SlideShare a Scribd company logo
Cloud
Security
101
1
Sanjeev Kumar Jaiswal
• 14+ years of Experience
• Security Architect, Tesco
➤ Security Head in Lifesight for 2.5 years
➤ India Lead, AppSec Team in Epam
• Application Security and
• Cloud Security
• Programming: Perl, Python
• Areas of Interest: Learning and teaching
concepts on DevSecOps, Cloud Security &
Security Automation
Sanjeev Jaiswal (jassi)
2
What we will cover
• For whom this session is (awareness session)
• Brief of Cloud Computing
• Cloud Security Overview
• What covers under cloud security
• Job pro
fi
le categories
• Learning references
• What’s Next
3
Key Audience
• College Students
• Freshers (0-2 years)
• Want to switch into Cloud Security
• Interested in Cloud Security
• Curious what’s there in Cloud Security
4
What we will cover
• Quick recap of Cloud Computing - 5 mins.
• Service model and Deployment model - 5 mins.
• Why we need Cloud Security - 5 mins.
• Cloud Security Fundamentals - 30 mins.
• What’s Next - 5 mins.
• Q&A - 10 min.
5
Cloud Computing is the use of
computing services like servers,
storage, databases, networking,
software, analytics, intelligence and
many more over the Internet (“the
cloud”)
6
Why we need cloud computing at all?
• Better Availability
• Higher durability
• Secured?
• Economical
• Compliant
• Go live in a minute
7
Advantages of Cloud Computing
• Pay as you go
• Resilient
• Scalable
• Economical
• Enhance Productivity, Performance and
• Security
8
Cloud Computing
Deployment Model
9
Cloud Computing Service Model
• IaaS - Digital Ocean, Rackspace, GCE, Amazon EC2
• PaaS - Beanstalk, Heroku, Google App Engine
• SaaS - Gmail, Facebook, Dropbox, Wordpress, O
ffi
ce365
• XaaS - Database as a Service, Security as a Service, Malware as a Service
(VMware AppDefense)
10
Cloud
Security
Basics
11
12
13
14
15
Why we need cloud security
✴Cloud computing is being used for more than two decades.
Still, several businesses
fi
nd security as a challenge to handle.
• Everyone is in Cloud now a days
• It’s shared responsibility
• Still new, so more to explore
• Multi tenancy make things more attack prone
• Service Providers are not macho man
• Data Security is a big concern
• and many more …
16
17
Cloud-Native Security vs Hybrid Cloud Security
• Door with built-in lock
• CCTV camera
• You need both for better security
18
Security in the cloud consists of 4 areas:
• Data Protection
• Infrastructure Protection
• Privilege Management
• Detective Controls
19
Most Crucial aspects of Cloud Security
• It’s a shared responsibility
• IAM: Principle of Least Privilege
• Network Security
• Application Security
• Data Security
20
Cloud Security Dissection
• Logging and Monitoring
• Cloud Security Automation
• Backup and Disaster Recovery
• Cloud Compliance and Governance
• Threat Detection and Response
Logging
• Whom to give log access
• What to Log
• Where to store
• Log Duration
• Secured Cloud Logging Service - sumologic, alertlogic
• Cloudtrail, Cloudwatch, VPC
fl
ow logs in AWS
21
Alert & Monitoring
• Trigger point
• What to monitor
• At what frequency
• How much possibility through Automation?
• Alert response mechanism
• IR Mechanism
22
• AWS EC2
• AWS IAM
• Amazon S3
• VPC
• Lambda
• Route53
• Load Balancer
23
• API Gateway
• CloudTrail
• Amazon RDS
• Cloudfront
AWS essential services
• AWS IAM
• KMS
• AWS CloudTrail
• AWS Con
fi
g
• AWS GuardDuty
• AWS Macie
• Amazon Inspector
24
• AWS Shield
• AWS WAF
• Trusted Advisor
• AWS Security Hub
• Amazon Cognito
• Pacu, Prowler, Cloud
Custodian, Cloudcheckr,
Tenable, and so on…
AWS Security services and tools
Summary
25
• Understand basics of cloud computing
• Get familiar with linux commands, cli, computer networks
• Create a free tier account with AWS/GCP/Azure
• Make yourself comfortable with essential services
• Make a good grip on cloud native security services
• Hands-on is everything
• Read o
ffi
cial documentation for better understanding
26
27
What’s Next
28
• Advanced Network and Infra Security
• SIEM in Cloud
• CSPM vs CASB (also check CWPP) and now CNAPP
• Cloud Security Threats
• CSA and NIST standards
• Data Governance and Compliance
• Security Automation :
• Cloudformation, Terraform, Pulumi etc.
• Security in CI/CD -> DevSecOps (Hotshot)
29
References & Credits
• Basics of Cloud Security
• Cloud Services Explained by IBM
• Awesome AWS Security
• Cloud Computing Courses from Acloud.guru
• AWS Security Study Plan
• AWS Security Interview Questions
• Cybersecurity in the Cloud Specialization (Coursera)
• Secure Cloud Architecture
30
My Social Channels
31
linkedin.com/in/jassics
twitter.com/jassics
github.com/jassics
cybercloud.guru
32
For further queries, please feel free to contact
me at jassics@gmail.com
WhatsApp Group (Cybercloud Learning):
https://chat.whatsapp.com/
HYOMBR0edCm4L2ej3lcPmn
33

More Related Content

PPTX
Security and management
PPT
Security Architecture
PDF
Exploits Attack on Windows Vulnerabilities
PPT
Physical Security Assessment
PPTX
Endpoint Security Pres.pptx
PDF
Cybersecurity Fundamental Course by Haris Chughtai.pdf
PDF
Cybersecurity risk management 101
PPTX
SOC: Use cases and are we asking the right questions?
Security and management
Security Architecture
Exploits Attack on Windows Vulnerabilities
Physical Security Assessment
Endpoint Security Pres.pptx
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity risk management 101
SOC: Use cases and are we asking the right questions?

What's hot (20)

PPTX
Social engineering
PPTX
Security Operation Center - Design & Build
PPTX
The Zero Trust Model of Information Security
PDF
MITRE AttACK framework it is time you took notice_v1.0
PPTX
Cloud computing security issues and challenges
PPT
Information Security
PDF
Artificial Intelligence and Machine Learning for Cybersecurity
PPTX
Cloud computing and data security
PDF
OSCP Preparation Guide @ Infosectrain
PDF
Setting up CSIRT
PPTX
Security risk management
PPTX
Cloud Computing Security
PDF
Threat Hunting with Cyber Kill Chain
PPTX
Roadmap to security operations excellence
PPTX
cloud security ppt
PDF
Finding Your Way in Container Security
PPTX
Introduction to Cyber Security
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Realizing the Full Potential of Cloud-Native Application Security
Social engineering
Security Operation Center - Design & Build
The Zero Trust Model of Information Security
MITRE AttACK framework it is time you took notice_v1.0
Cloud computing security issues and challenges
Information Security
Artificial Intelligence and Machine Learning for Cybersecurity
Cloud computing and data security
OSCP Preparation Guide @ Infosectrain
Setting up CSIRT
Security risk management
Cloud Computing Security
Threat Hunting with Cyber Kill Chain
Roadmap to security operations excellence
cloud security ppt
Finding Your Way in Container Security
Introduction to Cyber Security
Overview of the Cyber Kill Chain [TM]
Realizing the Full Potential of Cloud-Native Application Security
Ad

Similar to Presentation on Cloud Security 101 - 2024 (20)

PPTX
UNIT I - UNDERSTANDING CLOUD COMPUTING.pptx
PPTX
Cloud Computing Basics
PDF
Outpost24 Webinar - cloud security controls best practice
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PDF
8 Elements of Multi-Cloud Security
PPTX
cloud computing
PPTX
Cloud Computing
PPTX
d.pptx
PPTX
Cloud computing and Service Platforms
PPT
4831586.ppt
PDF
AWS Solution Architect Associate Training Course| AWS Certification -ievision
PPTX
How to prepare for & respond to security incidents in your AWS environment
PDF
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
PPTX
Dutch Oracle Architects Platform - Reviewing Oracle OpenWorld 2017 and New Tr...
PDF
Cloud Security 101
PPTX
Security on AWS
PPTX
Cloud Technology Brief 2013 Q1 - Thailand
PPTX
LIFT OFF 2017: AWS and Cloud Computing
PPTX
Cloud Computing - The new buzz word
PPTX
How Cloud Computing will change how you and your team will run IT
UNIT I - UNDERSTANDING CLOUD COMPUTING.pptx
Cloud Computing Basics
Outpost24 Webinar - cloud security controls best practice
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
8 Elements of Multi-Cloud Security
cloud computing
Cloud Computing
d.pptx
Cloud computing and Service Platforms
4831586.ppt
AWS Solution Architect Associate Training Course| AWS Certification -ievision
How to prepare for & respond to security incidents in your AWS environment
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
Dutch Oracle Architects Platform - Reviewing Oracle OpenWorld 2017 and New Tr...
Cloud Security 101
Security on AWS
Cloud Technology Brief 2013 Q1 - Thailand
LIFT OFF 2017: AWS and Cloud Computing
Cloud Computing - The new buzz word
How Cloud Computing will change how you and your team will run IT
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
Getting Started with Data Integration: FME Form 101
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
Assigned Numbers - 2025 - Bluetooth® Document
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Presentation on Cloud Security 101 - 2024

  • 2. • 14+ years of Experience • Security Architect, Tesco ➤ Security Head in Lifesight for 2.5 years ➤ India Lead, AppSec Team in Epam • Application Security and • Cloud Security • Programming: Perl, Python • Areas of Interest: Learning and teaching concepts on DevSecOps, Cloud Security & Security Automation Sanjeev Jaiswal (jassi) 2
  • 3. What we will cover • For whom this session is (awareness session) • Brief of Cloud Computing • Cloud Security Overview • What covers under cloud security • Job pro fi le categories • Learning references • What’s Next 3
  • 4. Key Audience • College Students • Freshers (0-2 years) • Want to switch into Cloud Security • Interested in Cloud Security • Curious what’s there in Cloud Security 4
  • 5. What we will cover • Quick recap of Cloud Computing - 5 mins. • Service model and Deployment model - 5 mins. • Why we need Cloud Security - 5 mins. • Cloud Security Fundamentals - 30 mins. • What’s Next - 5 mins. • Q&A - 10 min. 5
  • 6. Cloud Computing is the use of computing services like servers, storage, databases, networking, software, analytics, intelligence and many more over the Internet (“the cloud”) 6
  • 7. Why we need cloud computing at all? • Better Availability • Higher durability • Secured? • Economical • Compliant • Go live in a minute 7
  • 8. Advantages of Cloud Computing • Pay as you go • Resilient • Scalable • Economical • Enhance Productivity, Performance and • Security 8
  • 10. Cloud Computing Service Model • IaaS - Digital Ocean, Rackspace, GCE, Amazon EC2 • PaaS - Beanstalk, Heroku, Google App Engine • SaaS - Gmail, Facebook, Dropbox, Wordpress, O ffi ce365 • XaaS - Database as a Service, Security as a Service, Malware as a Service (VMware AppDefense) 10
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. Why we need cloud security ✴Cloud computing is being used for more than two decades. Still, several businesses fi nd security as a challenge to handle. • Everyone is in Cloud now a days • It’s shared responsibility • Still new, so more to explore • Multi tenancy make things more attack prone • Service Providers are not macho man • Data Security is a big concern • and many more … 16
  • 17. 17
  • 18. Cloud-Native Security vs Hybrid Cloud Security • Door with built-in lock • CCTV camera • You need both for better security 18
  • 19. Security in the cloud consists of 4 areas: • Data Protection • Infrastructure Protection • Privilege Management • Detective Controls 19 Most Crucial aspects of Cloud Security
  • 20. • It’s a shared responsibility • IAM: Principle of Least Privilege • Network Security • Application Security • Data Security 20 Cloud Security Dissection • Logging and Monitoring • Cloud Security Automation • Backup and Disaster Recovery • Cloud Compliance and Governance • Threat Detection and Response
  • 21. Logging • Whom to give log access • What to Log • Where to store • Log Duration • Secured Cloud Logging Service - sumologic, alertlogic • Cloudtrail, Cloudwatch, VPC fl ow logs in AWS 21
  • 22. Alert & Monitoring • Trigger point • What to monitor • At what frequency • How much possibility through Automation? • Alert response mechanism • IR Mechanism 22
  • 23. • AWS EC2 • AWS IAM • Amazon S3 • VPC • Lambda • Route53 • Load Balancer 23 • API Gateway • CloudTrail • Amazon RDS • Cloudfront AWS essential services
  • 24. • AWS IAM • KMS • AWS CloudTrail • AWS Con fi g • AWS GuardDuty • AWS Macie • Amazon Inspector 24 • AWS Shield • AWS WAF • Trusted Advisor • AWS Security Hub • Amazon Cognito • Pacu, Prowler, Cloud Custodian, Cloudcheckr, Tenable, and so on… AWS Security services and tools
  • 26. • Understand basics of cloud computing • Get familiar with linux commands, cli, computer networks • Create a free tier account with AWS/GCP/Azure • Make yourself comfortable with essential services • Make a good grip on cloud native security services • Hands-on is everything • Read o ffi cial documentation for better understanding 26
  • 27. 27
  • 29. • Advanced Network and Infra Security • SIEM in Cloud • CSPM vs CASB (also check CWPP) and now CNAPP • Cloud Security Threats • CSA and NIST standards • Data Governance and Compliance • Security Automation : • Cloudformation, Terraform, Pulumi etc. • Security in CI/CD -> DevSecOps (Hotshot) 29
  • 30. References & Credits • Basics of Cloud Security • Cloud Services Explained by IBM • Awesome AWS Security • Cloud Computing Courses from Acloud.guru • AWS Security Study Plan • AWS Security Interview Questions • Cybersecurity in the Cloud Specialization (Coursera) • Secure Cloud Architecture 30
  • 32. 32 For further queries, please feel free to contact me at jassics@gmail.com WhatsApp Group (Cybercloud Learning): https://chat.whatsapp.com/ HYOMBR0edCm4L2ej3lcPmn
  • 33. 33