Infrastructure Security at Network Level in Cloud Computing
Last Updated :
28 Mar, 2023
Pre-requisite: Cloud Computing
Infrastructure Security deals with the threats, risks, and challenges that are associated with the security of the organization’s IT infrastructure such as the host, network, and application levels, this approach is commonly used by security practitioners whereas Non-IT security associates are advised not to equate the infrastructure security with access management’s infrastructure as service security(IaaS). Besides that infrastructure security is more related to customers, as they have ramifications with threat, risk, and compliance management.
Infrastructure Security at the Network Level
There are no new attacks, vulnerabilities, or changes that need to be considered in this specific topology by the information security personnel, beside that our organization’s IT infrastructure might be affected by the implementation of a private cloud but our current network topology probably will not get affected. whereas if we used the services of public clouds any changes in the security requirements will require a change in the network topology. Therefore, we must define some ways through which our existing network topology will interact with the topology of the cloud provider.
Risk Factors Needed to be Addressed are:
1. Integrity and Confidentiality of the In-Transit Data: The resources and data that were previously confined within the private networks are now exposed to the internet which is a shared public network that belongs to a third-party cloud provider.
2. Access Control Methods: As a subset of the resources is now exposed to the internet, an organization using services of the public cloud can result in an increase in risk to its data, The ability to audit the operations of our cloud provider’s network even after the fact which is non-existent can be considered as a threat to the network.
3. Availability of the Services: Accessible from Internet Resources: Dependency on the security of networks has increased because now an enormous amount of organizations’ personnel or users depend on externally hosted devices to ensure the availability of services provided by the cloud. Border gateway protocol Prefix Hijacking involves the announcement of an autonomous(connected group of one or more IP prefixes that are run by one or more network operators having a single routing policy) system address space that belongs to another person without his/her permission. Such mistakes often occur due to misconfigurations which can affect the availability of our cloud-based resources.
For example:- In Feb 2008 Pakistan telecom declare a dummy route for youtube to its own telecommunication partner. The intention was to block youtube within the country but the result was that the services of Youtube are globally affected for 2 Hours.
Apart from misconfiguration, there are deliberate attacks as well which can block access to the data.
4. Replace the Models Established in Network Zones and tiers within the Domains: The isolation model of network zones and tiers no longer exists in public infrastructure a service and platform-as-a-service clouds. For years network security has relied on zones, to segregate network traffic. This model was based on an exclusion that only individuals and systems in specific roles have access to specific zones. Similarly, systems within a specific tier often have access across a specific tier.
For example:- systems within a presentation tier are not allowed to communicate directly with systems in the database tier, but can communicate only with an authorized system within the application zone.
In the established model of network zones and tiers, development systems are logically separated from the production systems at the network level, but these two groups of systems are also physically separated at the host level. However, this separation no longer exists. The cloud computing model of separation by domains provides logical separation for addressing purposes only.
Similar Reads
Decorators in Python In Python, decorators are a powerful and flexible way to modify or extend the behavior of functions or methods, without changing their actual code. A decorator is essentially a function that takes another function as an argument and returns a new function with enhanced functionality. Decorators are
10 min read
What Is Cloud Computing ? Types, Architecture, Examples and Benefits Nowadays, Cloud computing is adopted by every company, whether it is an MNC or a startup many are still migrating towards it because of the cost-cutting, lesser maintenance, and the increased capacity of the data with the help of servers maintained by the cloud providers. Cloud Computing means stori
14 min read
AVL Tree Data Structure An AVL tree defined as a self-balancing Binary Search Tree (BST) where the difference between heights of left and right subtrees for any node cannot be more than one. Balance Factor = left subtree height - right subtree heightFor a Balanced Tree(for every node): -1 ⤠Balance Factor ⤠1Example of an
4 min read
What is a Neural Network? Neural networks are machine learning models that mimic the complex functions of the human brain. These models consist of interconnected nodes or neurons that process data, learn patterns and enable tasks such as pattern recognition and decision-making.In this article, we will explore the fundamental
12 min read
DevOps Tutorial DevOps is a combination of two words: "Development" and "Operations." Itâs a modern approach where software developers and software operations teams work together throughout the entire software life cycle, from planning and coding to testing, deploying, and monitoring.The main idea of DevOps is to i
9 min read
Virtualization in Cloud Computing and Types Virtualization is a way to use one computer as if it were many. Before virtualization, most computers were only doing one job at a time, and a lot of their power was wasted. Virtualization lets you run several virtual computers on one real computer, so you can use its full power and do more tasks at
12 min read
ArrayList in Java Java ArrayList is a part of the collections framework and it is a class of java.util package. It provides us with dynamic-sized arrays in Java. The main advantage of ArrayList is that, unlike normal arrays, we don't need to mention the size when creating ArrayList. It automatically adjusts its capac
9 min read
Read JSON file using Python The full form of JSON is JavaScript Object Notation. It means that a script (executable) file which is made of text in a programming language, is used to store and transfer the data. Python supports JSON through a built-in package called JSON. To use this feature, we import the JSON package in Pytho
4 min read
Multithreading in Python This article covers the basics of multithreading in Python programming language. Just like multiprocessing , multithreading is a way of achieving multitasking. In multithreading, the concept of threads is used. Let us first understand the concept of thread in computer architecture. What is a Process
8 min read
Two Pointers Technique Two pointers is really an easy and effective technique that is typically used for Two Sum in Sorted Arrays, Closest Two Sum, Three Sum, Four Sum, Trapping Rain Water and many other popular interview questions. Given a sorted array arr (sorted in ascending order) and a target, find if there exists an
11 min read