Chapter 4
Chapter 4
Capital One Data Breach: A hacker gained unauthorized access to the personal
information of over 100 million Capital One customers. The attacker, a former
AWS employee, utilized a server-side request forgery (SSRF) vulnerability to
obtain credentials. Compromised data included names, addresses, credit scores,
social security numbers, and bank account numbers. Capital One faced
reputational damage, customer trust issues, and a fine of $80 million for failing
to implement adequate cloud security measures.
Protection of sensitive data: Data centers house vast amounts of sensitive and
confidential information. Physical security measures are crucial to protect this
data from unauthorized access or theft.
SOX (sarbanes-oxley act): Critical for maintaining the accuracy and integrity of
financial reporting in cloud environments.
Contrast with Public and Hybrid Clouds: Unlike public clouds, which are shared
among multiple organizations, private clouds are reserved for a single entity.
Hybrid clouds combine elements of both private and public clouds, offering a
balance between control and scalability.
Improved Security: Tailored security measures that align with the specific needs
and policies of the organization.
Compliance and Data Sovereignty: Easier to meet specific industry regulations and
data residency requirements.
- Boosting Cloud Security and Privacy: VPNs enhance security and privacy in
cloud interactions by encrypting all data transmitted between users and
cloud services.
- Protection Against Data Interception: VPNs play a crucial role in
safeguarding sensitive data from potential interception and unauthorized
access during transmission.
- Enabling Secure Remote Access: VPNs provide secure and reliable to cloud
resources, critical for remote employees, partners and clients in today’s
distributed work environment.
- Facilitating Flexible Work Arrengements: The use of VPNs is instrumental in
supporting flexible and mobile work arrangements, allowing secure access
to cloud services from any location.
- Advanced Data Encryption Techniques: Detailing encryption protocols used
by VPNs such as SSL/TLS and IPSec, to ensure the confidentiality and
integrity of data from origin to destination.
- Operational Impact of VPN Security: Highlighting how VPN encryption
contributes to operational security, aiding in compliance with data
protection regulations and maintaining client trust.
CHAPTER 4: PART 2
Major Cloud Data Center Security: Security of the main cloud data centers begins
with the physcal security of the data centers that providers use to house their
computing equipment.
Billing Validation: The billing address isn’t listed on the credit card. So e-
commerce companies use it to authenticate their customers. The shared secret is
the billing address.
Identity Verification via Phone: out of band meaning not using the same browser
interface being used for sign-up. A user gets a PIN sent to the phone that he has
to enter on the desktop. Shared secret is the phone number.
Access Keys: Every API call to do anything with the cloud requires an access key.
As part of the initiation process, you are given a generetad secret key.
Key Pairs: The most important access credential for dealing with instances in the
cloud. You have to use different key pairs for each time you launch an instance.
Discretionary Access Control (DAC): Controls access based on the identity of the
requestor and on access rules stating what requestors are and are not allowed to
do entity with access rights can permit.
Role Based Access Control (RBAC): Controls access based on attributes of the user,
the resource to be accessed.
Network Security:
- Network security is a fundamental aspect of public cloud environments
- Firewalls control traffic by protocol, service port, and source IP address.
Co-Mingling Security:
- Co-Mingling refers to the simultaneous operation of multiple virtual
instances in the same cloud environment.
Economies of Scale:
- Public cloud providers gain economic advantages over private cloud
operators due to their buying power for hardware and resources.
- Public cloud providers can purchase servers and hosting resources at scale,
benefiting from long-term relationships with suppliers and existing
hardware investments.
Eucalyptus
- Eucalyptus is a Linux-based open-source software architecture for cloud
computing and storage platform implementing infrastructure as a Service
(IaaS)
- Designed for compatibility with Amazon’s EC2 and S3, it offers quick and
efficient computing services.
Advantages of Eucalyptus
- Can be used for both private and public clouds.
- Supports running Amazon or Eucalyptus machine images
- API is similar to all Amazon Web Services
- Potential alternatives to OpenStack and CloudStack
- Enables the creation of hybrid, public, and private clouds and extends
services to other organizations.
Virtual Private Cloud
- A PVC is a secure and seamless bridge between an organization's existing IT
infrastructure and a provider’s public cloud.
- The idea is to use instances within VPC to add additional web-facing servers
to your application when the traffic exceeds your on-premise capacity.
- The back-end of your application, database servers, authentication servers,
and so forth, remains within the walls of your data centers.
Chapter 6:
Distributed Systems
- Distributed web architectures typically fall into one of several basic
categories:
- Client- server architectures are two- tier
- Three-tier architectures add a business logic middle tier.
- N-tier architectures usually refer to web applications that utilize more
services.
- Tightly couples (clustered) architectures are a form of parallel processing.
- Peer-to-peer is clientless and has no single point of failure that can cause
total failure.
Loose Coupling
- In computer science, coupling refers to the degree of direct knowledge that
one component has of another. It’s the degree to which components
depend on one another.
- Loose coupling is important for reliability in the cloud because components
can be more easily handled individually.
- Web applications benefit from loose coupling, ensuring reliability as one
site doesn’t depend too much on another.
Service Oriented Architectures (SOAS):
- SOA is a set of principles used in systems development and integration.
- İt packages functionality into compatible services for diverse business
domains, allowing different organizations to use these services with
different client systems.
- Instead of API, SOA defines interfaces in terms of protocols and
functionality.
- Deployed SOA provides a loosely coupled suite of services, promoting
flexibility and reusability across multiple business domains.
Redundancy
- Redundancy is a critical factor in building reliable applications, especially in
the cloud.
- Techniques like triple modular redundancy with spares, used by NASA,
involve having three live copies of a critical system.
- While redundancy can be complex and costly, cloud providers help by
handling some of the challenges.
- Despite the benefits of redundancy caution is needed to avoid common
errors that multiple development teams might inadvertently introduce.
Map Reduce
- MapReduce is a software framework invented by Google to solve the
massive search problem it has across all content on the web, which, by the
end of 2008, exceeded one trillion unique URLs.
- MapReduce is loosely coupled distributed computing on a massive scale,
working on large data sets operated on by clusters of commodity (cheap)
computers.
- The name MapReduce has its roots in functional programming.
- A reduce combines all the elements of a sequence using a binary operation.
The Problem MapReduce Solves
The master does the following:
- Initializes the array and splits it into tasks according to the number of
available workers
- Sends each worker its subarray task
- Receives the result from each worker
The worker does the following:
- Receives the subarray task from the master
- Performs processing on the subarray task
- Returns the result to the master
- Map, written by a user of the MapReduce library, takes an input pair and
produces a set of intermediate key-value pairs.
- It is grouped all into intermediate values.
- A master node takes the input, chops it up into smaller subproblems, and
distributes those subproblems to worker nodes.
A Content Delivery Network (CDN) in cloud services helps to —> Reduce latency
by caching content closer to users
The concept of scalability in cloud computing refers to —> The ability to increase
or decrease resources as needed
Cloud compliance primarily deals with —> Adhering to legal and regulatory
standards
A primary feature of cloud governance is —> Ensuring policies for effective cloud
resource usage
The following best describes private cloud —> A cloud infrastructure operated
solely for a single organization
The process of cloud migration typically involves —> Moving data and
applications from on-premises to the cloud
The term cloud bursting is used to describe—> using public cloud resources to
manage excess demand
A common use case for cloud analytics is —> Big data processing and analysis
Fans (Function as a Service) is used for —> Running individual functions or pieces
of business logic
Hybrid cloud solutions are best suited for scenarios where —> There is a need for
both private and public cloud features
The primary purpose of cloud computing --> to provide scalable and efficient
computing resources
The primary benefit of cloud storage —> Access to data from any location with
internet connectivity