CC_UNIT-5 NOTES
CC_UNIT-5 NOTES
Cloud security tools are specialized software solutions designed to protect and secure
data, applications, and infrastructure associated with cloud computing. These tools
address a variety of security concerns such as data privacy, unauthorized access, and
cloud service vulnerabilities. By deploying these security measures, organizations can
safeguard their cloud environments from potential threats and ensure that their
operations remain compliant with regulatory and industry standards.
There are many cloud security solutions available, and here are some of the main
categories.
These tools help in enforcing security policies and ensuring best practices in cloud
deployments. By offering a centralized view of the cloud security posture, CSPM
enables proactive risk management.
These tools are useful for managing cloud access in a secure manner, especially in
environments where BYOD (Bring Your Own Device) policies are implemented.
CASBs help align cloud usage with security policies, mitigating the risk of data
leakage and unauthorized access.
By continuously analyzing cloud activities, CDR tools also play a vital role in the
incident response process, ensuring that security teams can quickly address
vulnerabilities and attacks.
These tools also provide visibility into where sensitive data is stored, how it is
accessed, and by whom, making it easier to manage compliance. DSPM tools also
support automated remediation processes, which can quickly rectify detected
vulnerabilities, reducing the risk of data exposure.
8. API Security
API security refers to the practices and technologies used to protect APIs from being
exploited by malicious actors. As APIs facilitate the connectivity between different
software applications and services, especially in cloud environments, securing them is
essential to prevent data breaches and ensure the integrity of software interactions.
• Lightening the load. Larger CSPs often invest heavily in top-end cybersecurity
tools, as well as staff who are highly knowledgeable in their field. This makes
offloading cybersecurity tools and tasks from in-house to a third party appealing.
• Addressing the cybersecurity skills gap. The ability to defer to a CSP's security
program reduces the need to hire expensive and scarce in-house infosec talent.
Public cloud security drawbacks
Other businesses, especially larger ones with massive IT infrastructures, might find
that public cloud security is not the right fit. Potential public cloud security challenges
include the following:
• CSP security is not up to par. In some situations, organizations might determine
that a CSP's cybersecurity tools, processes and methods are insufficient for
protecting highly sensitive data.
• Inadequate visibility. Larger organizations often require the ability to obtain and
analyze logs, alerts and other data down to the packet level. For many CSPs,
especially those that deal with SaaS, much of this security information is not
accessible to customers. This is because most of the underlying technologies have
been abstracted to simplify management from a customer perspective.
Security Issues in Cloud Computing
In this, we will discuss the overview of cloud computing, its need, and mainly our
focus to cover the security issues in Cloud Computing. Let’s discuss it one by one.
Cloud Computing :
Cloud Computing is a type of technology that provides remote services on the internet
to manage, access, and store data rather than storing it on Servers or local drives. This
technology is also known as Serverless technology. Here the data can be anything like
Image, Audio, video, documents, files, etc.
For Example:
The example of multitenancy is the same as working of Bank. Multiple people can
store money in the one same bank. But every customer asset is totally different like
one customer cannot have access to the other customer’s money and account and
different customers are not aware about each other’s account balance and details etc.
Multi-tenancy is an architectural approach enabling a single instance of an application
to be shared among multiple organizations or users, and is applied only to SaaS
(Software as a service). The core principle here is, it is the single instance of the
application which is being shared. Hence, multi-instance architectures aren’t the same
as multi-tenant architectures.
Advantages of Multitenancy:
1 Use of Available resources is maximized by sharing resources.
2 Customer’s Cost of Physical Hardware System is reduces.
3 It reduce usage of physical devices and thus power consumption and cooling cost
save.
4 Save Vendor’s cost as it become difficult for cloud vendor to provide separate
Physical Services to each individual.
5 Provides isolation to user while maximizing resource utilization.
Disadvantages of Multitenancy:
• As data is stored in third party services , this reduces security of our data and put it
into vulnerable condition .
• Unauthorized access will cause damage of data.
• Possibility of competition for system resources.
It has single point of failure since there is only one instance of resource, clients face
loss of service in such cases.
Security
This is one of the most challenging and risky issues in multi-tenancy cloud
computing. There is always a risk of data loss, data theft, and hacking. The database
administrator can grant access to an unauthorized person accidentally. Despite
software and cloud computing companies saying that client data is safer than ever on
their servers, there are still security risks.
There is a potential for security threats when information is stored using remote
servers and accessed via the internet. There is always a risk of hacking with cloud
computing. No matter how secure encryption is, someone can always decrypt it with
the proper knowledge. A hacker getting access to a multitenant cloud system can
gather data from many businesses and use it to his advantage. Businesses need high-
level trust when putting data on remote servers and using resources provided by the
cloud company to run the software.
The multi-tenancy model has many new security challenges and vulnerabilities. These
new security challenges and vulnerabilities require new techniques and solutions. For
example, a tenant gaining access to someone else’s data and it’s returned to the wrong
tenant, or a tenant affecting another in terms of resource sharing.
Performance
SaaS applications are at different places, and it affects the response time. SaaS
applications usually take longer to respond and are much slower than server
applications. This slowness affects the overall performance of the systems and makes
them less efficient. In the competitive and growing world of cloud computing, lack of
performance pushes the cloud service providers down. It is significant for multi-
tenancy cloud service providers to enhance their performance.
Less Powerful
Many cloud services run on web 2.0, with new user interfaces and the latest
templates, but they lack many essential features. Without the necessary and adequate
features, multi-tenancy cloud computing services can be a nuisance for clients.
If a tenant uses a lot of the computing resources, other tenants may suffer because of
their low computing power. However, this is a rare case and only happens if the cloud
architecture and infrastructure are inappropriate.
Interoperability
Users remain restricted by their cloud service providers. Users can not go beyond the
limitations set by the cloud service providers to optimize their systems. For example,
users can not interact with other vendors and service providers and can’t even
communicate with the local applications.
This prohibits the users from optimizing their system by integrating with other service
providers and local applications. Organizations can not even integrate with their
existing systems like the on-premise data centers.
Monitoring
Constant monitoring is vital for cloud service providers to check if there is an issue in
the multi-tenancy cloud system. Multi-tenancy cloud systems require continuous
monitoring, as computing resources get shared with many users simultaneously. If
any problem arises, it must get solved immediately not to disturb the system’s
efficiency.
Capacity Optimization
Before giving users access, database administrators must know which tenant to place
on what network. The tools applied should be modern and latest that offer the correct
allocation of tenants. Capacity must get generated, or else the multi-tenancy cloud
system will have increased costs. As the demands keep on changing, multi-tenancy
cloud systems must keep on upgrading and providing sufficient capacity in the cloud
system.