Cloud Computing
Cloud Computing
Cloud computing, as defined by the National Institute of Standards and Technology (NIST),
is “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool
of configurable computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management effort or
service provider interaction.” cloud computing could be described as the use of computing
resources both hardware and soft ware provided over a network, requiring minimal
interaction between users and providers.
Cloud security is a set of security measures designed to protect cloud-based infrastructure,
applications, and data. The goal is to establish control over data and resources, prevent
unauthorized access, protect data privacy, prevent malicious attacks by external hackers or
insider threats, and protect cloud workloads from accidental or malicious disruption. Another
objective of cloud security is to extend an organization’s compliance policies to the cloud.
Most cloud providers attempt to create a secure cloud for customers. Their business model
hinges on preventing breaches and maintaining public and customer trust. Cloud providers
can attempt to avoid cloud security issues with the service they provide, but can’t control how
customers use the service, what data they add to it, and who has access. Customers can
weaken cybersecurity in cloud with their configuration, sensitive data, and access policies. In
each public cloud service type, the cloud provider and cloud customer share different levels
of responsibility for security. By service type, these are:
Risk assessment — Review and update risk assessments to include cloud services.
Identify and address risk factors introduced by cloud environments and providers.
Risk databases for cloud providers are available to expedite the assessment process.
Compliance Assessments — Review and update compliance assessments for PCI,
HIPAA, Sarbanes-Oxley and other application regulatory requirements.
Backup plans: As with any other type of security, there must be a plan for when things go
wrong. To prevent data from getting lost or tampered with, data should be backed up in
another cloud or on-premise. There should also be a failover plan in place so that business
processes are not interrupted if one cloud service fails. One of the advantages of multi-cloud
and hybrid cloud deployments is that different clouds can be used as backup — for instance,
data storage in the cloud can back up an on-premise database.
User and employee education: A large percentage of data breaches occur because a user
was victimized by a phishing attack, unknowingly installed malware, used an outdated and
vulnerable device, or practiced poor password hygiene (reusing the same password, writing
their password down in a visible location, etc.). By educating their internal employees about
security, businesses that operate in the cloud can reduce the risk of these occurrences.
We recommend asking your cloud provider some questions of the following questions:
Security audits: “Do you conduct regular external audits of your security?”
Data segmentation: “Is customer data is logically segmented and kept separate?”
Encryption: “Is our data encrypted? What parts of it are encrypted?”
Customer data retention: “What customer data retention policies are being followed?”
User data retention: “Is my data is properly deleted if I leave your cloud service?”
Access management: “How are access rights controlled?”
Cloud Security Policy
A cloud security policy is a formal guideline under which a company operates in the cloud.
These instructions define the security strategy and guide all decisions concerning the safety
of cloud assets. Cloud security policies specify:
Data types that can and cannot move to the cloud
How teams address the risks for each data type
Who makes decisions about shifting workloads to the cloud
Who is authorized to access or migrate the data
Regulation terms and current compliance status
Proper responses to threats, hacking attempts, and data breaches
Rules surrounding risk prioritization
System Security and Audit
A security audit is a systematic evaluation of the security of a company's information system
by measuring how well it conforms to an established set of criteria. A thorough audit
typically assesses the security of the system's physical configuration and environment,
software, information handling processes and user practices.
These audits are one of three main types of security diagnostics, along with vulnerability
assessments and penetration testing. Security audits measure an information system's
performance against a list of criteria. A vulnerability assessment is a comprehensive study of
an information system, seeking potential security weaknesses. Penetration testing is a covert
approach in which a security expert tests to see if a system can withstand a specific attack.
Each approach has inherent strengths and using two or more in conjunction may be the most
effective approach.
Organizations should construct a security audit plan that is repeatable and updateable.
Stakeholders must be included in the process for the best outcome.
There are several reasons to do a security audit. They include these six goals:
1. Identify security problems and gaps, as well as system weaknesses.
2. Establish a security baseline that future audits can be compared with.
3. Comply with internal organization security policies.
4. Comply with external regulatory requirements.
5. Determine if security training is adequate.
6. Identify unnecessary resources.
Security audits come in two forms, internal and external audits, that involve the following
procedures:
Internal audits. In these audits, a business uses its own resources and internal audit
department. Internal audits are used when an organization wants to validate business
systems for policy and procedure compliance.
External audits. With these audits, an outside organization is brought in to conduct
an audit. External audits are also conducted when an organization needs to confirm it
is conforming to industry standards or government regulations.
Four main security audits that every business should be conducting on a regular basis:
1. Risk Assessment:
risk assessment audits help businesses identify their weaknesses and vulnerabilities so that
the businesses can come with effective strategies to tackle them.
2. Vulnerability Assessment:
During the vulnerability audit, the security audit companies indicate the aspects of the
business that are weak and thus can be used to cause significant harm to the business. It
should be repeated on a regular basis so that the business owners are truly in touch with the
weak links of their businesses and can plan the proper strategies to cover up and conceal
these weaknesses to prevent any sort of exploitation.
3. Penetration Testing:
Penetration testing is a form of data security audit in which one of the auditors acts as a
hacker and attempts to bypass the company’s security system. The hacker may use different
hacking methodologies and attempt different techniques to help businesses gather data which
can then be used to strengthen the business’s security system and ensure that the business is
strong and can withstand any unauthorized attacks.
4. Compliance Audit:
The company will go through the rules and regulations and confirm whether your business
follows them all or not. The company will also indicate any changes that the business has to
acknowledge. A security audit consists of a complete assessment of all components of your
IT infrastructure — this includes operating systems, servers, digital communication and
sharing tools, applications, data storage and collection processes, and more.
Steps involved in a security audit
These five steps are generally part of a security audit: