Cloud Security Lecture 4
Cloud Security Lecture 4
• Domain 5: Operations
• Cloud Portability: The ability to move applications and their data between one
cloud provider and another or from public/private cloud.
• Cloud Provider: The company that provides the cloud-based platform or services.
• Cloud Backup Service provider: Third-party entity that manages and provides
operational services for cloud-based backups.
• Cloud Services Broker: A third-party entity that looks to extend or enhance value to
multiple customers of cloud-based services through relationships with multiple cloud
service providers. It acts as a liaison between customers and providers ideally selecting the
best provider for each customer. The CSB acts as a middleman to broker the best deal and
customize services.
Cloud Computing Roles
• Cloud Data Architect: makes sure that storage and mechanisms within the
clouds meet and conform to the relevant SLAs.
Cloud Computing Roles
• Cloud Architect: will determine when and how a private cloud meets
the policies and needs of the organization
• IaaS
• PaaS
• SaaS
IaaS
• Infrastructure as a Service
The consumer does not manage or control the underlying cloud infrastructure but
has control over OSs, storage, and deployed applications; and possibly limited
control of select networking components (e.g., host firewalls).”
IaaS Offers:
TCO: Total Cost Of Ownership
• Multiple hosting environments: the ability to offer a wide variety and choice for
the underlying hosting environments
• Software as a Services provides the consumer the ability to use the provider’s
applications running on a cloud infrastructure. The applications are accessible
from various client devices through an interface like a web browser or a program
interface
• Users can access their applications and data from anywhere anytime
• Reduced TCO—reduced the need for advanced hardware. Redundancy and storage are
provided
• Pay-per-use
• Elasticity
• Public
• Private
• Hybrid
• Community
Public Cloud Benefits
• Scalability
• Pay as you go
Private Cloud Model
• Provisioned for exclusive use by a single organization comprising multiple business units
• It may be owned managed and operated by the organization, a third party, or a combination
• Provides much greater control over date, underlying systems and applications
• Assurance over data location, removal of multiple jurisdiction legal and compliance
requirements
Hybrid Cloud Model
• The hybrid is a composition of two or more distinct cloud infrastructures (private, community, or public)
• Provides organizations with the ability to retain control of their IT environments, but gives them the
convenience of using public cloud service for non-mission-critical efforts
• Utilized if there is a need to retain ownership and oversight of critical tasks and processes related to
technology
• “Cloud bursting” allows for public cloud resources to be utilized when private cloud workload has reached
capacity
Community Cloud Model
9. Must be easy to adopt and consume, supporting the design of security patterns
10. The architecture must be elastic, flexible and resilient, supporting multi-tenant,
multi-landlord platforms
11. Architecture must address and support multiple levels of protection, including
network, operating system, and application security needs
Domain 1: Architectural Concepts and Design
Requirements
• Data in Motion
• Data at Rest
• Though data is stored in the cloud best practices dictate key management be
handled by the client
• Client Side Key Management: Similar to RKMS the client side approach puts
the customer in control of encryption/decryption keys. KMS resides on
customer’s premises.
Cryptography in the Cloud
Domain 1: Architectural Concepts and Design
Requirements
• Includes the people, processes and systems that are used to manage
access to enterprise resources. This ensures:
• DOS or DDOS
• Malicious insiders
• IaaS requires focus and understanding of the layers of the architecture from
architecture to virtualization components. Concerns include VM Attacks, Virtual
Switches/Network, VM Based Rootkits/malicious hypervisor, single point of access
• System/Resource isolation
• User-level permissions
• Data Segregation
• RPO
• RTO
• Resource pooling
• No depreciation of resources
• Thin Clients
• ISO 27001 looks to certify that the ISMS can address relevant risks and
elements that is appropriate based on risks