Oftentimes software developers want to be able
to test their applications in different environments. They
can use virtual machines to run their applications in
various OSes on one computer.
2. Running software designed for other OSes - Although
certain software applications are only available for a single
platform, a VM can run software designed for a different
OS. For example, a Mac user who wants to run software
designed for Windows can run a Windows VM on their
Mac host.
3.Running outdated software - Some pieces of older
software can’t be run in modern OSes. Users who want to
run these applications can run an old OS on a virtual
machine.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
How does cloud computing use virtual machines?
• Several cloud providers offer virtual machines to their
customers. These virtual machines typically live on powerful
servers that can act as a host to multiple VMs and can be used
for a variety of reasons that wouldn’t be practical with a
locally-hosted VM. These include:
1. Running SaaS applications
Software-as-a-Service is a cloud-based method of providing
software to users. SaaS users subscribe to an application
rather than purchasing it once and installing it.
These applications are generally served to the user over the
Internet. Often, it is virtual machines in the cloud that are
doing the computation for SaaS applications as well as
delivering them to users.
If the cloud provider has a geographically distributed network
edge, then the application will run closer to the user, resulting
in faster performance.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
2. Backing up data -
Cloud-based VM services are very popular for backing up
data, because the data can be accessed from anywhere.
Plus, cloud VMs provide better redundancy, require less
maintenance, and generally scale better than physical data
centers. (For example, it’s generally fairly easy to buy an
extra gigabyte of storage space from a cloud VM provider,
but much more difficult to build a new local data server
for that extra gigabyte of data.)
3. Hosting services like email and access management -
Hosting these services on cloud VMs is generally faster
and more cost-effective, and helps minimize maintenance
and offload security concerns as well.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Isolation of VM
• Temporal isolation or performance isolation among virtual
machine (VMs) refers to the capability of isolating the
temporal behavior (or limiting the temporal interferences) of
multiple VMs among each other, despite them running on
the same physical host and sharing a set of physical resources
such as processors, memory, and disks.
• In fact, an entire Operating System (OS), along with the
applications running within, can be run in a virtual
machine (VM). However, when multiple VMs concurrently
run on the same physical host, they share the available
physical resources, including CPU(s), network
adapter(s), disk(s) and memory.
• This adds a level of unpredictability in the performance that
may be exhibited by each individual VM, as compared to
what is expected
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
• For example, a VM with a temporary compute-
intensive peak might disturb the other running
VMs, causing a significant and undesirable
temporary drop in their performance.
• In a world of computing that is shifting
towards cloud computing paradigms where
resources (computing, storage, networking) may be
remotely rented in virtualized form under precise
service-level agreements, it would be highly
desirable that the performance of the virtualized
resources be as stable and predictable as possible.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Example :Isolation in the Azure Public Cloud
Azure allows you to run applications and virtual machines
(VMs) on shared physical infrastructure. One of the prime
economic motivations to running applications in a cloud
environment is the ability to distribute the cost of shared
resources among multiple customers.
This practice of multi-tenancy improves efficiency by
multiplexing resources among disparate customers at low
costs. Unfortunately, it also introduces the risk of sharing
physical servers and other infrastructure resources to run
your sensitive applications and VMs that may belong to an
arbitrary and potentially malicious user.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Tenant Level Isolation
• One of the primary benefits of cloud computing is concept
of a shared, common infrastructure across numerous
customers simultaneously, leading to economies of scale.
This concept is called multi-tenancy.
• Microsoft works continuously to ensure that the multi-
tenant architecture of Microsoft Cloud Azure supports
security, confidentiality, privacy, integrity, and availability
standards.
• In the cloud-enabled workplace, a tenant can be defined
as a client or organization that owns and manages a
specific instance of that cloud service. With the identity
platform provided by Microsoft Azure, a tenant is simply a
dedicated instance of Azure Active Directory (Azure AD)
that your organization receives and owns when it signs up
for a Microsoft cloud service.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
• Each Azure AD directory is distinct and separate
from other Azure AD directories. Just like a
corporate office building is a secure asset specific
to only your organization, an Azure AD directory
was also designed to be a secure asset for use by
only your organization.
• The Azure AD architecture isolates customer data
and identity information from co-mingling. This
means that users and administrators of one
Azure AD directory cannot accidentally or
maliciously access data in another directory.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
VLAN Isolation
There are three VLANs in each cluster:
• The main VLAN – interconnects untrusted customer nodes
• The FC VLAN – contains trusted FCs and supporting
systems
• The device VLAN – contains trusted network and other
infrastructure devices
Communication is permitted from the FC VLAN to the
main VLAN, but cannot be initiated from the main VLAN to
the FC VLAN. Communication is also blocked from the
main VLAN to the device VLAN. This assures that even if a
node running customer code is compromised, it cannot
attack nodes on either the FC or device VLANs.
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Virtualization System Security Issues
Virtualization security Threats
1. Hypervisor security(piece of s/w)-if control goes to attacker zero security
2. VM identity security –hide IP address
3. VM Server Security - CSP
4. Securing host resources – Cloud paid user resource must be secured
5. Virtualization software security -
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
CSP security responsibility
1. Identify and hides the VM or host (hide identity of host –IP,
Name, location)
2. CSP is responsible for VM security
3. CSP is responsible SaaS and PaaS security
4. Protect unauthorized access to host resource
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
References
• https://www.cloudflare.com/learning/cloud/wha
t-is-a-virtual-machine/
• https://docs.microsoft.com/en-
us/azure/security/fundamentals/isolation-
choices
School of Computing Science and Engineering
Course Code : CSCV4022 Course Name: Cloud Security
Program Name: B.Tech (Spl) Program Code:
Thank You

More Related Content

PPT
Cloud Security
PPT
Cloud Computing Security Challenges
PPT
cloud computing:Types of virtualization
PPTX
Virtualization and its Types
PPTX
Data center virtualization
PPT
Protection and Security in Operating Systems
PPTX
Virtualization in Cloud Computing and Machine reference Model
PPT
Issues in cloud computing
Cloud Security
Cloud Computing Security Challenges
cloud computing:Types of virtualization
Virtualization and its Types
Data center virtualization
Protection and Security in Operating Systems
Virtualization in Cloud Computing and Machine reference Model
Issues in cloud computing

What's hot (20)

PPTX
Virtualization- Cloud Computing
PDF
Cloud Computing Architecture
PPTX
Virtualization security threats in cloud computing
PPTX
Cloud computing and data security
PDF
Cloud Computing and Virtualization
PDF
Cloud Management
PDF
DBaaS- Database as a Service in a DBAs World
PPT
Platform as a Service (PaaS) Providers
PPT
Cloud computing
PDF
Cloud Security, Standards and Applications
PPT
Cloud interoperability
PDF
Cloud intrusion detection System
PPT
Security Issues of Cloud Computing
PPTX
Security & protection in operating system
PPTX
Virtualization & cloud computing
PPTX
Azure Cloud PPT
PPTX
Data storage security in cloud computing
PPTX
NIST Cloud Computing Reference Architecture
PPTX
Virtualization
PPTX
Service level agreement in cloud computing an overview
Virtualization- Cloud Computing
Cloud Computing Architecture
Virtualization security threats in cloud computing
Cloud computing and data security
Cloud Computing and Virtualization
Cloud Management
DBaaS- Database as a Service in a DBAs World
Platform as a Service (PaaS) Providers
Cloud computing
Cloud Security, Standards and Applications
Cloud interoperability
Cloud intrusion detection System
Security Issues of Cloud Computing
Security & protection in operating system
Virtualization & cloud computing
Azure Cloud PPT
Data storage security in cloud computing
NIST Cloud Computing Reference Architecture
Virtualization
Service level agreement in cloud computing an overview
Ad

Similar to Isolation of vm (20)

DOCX
Private Cloud With System Center Project
DOCX
Quiz 1 cloud computing
PPTX
Presentation on Top Cloud Computing Technologies
PPTX
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
PPTX
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
PPT
Cloud models and platforms
PDF
Wise6 davidson
PPT
Cloud Computing using virtulization
PPT
Seminar on cloud computing by Prashant Gupta
PDF
The life cycle of a virtual machine (VM) provisioning process
PPT
DOCX
Cloudcpmuting journal
PDF
A Survey of Performance Comparison between Virtual Machines and Containers
PPTX
week 3 cloud computing northumbria foudation
PDF
Virtualization for Cloud Environment
DOCX
Cloud computing
PPTX
Cloud Computing genral for all concepts.pptx
DOCX
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
PPTX
Tlu introduction-to-cloud
PPT
cloud computing
Private Cloud With System Center Project
Quiz 1 cloud computing
Presentation on Top Cloud Computing Technologies
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
Cloud models and platforms
Wise6 davidson
Cloud Computing using virtulization
Seminar on cloud computing by Prashant Gupta
The life cycle of a virtual machine (VM) provisioning process
Cloudcpmuting journal
A Survey of Performance Comparison between Virtual Machines and Containers
week 3 cloud computing northumbria foudation
Virtualization for Cloud Environment
Cloud computing
Cloud Computing genral for all concepts.pptx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Tlu introduction-to-cloud
cloud computing
Ad

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPT
Mechanical Engineering MATERIALS Selection
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Construction Project Organization Group 2.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
DOCX
573137875-Attendance-Management-System-original
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
composite construction of structures.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Structs to JSON How Go Powers REST APIs.pdf
Sustainable Sites - Green Building Construction
OOP with Java - Java Introduction (Basics)
Lesson 3_Tessellation.pptx finite Mathematics
Operating System & Kernel Study Guide-1 - converted.pdf
Lecture Notes Electrical Wiring System Components
Mechanical Engineering MATERIALS Selection
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Model Code of Practice - Construction Work - 21102022 .pdf
Construction Project Organization Group 2.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
573137875-Attendance-Management-System-original
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
composite construction of structures.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
additive manufacturing of ss316l using mig welding
Structs to JSON How Go Powers REST APIs.pdf

Isolation of vm

  • 1. Isolation of users/VMs from each other. How the cloud provider can provide this? School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code: G.Nagarajan Assistant Professor Galgotias University, Greater Noida, UP
  • 2. What is a virtual machine? • A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. • A virtual machine is a virtual representation, or emulation, of a physical computer. They are often referred to as a guest while the physical machine they run on is referred to as the host. • To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 3. What is an operating system? • Traditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android. • The OS is what manages the computer’s hardware in ways that are useful to the user. • For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. • If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 4. Can you have two or more operating systems on one computer? • Some users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons. • This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. • This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 5. • Virtualization makes it possible to create multiple virtual machines, each with their own operating system (OS) and applications, on a single physical machine. A VM cannot interact directly with a physical computer. • Instead, it needs a lightweight software layer called a hypervisor to coordinate between it and the underlying physical hardware. The hypervisor allocates physical computing resources—such as processors, memory, and storage—to each VM. It keeps each VM separate from others so they don’t interfere with each other. • With virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 6. Popular reasons people run virtual machines include: 1. Testing - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. 2. Running software designed for other OSes - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host. 3.Running outdated software - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 7. How does cloud computing use virtual machines? • Several cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include: 1. Running SaaS applications Software-as-a-Service is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 8. 2. Backing up data - Cloud-based VM services are very popular for backing up data, because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.) 3. Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 9. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 10. Isolation of VM • Temporal isolation or performance isolation among virtual machine (VMs) refers to the capability of isolating the temporal behavior (or limiting the temporal interferences) of multiple VMs among each other, despite them running on the same physical host and sharing a set of physical resources such as processors, memory, and disks. • In fact, an entire Operating System (OS), along with the applications running within, can be run in a virtual machine (VM). However, when multiple VMs concurrently run on the same physical host, they share the available physical resources, including CPU(s), network adapter(s), disk(s) and memory. • This adds a level of unpredictability in the performance that may be exhibited by each individual VM, as compared to what is expected School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 11. • For example, a VM with a temporary compute- intensive peak might disturb the other running VMs, causing a significant and undesirable temporary drop in their performance. • In a world of computing that is shifting towards cloud computing paradigms where resources (computing, storage, networking) may be remotely rented in virtualized form under precise service-level agreements, it would be highly desirable that the performance of the virtualized resources be as stable and predictable as possible. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 12. Example :Isolation in the Azure Public Cloud Azure allows you to run applications and virtual machines (VMs) on shared physical infrastructure. One of the prime economic motivations to running applications in a cloud environment is the ability to distribute the cost of shared resources among multiple customers. This practice of multi-tenancy improves efficiency by multiplexing resources among disparate customers at low costs. Unfortunately, it also introduces the risk of sharing physical servers and other infrastructure resources to run your sensitive applications and VMs that may belong to an arbitrary and potentially malicious user. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 13. Tenant Level Isolation • One of the primary benefits of cloud computing is concept of a shared, common infrastructure across numerous customers simultaneously, leading to economies of scale. This concept is called multi-tenancy. • Microsoft works continuously to ensure that the multi- tenant architecture of Microsoft Cloud Azure supports security, confidentiality, privacy, integrity, and availability standards. • In the cloud-enabled workplace, a tenant can be defined as a client or organization that owns and manages a specific instance of that cloud service. With the identity platform provided by Microsoft Azure, a tenant is simply a dedicated instance of Azure Active Directory (Azure AD) that your organization receives and owns when it signs up for a Microsoft cloud service. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 14. • Each Azure AD directory is distinct and separate from other Azure AD directories. Just like a corporate office building is a secure asset specific to only your organization, an Azure AD directory was also designed to be a secure asset for use by only your organization. • The Azure AD architecture isolates customer data and identity information from co-mingling. This means that users and administrators of one Azure AD directory cannot accidentally or maliciously access data in another directory. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 15. VLAN Isolation There are three VLANs in each cluster: • The main VLAN – interconnects untrusted customer nodes • The FC VLAN – contains trusted FCs and supporting systems • The device VLAN – contains trusted network and other infrastructure devices Communication is permitted from the FC VLAN to the main VLAN, but cannot be initiated from the main VLAN to the FC VLAN. Communication is also blocked from the main VLAN to the device VLAN. This assures that even if a node running customer code is compromised, it cannot attack nodes on either the FC or device VLANs. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 16. School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 17. Virtualization System Security Issues Virtualization security Threats 1. Hypervisor security(piece of s/w)-if control goes to attacker zero security 2. VM identity security –hide IP address 3. VM Server Security - CSP 4. Securing host resources – Cloud paid user resource must be secured 5. Virtualization software security - School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code:
  • 18. CSP security responsibility 1. Identify and hides the VM or host (hide identity of host –IP, Name, location) 2. CSP is responsible for VM security 3. CSP is responsible SaaS and PaaS security 4. Protect unauthorized access to host resource School of Computing Science and Engineering Course Code : CSCV4022 Course Name: Cloud Security Program Name: B.Tech (Spl) Program Code: