Cloud Security Module I&II
Cloud Security Module I&II
➢ Explore the guiding security design principles, design patterns, industry standards, applied
technologies and addressing regulatory compliance requirements critical to design
➢ Secure cloud architectural aspects with regards to identifying and mitigating risks, protection
and isolation of physical & logical infrastructures including compute, network and storage,
comprehensive data protection at all OSI layers.
➢ End-to-end identity management & access control, monitoring and auditing processes and
meeting compliance with industry and regulatory mandates.
Course Syllabus
Course Outcome(CO-1)
Identify the various cloud platforms and risk issues in cloud computing
Module-I-Cloud Security Introduction
➢Users perspective
➢Understanding security and privacy in Cloud Computing
➢Risk issues and Security challenges
➢Security requirements for the architecture,
➢Securing private and public clouds,
➢Security patterns
➢Cloud security architecture, and Infrastructure security
Course Outcome(CO-2)
Select the cloud security architecture in different cloud environments
➢Security as a service
➢Trust Management for Security: Vulnerability assessment tool for cloud Privacy and
Security in cloud
➢Security standards,
Module-V-Security Analytics
➢Techniques in Analytics
The Data and Analysis Center for Software (DACS) Suggest three important
properties are required to ensure the security,
➢Dependability
➢Trustworthiness
➢Survivability (Resilience)
Dependability
Trustworthiness
Survivability (Resilience)
Software that is resistant to or tolerant of attacks and has the ability to recover as
quickly as possible with as little harm as possible
Apart from the above three factors, the following seven principles that
support security assurance.
Those seven factors are classified into two major category, they are
➢Confidentiality
➢Integrity
➢Availability
Confidentiality, Integrity, and Availability (CIA)
Confidentiality, integrity, and availability are sometimes known as the CIA triangle of
information system security, and are important pillars of cloud software assurance.
1. Confidentiality
Confidentiality refers to the prevention of intentional or unintentional unauthorized
disclosure of information.
Confidentiality in cloud systems is related to the areas of
internal information is consistent both among all sub-entities and with the real-world,
external situation
3.Availability
➢Availability ensures the reliable and timely access to cloud data or
cloud computing resources by the appropriate personnel.
➢Authentication
➢Authorization
➢Auditing
➢Accountability
1.Authentication
➢Authentication is the testing or understanding of evidence of a
user’s identity.
➢ It establishes the user’s identity and ensures that users are who they
claim to be.
In addition, an auditor should examine the audit logs for the following:
➢Amendments to production jobs
➢Production job reruns
➢Computer operator practices
➢All commands directly initiated by the user
➢All identification and authentication attempts
➢Files and resources accessed
4.Accountability
➢Accountability is the ability to determine the actions and behaviors
of a single individual within a cloud system and to identify that
particular individual.
➢Misconfiguration.
➢Cloud security is naturally complex, and the risk of configuring something
incorrectly is high, particularly when an organization engages with a new service
provider or expands their cloud user base.
➢Poor authentication controls.
➢ Controlling access to cloud resources is more complex than on an internal
network, creating more opportunities for misconfigurations.
➢API insecurities.
➢ Insecure APIs used to access cloud resources are increasingly common avenues
for cyber attackers attempting to gain access.
External Sharing of Data
➢External data sharing is one of the leading cloud security challenges
businesses face.
➢This issue arises when data is shared with third-party providers who
have to be examined and approved by the organization.
➢As a result, external data sharing can lead to the loss of critical business
information and theft and fraud.
➢To prevent these risks, companies must implement robust security measures,
➢Encryption
➢Data management practices.
Unsecure Third-party Resources
➢Third-party resources are applications, websites, and services outside the
cloud provider’s control.
➢This goes into having things like automatic updates on operating systems, secure
coding and monitoring logs.
➢Centralization is using services and tools that can be integrated into a single
dashboard for viewing.
➢Finally, Automation, the more you can automate your infrastructure, the quicker
you can scale and respond to incidents and issues.
Cloud Security Architecture
What is Cloud Security Architecture?
A cloud security architecture is defined by the
➢Security layers
➢Design, and
➢Structure of the platform,
➢Tools,
➢Software
➢ infrastructure, and
➢Best practices that exist within a Cloud Security Architecture
A cloud security architecture provides the written and visual model to define how
to configure and secure activities and operations within the cloud.
Security Planning
Before deploying a particular resource to the cloud, one should need to
analyze several aspects of the resource, such as:
➢A select resource needs to move to the cloud and analyze its sensitivity
to risk.
➢Consider cloud service models such as IaaS, PaaS,and These models
require the customer to be responsible for Security at different service
levels.
➢Consider the cloud type, such as public, private, community, or
➢Understand the cloud service provider's system regarding data storage
and its transfer into and out of the cloud.
➢The risk in cloud deployment mainly depends upon the service models
and cloud types.
Understanding Security of Cloud
Security Boundaries
The Cloud Security Alliance (CSA) stack model defines the boundaries between each
service model and shows how different functional units relate.
Understanding data security
Since all data is transferred using the Internet, data security in the cloud is a
major concern.
The service model should include security mechanisms working in all of the
above areas.
Separate access to data
Since the data stored in the cloud can be accessed from anywhere, we need to
have a mechanism to isolate the data and protect it from the client's direct
access.
Broker cloud storage is a way of separating storage in the Access Cloud.
In this approach, two services are created:
A broker has full access to the storage but does not have access to the client.
A proxy does not have access to storage but has access to both the client and the
broker.
1. When the client issues a request to access data:
2. The client data request goes to the external service interface of the proxy.
3. The proxy forwards the request to the broker.
4. The broker requests the data from the cloud storage system.
5. The cloud storage system returns the data to the broker.
6. The broker returns the data to the proxy.
7. Finally, the proxy sends the data to the client.
Cloud Infrastructure Security
➢Cloud infrastructure security is the practice of securing resources
deployed in a cloud environment and supporting systems.
➢ This includes physical servers, storage devices, load balancers, and network equipment like switches and
routers.
➢ Here are a few ways to secure a cloud server, typically deployed using a compute service like Amazon EC2:
➢ Control inbound and outbound communication—your server should only be allowed to connect to networks, and
specific IP ranges needed for its operations.
➢ For example, a database server should not have access to the public internet, or any other IP, except those of the
application instances it serves.
➢ Encrypt communications—whether communications go over public networks or within a secure private network,
they should be encrypted to avoid man in the middle (MiTM) attacks. Never use unsecured protocols like Telnet or
FTP. Transmit all data over HTTPS, or other secure protocols like SCP (Secure Copy) or SFTP (Secure FTP).
Use SSH keys—avoid accessing cloud servers using passwords, because they are vulnerable to
brute force attacks and can easily be compromised.
Use SSH(Shell or Secure Socket Shell) keys, which leverage public/private key cryptography for
more secure access.
Minimize privileges—only users or service roles that absolutely need access to a server should
be granted access.
Carefully control the access level of each account to ensure it can only access the specific files
and folders, and perform specific operations, needed for their role.
Avoid using the root user—any operation should be performed using identified user accounts.
3.Hypervisors
A hypervisor runs on physical hardware, and makes it possible to run several virtual machines
(VMs), each with a separate operating system.
Therefore, hypervisors are a key security concern, because compromise of the hypervisor (an
attack known as hyperjacking) gives the attacker access to all hosts and virtual machines
running on it.
➢Ensure machines running hypervisors are hardened, patched, isolated from public
networks, and physically secured in your data center
➢Assign least privileges to local user accounts, carefully controlling access to the hypervisor
➢Harden, secure, and closely monitor machines running the virtual machine
monitor (VMM) and virtualization management software, such as VMware
vSphere
➢Secure and monitor shared hardware caches and networks used by the hypervisor
➢Use Network Access Control Lists (ACL) to control access to virtual private
networks. ACLs provide both allow and deny rules.
➢Use additional security solutions such as firewalls as a service (FWaaS) and web
application firewalls (WAF) to actively detect and block malicious traffic.
Compliance
Segmentation
Data encryption
➢Ensures data at rest and traveling between internal and external cloud
connection points is encrypted to minimize breach impact.
Automation
➢ Facilitates rapid security and configuration provisioning and updates as well
as quick threat detection.
Flexible Design
Ensuring architecture design is sufficiently agile to develop and
incorporate new components and solutions without sacrificing
inherent security.
Cloud Security Architecture Issues
IaaS Cloud Security Threats
DoS attacks accomplish this by flooding the target with traffic, or sending it
Hackers append additional information within these input boxes and can create, read,
update, or delete data.
Broken authentication
If a hacker successfully logs with stolen credentials, they can misuse your privileges and
impact your company's sustainability.
Authentication protects a consumer's identity by allowing only a verified user to enter into
the system.
Security misconfigurations
Security misconfigurations are security controls that are inaccurately configured
or left insecure, putting your systems and data at risk.
Basically, any poorly documented configuration changes, default settings, or a
technical issue across any component in your endpoints could lead to a
misconfiguration.
➢The TCG develops and promotes specifications for the protection of computer
resources from threats posed by malicious.
Microsoft defines trusted computing by breaking it down into four technologies, all of
which require the use of new or improved hardware at the personal computer (PC) level:
➢Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and
programs that capture the contents of a display.
➢Sealed storage -- allows computers to securely store encryption keys and other critical
data.
➢ Privacy policy,
➢VM Sprawl
➢Network Configuration
➢ This misconfiguration can also include the physical servers, which can
become a security risk without the latest security patches and firmware.
Access Controls
➢An attacker gaining access to your virtual infrastructure, whether via
physically accessing host servers or via a compromised user account on
your management platform, can cause a lot of damage to your systems.
Security of Offline Virtual Machines
➢Offline or offsite backups are an essential part of disaster
recovery planning.
➢However, any VMs you back up offline are stuck with their security
updates and configurations from when they were last online.
➢This lack of updates will make such a VM a security risk to the rest of
your virtual environment when it is time to come back online.
Workloads with Different Trust Levels
➢Without proper security controls, it's easy to create a test server that should be
in a low trust zone, on the same physical hardware as a live production server
with sensitive information that requires a high trust zone.
➢The hypervisor is the platform that makes it possible to run virtual machines.
➢Therefore, it can become a single point of failure for your entire virtual
infrastructure without proper security measures to mitigate the risk of attacks.
Cloud Service Provider APIs
➢For organizations that run a hybrid implementation involving public
and private cloud infrastructure, intrusion attempts via APIs from your
cloud service providers are a potential risk.
➢These APIs are meant for effective communication between your virtual
environment and the cloud-hosted one, and if they are not adequately
secured, a data breach may occur.
Virtual Machine Security Recommendations
VM Security Recommendations
➢Before we entering into technical details of securing VMs, it's important to consider the
potential security vulnerabilities that are relevant to a particular host and guest OS.
• Does the guest of host contain sensitive information, such as logon details or sensitive
data? If so, how is this information protected?
➢When a VM is moved, it is important for all relevant security settings and options to
move with it.
➢For example, permissions set on virtual hard disk files, and network access details,
should be recreated on the target platform. Following Figure provides some
examples of relevant configuration settings to consider.
Virtual machines are still "machines"
Whether an operating system (OS) is running on a physical machine or within a virtual
one, it still should be regularly updated. With virtualization, there are a couple of
additional challenges:
➢First, IT departments must be aware of all VMs that are deployed in the
environment.
➢Of course, it's likely that some workloads require deviations from standard
deployments. In those cases, IT departments must remain involved in the
deployment of all new virtual machines (or, at least those that will have
access to production resources).
Security through education
➢Even though the basic concept of virtualization technology is well-planted in
most peoples' minds, users and systems administrators are often confused
about the potential use (and misuse) of virtual machines.
➢ IT departments, therefore, should verify that their staff is aware of the potential
security risks related to deploying new VMs.
➢The idea behind sandboxing is that it allows for the isolation of the application, in order to
guard it against the external malware, viruses or any threats.
➢Isolating this way keeps the system safe from untested code or applications.
➢It also helps them to upgrade the resources on time, or even remove
unnecessary applications no longer required.
➢Hypervisors usually update automatically when they are released by the vendor.
However, it is a good practice to manually check for updates from time to time.
➢The use of thin hypervisors allows for easy deployment and less overhead in
computing terms. This also has an added advantage in case there is a malicious
attack, where the malware code is unlikely to reach the hypervisor.
➢The use of network interface cards (NICs) or unused physical hardware to the
host system must be avoided.
➢Any disks that are used for backing up data should be disconnected when not
in use.
➢Guest OSes must have security between them when they are communicating.
➢This is more applicable, when the hard disk it travelling from one
location to another location.
➢ If the virtual HD is encrypted, the data cannot be read with present day
technology as it is, even if a copy of HD is stolen by the attacker.
Availability and Disaster Recovery
➢Data preservation and service availability are of primary importance
these days.
➢The use of virtualizations permits the backup of data in the form of a
large and unique file.
➢This helps in the quick reinstallation of OS and restoration of data, thus
reducing cost and time required to mitigate failures