Cloud Security: Cloud Security Refers To A Broad Set of Policies, Technologies, and
Cloud Security: Cloud Security Refers To A Broad Set of Policies, Technologies, and
Cloud Security
Cloud security refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and the
associated infrastructure of cloud computing.
Security Concerns
• Security issues faced by Customers
• Security issues faced by Cloud Providers
1
Cloud Security Concerns
Security issues faced by Customers
Cloud Security Concerns
Security concerns faced by Cloud Providers
2
Cloud Security Concerns
Security concerns faced by Cloud Providers
Cloud Security Concerns
The extensive use of virtualization in implementing cloud
infrastructure brings unique security concerns for customers or
tenants of a public cloud service.
3
Cloud Security Controls
Cloud security architecture is effective only if the
correct defensive implementations are in place.
Security Controls
An efficient cloud security architecture should
recognize the issues that will arise with security
management. The security management addresses
these issues with security controls.
Cloud Security Controls
While there are many types of controls behind a cloud
security architecture, they can usually be found in one
of the following categories:
• Deterrent Controls
• Preventive Controls
• Detective Controls
• Corrective Controls
4
Cloud Security Controls
Deterrent Controls
These controls are intended to reduce attacks on a cloud system.
Preventive Controls
Preventive controls strengthen the system against incidents,
generally by reducing if not actually eliminating vulnerabilities.
Cloud Security Controls
Detective controls
Detective controls are intended to detect and react
appropriately to any incidents that occur.
5
Cloud Security Controls
Corrective controls
They come into effect during or after an incident.
Cloud Security Reference Model
6
Dimensions of Cloud Security
Dimensions of Cloud Security
7
Dimensions of Cloud Security
Dimensions of Cloud Security
8
Dimensions of Cloud Security
Security and Privacy
Identity Management
Identity management, also known as Identity and Access
Management (IAM) is, a discipline that "enables the right
individuals to access the right resources at the right times and for
the right reasons“.
9
Security and Privacy
Identity Management
Security and Privacy
Physical Security
10
Security and Privacy
Personnel Security
Security and Privacy
Privacy
Service Providers must ensure that all critical data (credit card
numbers, for example) are masked or encrypted and that only
authorized users have access to data in its entirety.
11
Data Security
Confidentiality
Data confidentiality is the property that data contents are not made
available or disclosed to illegal users.
Data Security
Access Controllability
Access controllability means that a data owner can perform the
selective restriction of access to his data outsourced to cloud.
12
Data Security
Integrity
Data integrity demands maintaining and assuring the accuracy and
completeness of data.
A data owner always expects that his data in a cloud can be stored
correctly and trustworthily. It means that the data should not be
illegally tampered, improperly modified, deliberately deleted, or
maliciously fabricated.
References
• https://en.wikipedia.org/wiki/Cloud_computing_security
• https://cloudsecurityalliance.org/
13