0% found this document useful (0 votes)
14 views

Unit 5

cloud computing unit 5 notes rtu

Uploaded by

Vaibhav Bairathi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
14 views

Unit 5

cloud computing unit 5 notes rtu

Uploaded by

Vaibhav Bairathi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
JAIPUR ENGIN DEPART (RING COLLEGE AND RESEARCH CENTRE IENT OF COMPUTER SCIENCE & ENGINEERING Unit Securing the Cloud Fundamentals of cloud security Organizational pressure to reduce costs and optimize operations has led many enterprises to investigate cloud computing as a viable alternative to create dynamic, rapidly provisioned resources powering application and storage platforms. Despite potential savings in infrastructure costs and improved business flexibility, security is still the greatest barrier to implementing cloud initiatives for many companies. Information security professionals need to review a staggering array of security considerations when evaluating the risks of cloud computing, With such a broad scope, how can an organization adequately assess all relevant risks to ensure that their cloud operations are secure? While traditional security challenges such as loss of data, physical damage to infrastructure, and compliance risk are well known, the manifestation of such threats in a cloud environment can be remarkably different. The blurring of boundaries between sofiware-defined and hardware infrastructure in the datacenter demand a different perspective. One of the first steps towards securing enterprise cloud is to review and update existing IT polices to clearly define guidelines to which all cloud-based operations must adhere. Such policies implement formal controls and processes with the specific aim of protecting data and systems in addition to fulfilling regulatory compliance obligations. Government bodies such as NIST, the US Department of Commerce, and the Australian Government Department of Finance and Deregulation (PDF) have produced cloud computing security documents that outline comprehensive policies for their departments, which can be a useful starting point for implementing a corporate policy. Cloud security policies should be applied to both internal and third-party managed cloud environments. Whether building private or utilizing public cloud infrastructure within the enterprise, the responsibility for cloud security is shared between your organization and any cloud service providers you engage with. When conducting due diligence on cloud service providers, carefully review their published security policies and ensure that that it aligns with your own corporate policies. ‘A fundamental security concept employed in many cloud installations is known as the defense in- depth strategy. This involves using layers of security technologies and business practices to protect, [VI Semester] [2020 - 21] Page 8 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING data and infrastructure against threats in multiple ways. In the event of a security failure at one level, this approach provides a certain level of redundancy and containment to create a durable security net or grid. Security is more effective when layered at each level of the cloud stack When implementing a cloud defense-in-depth strategy, there are several security layers that may be considered. The first and most widely known protection mechanism is data encryption, With appropriate encryption mechanisms, data stored in the cloud can be protected even if access is gained by malicious or unauthorized personnel. A second layer of defense is context-based access control, a type of security policy that filters access to cloud data or resources based on a combination of identity, location, and time. Yet another popular security layer in cloud-based systems is application auditing. This process logs all user activity within an enterprise application and helps information security personnel detect unusual patterns of activity that might indicate a security breach, Finally, it is critical to ensure that all appropriate security policies are enfore where data is transferred between applications or across systems within a cloud environment, When it comes to cloud security, no universal solutions are available to neutralize all threats against IT infrastructure. Corporate firewalls no longer demarcate a secure perimeter, which can often be extended well beyond the datacenter and into the cloud. It is similarly unwise to assume the security policies of third-party public and hybrid cloud service providers meet the standards and levels of compliance mandated by your internal policies. It is imperative that security requirements expected of third-parties are clearly defined and agreed upon. Cloud security can be a daunting issue with wide-reaching implications for business. Threats and potential vulnerabilities are magnified and the scope of responsibility expanded dramatically: from protecting data and infrastructure from theft, intrusion or attack through to maintaining regulatory compliance. In following articles, I will outline major trends impacting cloud security , some of the challenges faced when securing a cloud environment , and provide you with suggestions and recommendations for strengthening data, access, and platform protection in your cloud environment. Cloud Security Services Security poses a major challenge to the widespread adoption of cloud computing, yet an association of cloud users and vendors sees the cloud as a provider of information security services. The 10 security-as-a-service categories are: Identity and Access Management should provide controls for assured identities and [VI Semester] [2020 - 21] Page 9 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING access management. Identity and access management includes people, processes and systems that are used to manage a cess to enterprise resources by assuring the identity of an entity is verified and is granted the correct level of access based on this assured identity. Audit logs of activity such as successful and failed authentication and access attempts should be kept by the application/solution, 2 Data Loss Prevention is the monitoring, protecting and verifying the security of data at rest, in motion and in use in the cloud and on-premises. Data loss prevention services offer protection of data usually by running as some sort of client on desktops/servers and running rules around what can be done, Within the cloud, data loss prevention services could be offered as something that is provided as part of the build, such that all servers built for that client get the data loss prevention software installed with an agreed set of rules deployed. Web Security is real-time protection offered either on-premise through software/appliance installation or via the cloud by proxying or redirecting web traffic to the cloud provider. This provides an added layer of protection on top of things like AV to prevent malware from entering the enterprise via activities such as web browsing. Policy rules around the types of web access and the times this is acceptable also can be enforced via these web security technologies. 4, E-mail Security should provide control over inbound and outbound e-mail, thereby protecting the organization from phishing and malicious attachments, enforcing corporate policies such as acceptable use and spam and providing business continuity options. The solution should allow for policy-based encryption of e-mails as well as integrating with various e-mail server offerings. Digital signatures enabling identification and non- repudiation are features of many cloud e-mail security solutions 5. Security Assessments are third-party audits of cloud services or assessments of on- premises systems based on industry standards. Traditional security assessments for infrastructure and applications and compliance audits are well defined and supported by multiple standards such as NIST, ISO and CIS. A relatively mature toolset exists, and a number of tools have been implemented using the SaaS delivery model. In the SaaS delivery model, subscribers get the typical benefits of this cloud computing variant elasticity, negligible setup time, low administration overhead and pay-per-use with low initial investments. [VI Semester] [2020 - 21] Page 10 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 6 Intrusion Management is the process of using pattern recognition to detect and react to statistically unusual events. This may include reconfiguring system components in real ime to stop/prevent an intrusion. The methods of intrusion detection, prevention and response in physical environments are mature; however, the growth of virtualization and massive multi-tenancy is creating new targets for intrusion and raises many questions about the implementation of the same protection in cloud environments. 7. Security Information and Event Management systems accept log and event information. This information is then correlated and analyzed to provide real-time reporting and alerting on incidents/events that may require intervention. The logs are likely to be kept in a ‘manner that prevents tampering to enable their use as evidence in any investigations. 8 Eneryption systems typically consist of algorithms that are computationally difficult or infeasible to break, along with the processes and procedures to manage eneryption and 9. Decryption, hashing, digital signatures, certificate generation and renewal and key exchange. 10. Business Continuity and Disaster Recovery are the measures designed and implemented to ensure operational resiliency in the event of any service interruptions. Business continuity and disaster recovery provides flexible and reliable failover for required services in the event of any service interruptions, including those caused by natural or man- made disasters or disruptions. Cloud-centric business continuity and disaster recovery makes use of the cloud’s flexibility to minimize cost and maximize benefits 11. Network Security consists of security services that allocate access, distribute, monitor and protect the underlying resource services. Architecturally, network security provides services that address security controls at the network in aggregate or specifically addressed at the individual network of each underlying resource. In a cloud/virtual environment, network security is likely to be provided by virtual devices alongside traditional physical devices. Implementing the Cloud Security Principles: 1. Data in trans protection User data transiting networks should be adequately protected against tampering and eavesdropping. 2, Asset protection and resilience [VI Semester] [2020 - 21] Page 11 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING User data, and the assets storing or processing it, should be protected against physical tampering, loss, damage or seizure. 3. Separation between users A malicious or compromised user of the service should not be able to affect the service or data of, another. 4, Governance framework The service provider should have a security governance framework which coordinates and directs its management of the service and information within it. Any technical controls deployed outside of this framework will be fundamentally undermined. $. Operational security The service needs to be operated and managed securely in order to impede, detect or prevent attacks. Good operational security should not require complex, bureaucratic, time consuming or expensive processes. 6. Personnel security Where service provider personnel have access to your data and systems you need a high degree of confidence in their trustworthiness. Thorough screening, supported by adequate training, reduces the likelihood of accidental or malicious compromise by service provider personnel. 7. Secure development Services should be designed and developed to identify and mitigate threats to their security. Those which aren’t may be vulnerable to security issues which could compromise your data, cause loss of service or enable other malicious acti ty. 8. Supply chain security The service provider should ensure that its supply chain satisfactorily supports all of the security principles which the service claims to implement. 9, Secure user management ‘Your provider should make the tools available for you to securely manage your use of their service. Management interfaces and procedures are a vital part of the security barrier, preventing unauthorized access and alteration of your resources, applications and data. 10, Identity and authentication All access to service interfaces should be constrained to authenticated and authorized individuals. 11. External interface protection All extemal or less trusted interfaces of the service should be identified and appropriately defended. [VI Semester] [2020 - 21] Page 12 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 12, Secure service administration Systems used for administration of a cloud service will have highly privileged access to that service. Their compromise would have significant impact, including the means to bypass security controls and steal or manipulate large volumes of data. 13. Audit information for users ‘You should be provided with the audit records needed to monitor access to your service and the data held within it, The type of audit information available to you will have a direct impact on your ability to detect and respond to inappropriate or malicious activity within reasonable timescales, 14, Secure use of the service The security of cloud services and the data held within them can be undermined if you use the service poorly. Consequently, you will have certain responsibilities when using the servi e in order for your data to be adequately protected. SECURITY ISSUES IN CLOUD COMPUTING 1. Organizational Security Risks Organizational risks are categorized are categorized as the risks that may impact the structure of the organization or the business as an entity; If a CSP goes out of business or gets acquired by another entity, this may negatively affect their CSPs since any Service Level Agreements (SLA)they had may have changed and they would then have to migrate to another CSP that more closely aligns with their needs. In addition to this, there could be the threat of malicious insiders in the organization who could do harm using the data provided by their CSCs. 2. Physical Security Risks The physical location of the cloud data center must be secured by the CSP in order to prevent unauthorized on-site access of CSC data, Even firewalls and encryption cannot protect against the physical theft of data. Since the CSP is in charge of the physical infrastructure, they should implement and operate appropriate infrastructure controls including staff training, physical location security, network firewalls. It is also important to note that the CSP is not only responsible for storing and process data in specific jurisdictions but is also responsible for obeying the privacy regulations of those jurisdictions. 3. Technological Security Risks These risks are the failures associated with the hardware, technologies and provided by [VI Semester] [2020 - 21] Page 13 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING the CSP. In the public cloud, with its multi tenancy features, these include resource sharing isolation problems, and risks related to changing CSPs, i.e. portability. Regular maintenance and audit of infrastructure by CSP is recommended. 4. Compliance and Audit Risks These are risks related to the law. That is, risks related to lack of jurisdiction information, changes in jurisdiction, illegal clauses in the contract and ongoing legal disputes. For example, depending on location, some CSPs may be mandated by law to turn over sensitive information if demanded by government, 5. Data Security Risks There are a variety of data security risks that we need to take into account. The three main properties that we need to ensure are data integrity, confidentiality and availability. We will go more into depth on this in the next subsection since this is the area most at risk of being compromised and hence where the bulk of cloud security efforts are focused. Cloud Computing Security Challenges : DDoS attacks As more and more businesses and operations move to the cloud, cloud providers are becoming a bigger target for malicious attacks. Distributed denial of service (DDoS) attacks are more common than ever before. Verisign reported IT services, cloud and SaaS was the most frequently targeted industry during the first quarter of 2015, A DDoS attack is designed to overwhelm website servers so it can no longer respond to legitimate user requests, If a DDoS attack is successful, it renders a website useless for hours, or even days. This can result in a loss of revenue, customer trust and brand authority Complementing cloud services with DDoS protection is no longer just good idea for the enterprise; it’s a necessity. Websites and web-based applications are core components of 21st century business and require state-of-the-art security. 2: Data breaches Known data breaches in the U.S. hit a record-high of 738 in 2014, according to the Identity Theft Research Center, and hacking was (by far) the number one cause. That's an incredible statistic and only emphasizes the growing challenge to secure sensitive data. Traditionally, IT professionals have had great control over the network infrastructure and physical hardware (firewalls, ete.) securing proprietary data. In the cloud (in private, public and hybrid [VI Semester] [2020 - 21] Page 14 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING scenarios), some of those controls are relinquished to a trusted partner. Choosing the right vendor, with a strong record of security, is vital to overcoming this challenge. 3: Data loss When business critical information is moved into the cloud, it’s understandable to be concerned with its security. Losing data from the cloud, either though accidental deletion, malicious tampering (i.e. DDoS) or an act of nature brings down a cloud service provider, could be disastrous for an enterprise business. Often a DDoS attack is only a diversion for a greater threat, such as an attempt to steal or delete data, To face this challenge, it’s imperative to ensure there is a disaster recovery process in place, as well as an integrated system to mitigate malicious attacks, In addition, protecting every network layer, including the application layer (layer 7), should be built-in to a cloud security solution, 4: Insecure access points One of the great benefits of the cloud is it can be accessed from anywhere and from any device. But, what if the interfaces and APIs users interact with aren’t secure? Hackers can find these types of vulnerabilities and exploit them. A behavioral web application firewall examines HTTP requests to a website to ensure it is legitimate traffic. This always-on device helps protect web applications from security breaches. 5: Notifications and alerts Awareness and proper communication of security threats is a comerstone of network security and the same goes for cloud security. Alerting the appropriate website or application managers as soon as a threat is identified should be part of a thorough security plan. Speedy mitigation of a threat relies on clear and prompt communication so steps can be taken by the proper entities and impact of the threat minimized, Final Thoughts Cloud security challenges are not insurmountable. With the right partners, technology and forethought, enterprises can leverage the benefits of cloud technology. CD Networks’ cloud security solution integrates web performance with the latest in cloud security technology. With 160 points of presence, websites and web applications are accelerated on a global scale and, with our cloud security, our clients’ cloud-based assets are protected with 24/7 end to end security, including DDoS mitigation at the network and application levels. [VI Semester] [2020 - 21] Page 15 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Cloud Computing Security Architecture: Fig: Cloud Computing Security Architecture [VI Semester] [2020 - 21] Page 16 JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING VI Semester [2020-21] Page| 17

You might also like