0% found this document useful (0 votes)
30 views

Unit 4 - cloud computing

Cloud computing is a technology that allows users to store and access data and applications over the internet instead of local servers. It offers various services such as data storage, software delivery, and application development, with characteristics including on-demand self-service, broad network access, and rapid elasticity. There are different deployment models (public, private, hybrid, community, and multicloud) and service models (IaaS, PaaS, SaaS) that cater to diverse organizational needs.

Uploaded by

99210041525
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Unit 4 - cloud computing

Cloud computing is a technology that allows users to store and access data and applications over the internet instead of local servers. It offers various services such as data storage, software delivery, and application development, with characteristics including on-demand self-service, broad network access, and rapid elasticity. There are different deployment models (public, private, hybrid, community, and multicloud) and service models (IaaS, PaaS, SaaS) that cater to diverse organizational needs.

Uploaded by

99210041525
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

What Is Cloud Computing?

Cloud Computing means storing and accessing the data and programs on
remote servers that are hosted on the internet instead of the computer’s hard
drive or local server. Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided as a service through
the Internet to the user. The data that is stored can be files, images, documents,
or any other storable document.
The following are some of the Operations that can be performed with Cloud
Computing
 Storage, backup, and recovery of data
 Delivery of software on demand
 Development of new applications and services
 Streaming videos and audio
Understanding How Cloud Computing Works?
Cloud computing helps users in easily accessing computing resources like
storage, and processing over internet rather than local hardwares. Here we
discussing how it works in nutshell:
 Infrastructure: Cloud computing depends on remote network servers hosted
on internet for store, manage, and process the data.
 On-Demand Acess: Users can access cloud services and resources based on-
demand they can scale up or down the without having to invest for physical
hardware.
 Types of Services: Cloud computing offers various benefits such as cost
saving, scalability, reliability and acessibility it reduces capital expenditures,
improves efficiency.
Characteristics of Cloud Computing
There are many characteristics of Cloud Computing here are few of them :
1. On-demand self-services: The Cloud computing services does not require any
human administrators, user themselves are able to provision, monitor and
manage computing resources as needed.
2. Broad network access: The Computing services are generally provided over
standard networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that are
able to scale out and in quickly and on a need basis. Whenever the user require
services it is provided to him and it is scale out as soon as its requirement gets
over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage,
applications, and services) present are shared across multiple applications and
occupant in an uncommitted manner. Multiple clients are provided service from
a same physical resource.
5. Measured service: The resource utilization is tracked for each application and
occupant, it will provide both the user and the resource provider with an
account of what has been used. This is done for various reasons like monitoring
billing and effective use of resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants (users
or organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to
abstract underlying hardware resources and present them as logical resources to
users.
8. Resilient computing: Cloud computing services are typically designed with
redundancy and fault tolerance in mind, which ensures high availability and
reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing models,
including pay-per-use, subscription-based, and spot pricing, allowing users to
choose the option that best suits their needs.
10. Security: Cloud providers invest heavily in security measures to protect
their users’ data and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated, allowing
users to deploy and manage resources with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on sustainable
practices, such as energy-efficient data centers and the use of renewable energy
sources, to reduce their environmental impact.

Fig – characteristics of cloud computing

Types of cloud computing

Cloud computing can be categorized by deployment model or service type


Cloud computing is divided into four known deployment models. The
following are the types of cloud also known as cloud deployment models as
follows:
1. Public cloud
2. Private cloud
3. Hybrid cloud
4. Community cloud
5. Multicloud
1. Public Cloud
 Public clouds are managed by third parties which provide cloud services over
the internet to the public, these services are available as pay-as-you-go billing
models.
 They offer solutions for minimizing IT infrastructure costs and become a
good option for handling peak loads on the local infrastructure. Public clouds
are the go-to option for small enterprises, which can start their businesses
without large upfront investments by completely relying on public
infrastructure for their IT needs.
 The fundamental characteristics of public clouds are multitenancy. A public
cloud is meant to serve multiple users, not a single customer. A user requires
a virtual computing environment that is separated, and most likely isolated,
from other users.
Examples: Amazon EC2, IBM, Azure, GCP
Advantages of Public Cloud
The following are the advantages of public cloud:
 Public cloud is easily able to scale up and down resources as per the demand
of traffic and workload. It facilitates with performance optimization and cost
efficiency.
 It works on pay-as-you-go cloud model and helps in resolving the
investments needs in hardware and infrastructure reducing overall costs.
Disadvantages of using Public Cloud
The following are the disadvantages of Public Cloud:
 It is difficult to trust and maintain data to a third-party provider may raise
concerns about control and ownership
 The shared infrastructure of public cloud resources increases the risk of data
breaches and unauthorized access. It raises security and privacy concerns.
 Public cloud comes with limited transparency about the underlying
infrastructure which may make it challenging to monitor and manage
performance effectively.
2. Private cloud
 Private clouds are distributed systems that work on private infrastructure and
provide the users with dynamic provisioning of computing resources. Instead
of a pay-as-you-go model in private clouds, there could be other schemes that
manage the usage of the cloud and proportionally billing of the different
departments or sections of an enterprise. Private cloud providers are HP Data
Centers, Ubuntu, Elastic-Private cloud, Microsoft, etc.
Examples: VMware vCloud Suite, OpenStack, Cisco Secure Cloud, Dell Cloud
Solutions, HP Helion Eucalyptus

Advantages Of Private Cloud


 Customer information protection: In the private cloud security concerns
are less since customer data and other sensitive information do not flow out
of private infrastructure.
 Infrastructure ensuring SLAs: Private cloud provides specific operations
such as appropriate clustering, data replication, system monitoring, and
maintenance, disaster recovery, and other uptime services.
 Compliance with standard procedures and operations: Specific
procedures have to be put in place when deploying and executing
applications according to third-party compliance standards. This is not
possible in the case of the public cloud.
Disadvantages Of Private Cloud
 The restricted area of operations: Private cloud is accessible within a
particular area. So the area of accessibility is restricted.
 Expertise requires: In the private cloud security concerns are less since
customer data and other sensitive information do not flow out of private
infrastructure. Hence skilled people are required to manage & operate cloud
services.
3. Hybrid cloud
 A hybrid cloud is a heterogeneous distributed system formed by combining
facilities of the public cloud and private cloud. For this reason, they are also
called heterogeneous clouds.
 A major drawback of private deployments is the inability to scale on-demand
and efficiently address peak loads. Here public clouds are needed. Hence, a
hybrid cloud takes advantage of both public and private clouds.
 Examples: AWS Outposts, Azure Stack, Google Anthos, IBM Cloud
Satellite, Oracle Cloud at Customer
Advantages of using Hybrid cloud
The following are the advantages of using Hybrid Cloud:
 Hybrid cloud is available at a cheap cost than other clouds because it is
formed by a distributed system.
 It works comes up with working fast with lower cost and facilitates in
reducing the latency of the data transfer process.
 Most important thing is security. A hybrid cloud is totally safe and secure
because it works on the distributed system network.
Disadvantages of Using Hybrid Cloud
The following are the disadvantages of using Hybrid Cloud:
 It’s possible that businesses lack the internal knowledge necessary to create
such a hybrid environment. Managing security may also be more challenging.
Different access levels and security considerations may apply in each
environment.
 Managing a hybrid cloud may be more difficult. With all of the alternatives
and choices available today, not to mention the new PaaS components and
technologies that will be released every day going forward, public cloud and
migration to public cloud are already complicated enough. It could just feel
like a step too far to include hybrid.
4. Community Cloud
 Community clouds are distributed systems created by integrating the services
of different clouds to address the specific needs of an industry, a community,
or a business sector. But sharing responsibilities among the organizations is
difficult.
 In the community cloud, the infrastructure is shared between organizations
that have shared concerns or tasks. An organization or a third party may
manage the cloud.
 Examples: CloudSigma, Nextcloud, Synology C2, OwnCloud, Stratoscale

Advantages of Using Community Cloud


The following are the advantages of using Community Cloud:
 Because the entire cloud is shared by numerous enterprises or a community,
community clouds are cost-effective.
 Because it works with every user, the community cloud is adaptable and
scalable. Users can alter the documents according to their needs and
requirements.
 Public cloud is less secure than the community cloud, which is more secure
than private cloud.
 Thanks to community clouds, we may share cloud resources, infrastructure,
and other capabilities between different enterprises.
Disadvantages of using Community Cloud
The following are the disadvantages of using Community Cloud:
 Not all businesses should choose community cloud.
 Gradual adoption of data
 It’s challenging for corporations to share duties.
Applications Of Community clouds
The following are the applications of community clouds:
 Media industry: Media companies are looking for quick, simple, low-cost
ways for increasing the efficiency of content generation. Most media
productions involve an extended ecosystem of partners. In particular, the
creation of digital content is the outcome of a collaborative process that
includes the movement of large data, massive compute-intensive rendering
tasks, and complex workflow executions.
 Healthcare industry: In the healthcare industry community clouds are used
to share information and knowledge on the global level with sensitive data in
the private infrastructure.
 Energy and core industry: In these sectors, the community cloud is used to
cluster a set of solution which collectively addresses the management,
deployment, and orchestration of services and operations.
 Scientific research: In this organization with common interests in science
share a large distributed infrastructure for scientific computing.
5. Multicloud
 Multicloud is the use of multiple cloud computing services from different
providers, which allows organizations to use the best-suited services for their
specific needs and avoid vendor lock-in.
 This allows organizations to take advantage of the different features and
capabilities offered by different cloud providers.
 Examples: Cloud Foundry, Kubernetes, Apache Mesos, Red Hat OpenShift,
Docker Swarm
Advantages of using Multi-Cloud
The following are the advantages of using multi-cloud:
 Flexibility: Using multiple cloud providers allows organizations to choose
the best-suited services for their specific needs, and avoid vendor lock-in.
 Cost-effectiveness: Organizations can take advantage of the cost savings and
pricing benefits offered by different cloud providers for different services.
 Improved performance: By distributing workloads across multiple cloud
providers, organizations can improve the performance and availability of
their applications and services.
 Increased security: Organizations can increase the security of their data and
applications by spreading them across multiple cloud providers and
implementing different security strategies for each.
Disadvantages of using Multi-Cloud
The following are the disadvantages of using Multi-Cloud:
 Complexity: Managing multiple cloud providers and services can be
complex and require specialized knowledge and expertise.
 Increased costs: The cost of managing multiple cloud providers and services
can be higher than using a single provider.
 Compatibility issues: Different cloud providers may use different
technologies and standards, which can cause compatibility issues and require
additional resources to resolve.
 Limited interoperability: Different cloud providers may not be able to
interoperate seamlessly, which can limit the ability to move data and
applications between them.
Difference Between Public Cloud, Private Cloud And Hybrid Cloud
The following are the differences between public, private and Hybrid Clouds:

Aspect Public Cloud Private Cloud Hybrid Cloud

It shares the
It is dedicated to It is combination
resources among
Infrastructure a single of both public and
multiple
organization private clouds
organizations

Its Initial
It costs as per It varies depending
investment for
Pay-as-you-go on usage of public
Cost infrastructure,
model being and private
potentially higher
cost-effective resources
operational costs

Control It have less It has full control It varies, but


Aspect Public Cloud Private Cloud Hybrid Cloud

control over over typically more


infrastructure infrastructure control than public
cloud alone

It is highly It is scalable, but It is scalable and


scalable, may require facilitates with
Scalability resources additional enhancing both
available on- investment for public and private
demand scaling resources

Security is
managed by Security concerns
Higher level of
cloud provider, must be addressed
Security control over
varying levels of for both public and
security measures
security private components
measures

Offers flexibility Flexible, but may Provides flexibility


in resource require additional to leverage best of
Flexibility
allocation and setup and both public and
usage management private clouds
Aspect Public Cloud Private Cloud Hybrid Cloud

Organizations
Private clouds using a
Amazon Web hosted on- combination of
Examples Services (AWS), premises or by public and private
Microsoft Azure third-party clouds, such as
providers AWS Outposts or
Azure Stack

Cloud Service Models


There are the following three types of cloud service models -

1. Infrastructure as a Service (IaaS)


2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
Infrastructure as a Service (IaaS)

IaaS is also known as Hardware as a Service (HaaS). It is a computing


infrastructure managed over the internet. The main advantage of using IaaS is that
it helps users to avoid the cost and complexity of purchasing and managing the
physical servers.

Characteristics of IaaS
There are the following characteristics of IaaS -

o Resources are available as a service


o Services are highly scalable
o Dynamic and flexible
o GUI and API-based access
o Automated administrative tasks
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure,
Google Compute Engine (GCE), Rackspace, and Cisco Metacloud.
Platform as a Service (PaaS)

PaaS cloud computing platform is created for the programmer to develop, test, run,
and manage the applications.

Characteristics of PaaS
There are the following characteristics of PaaS -

o Accessible to various users via the same development application.


o Integrates with web services and databases.
o Builds on virtualization technology, so resources can easily be scaled up or
down as per the organization's need.
o Support multiple languages and frameworks.
o Provides an ability to "Auto-scale".
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google
App Engine, Apache Stratos, Magento Commerce Cloud, and OpenShift.

To know more about PaaS, click here.

Software as a Service (SaaS)

SaaS is also known as "on-demand software". It is a software in which the


applications are hosted by a cloud service provider. Users can access these
applications with the help of internet connection and web browser.

Characteristics of SaaS
There are the following characteristics of SaaS -

o Managed from a central location


o Hosted on a remote server
o Accessible over the internet
o Users are not responsible for hardware and software updates. Updates are
applied automatically.
o The services are purchased on the pay-as-per-use basis
Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco
WebEx, ZenDesk, Slack, and GoToMeeting.
Difference between IaaS, PaaS, and SaaS

The below table shows the difference between IaaS, PaaS, and SaaS –

Parameter IaaS PaaS SaaS


It gives users online
It provides virtualized It gives developers a
access to software
computing resources platform to create and
applications that are
Definition (server, storage, and deploy apps without having
hosted and
networking) over the to manage the underlying
controlled by a
internet. infrastructure.
different supplier.
Infrastructure as a Software as a
Stand for Platform as a Service
Service Service
Used By Network Architect Developers End Users.
Scalable and
Cost-effective, increased
accessible,
Affordable, flexible, productivity, easy
Pros affordable, easy to
accessible, reliable scalability, easy
upgrade, easy
accessibility
deployment
Lack of control, Data Compatibility issue, vendor Insufficient data
Cons
security issue changes security, less control
Amazon Web Service
Example (AWS), Microsoft Heroku, OpenShift, Google Workspace,
Services Azure, Google Cloud Beanstalk, Apache Stratos Salesforce, Dropbox
Platform

Advantages of Cloud Service Models

Cost Efficiency: Cloud providers provide a pricing model that permits customers
to pay only for the sources they consume. This gets rid of the need for advanced
infrastructure investments and allows price efficiency as businesses scale resources
based totally on need.

Scalability: Cloud services provide the potential to scale sources up or down


speedily and respond to changing workloads and commercial organization
requirements. This flexibility ensures that agencies can correctly manipulate
fluctuating needs without over-provisioning.

Accessibility and Flexibility: Cloud computing allows one to get access to


applications and facts remotely from everywhere with an internet connection. This
fosters collaboration among geographically dispersed groups and allows users to
work flexibly.

Rapid Deployment: Cloud provider models facilitate rapid deployment of


programs. Users can provision sources and deploy programs quickly, decreasing
time-to-market and allowing faster innovation.

Managed Services: Cloud providers offer more than a few managed offerings,
managing duties together with safety, tracking, and safety. This helps agencies
dump operational obligations, pay attention to relevant skills, and experience the
records of cloud carriers.

Automatic Updates and Patch Management: Cloud providers manipulate


software application updates, patches, and protection functions robotically. This
ensures that clients always have to get proper entry to the required abilities and
protection upgrades without the need for guide intervention.

Disadvantages of Cloud Service Models

Security Concerns: Security remains a top concern for companies moving to the
cloud. Storing information and programs on out-of-door servers will increase
questions on statistics' privateness, regulatory compliance, and the functionality of
unauthorized access.

Dependency on Internet Connectivity: Cloud services require a reliable internet


connection. Downtime or disruptions in internet connectivity can impact the right
to access essential applications and information, affecting business operations.

Limited Customization in SaaS: While SaaS offers convenience, it is able to lack


the extent of customization that a few organizations require. Users depend on the
capabilities and configurations supplied by the useful resources of the SaaS
company, restricting flexibility.

Data Transfer Costs: Moving huge volumes of records from the cloud can require
extra charges. Organizations need to cautiously recollect and manipulate facts and
switch fees, in particular at the same time as dealing with enormous amounts of
records.

Vendor Lock-In: Adopting certain cloud providers can also result in provider
lock-in, wherein it becomes hard to migrate packages and statistics to a different
employer or again to on-premises surroundings. This can limit flexibility and cause
lengthy periods of dependence on a specific cloud organization.

Potential for Downtime: Cloud company companies may also experience outages
or downtime, impacting the supply of services. While respectable businesses try
for immoderate availability, occasional disruptions can occur, affecting users who
get proper entry to agency continuity.

Cloud compliance
Cloud compliance refers to the process of ensuring that cloud computing services
and infrastructures adhere to regulatory, legal, and industry-specific requirements.
Organizations using cloud services must comply with various standards to protect
data, maintain security, and meet legal obligations.

Key Aspects of Cloud Compliance:

1. Regulatory Requirements – Organizations must follow laws and industry


regulations such as:
o GDPR (General Data Protection Regulation) – Protects personal
data of EU citizens.
o HIPAA (Health Insurance Portability and Accountability Act) –
Ensures the security of healthcare data.
o PCI DSS (Payment Card Industry Data Security Standard) –
Governs the handling of credit card information.
o ISO 27001 – International standard for information security
management.
o SOC 2 (Service Organization Control 2) – Ensures security,
availability, and confidentiality of cloud services.
2. Cloud Security & Data Protection – Compliance frameworks require
encryption, access controls, and continuous monitoring to protect data.
3. Shared Responsibility Model – Cloud compliance is a joint effort between
the cloud service provider (CSP) and the customer.
o Cloud provider's responsibility – Security of the cloud
(infrastructure, physical security, and network controls).
o Customer's responsibility – Security in the cloud (data protection,
access management, and application security).
4. Auditing & Reporting – Regular audits and reports (such as SOC 2 or ISO
27001 certifications) help prove compliance.
5. Compliance Automation – Cloud-native tools (AWS Config, Azure Policy,
Google Security Command Center) help automate compliance monitoring.

Challenges in Cloud Compliance:

 Multi-cloud & Hybrid Environments – Ensuring consistency across


multiple cloud platforms.
 Data Residency & Sovereignty – Compliance with regulations that require
data to stay in specific geographic regions.
 Evolving Regulations – Keeping up with changing compliance
requirements.
 Vendor Risk Management – Assessing third-party cloud providers for
compliance.

Why get HIPAA and PCI compliant?


PCI DSS and HIPAA Compliance are two very different compliance
standards with the general purpose of protecting sensitive data.

HIPAA (Health Insurance Portability and Accountability Act) as a federal law


(1996) has mandated the creation of administrative, physical, and technical
safeguards to protect PHI (patient health information) from data breaches. These
safeguards must be implemented by healthcare organizations and include security
awareness training, access controls, biometric scanners, antivirus software, etc.

HIPAA has established several rules for protecting patient information’s privacy,
security, and confidentiality—Privacy rules, Security rules, Breach notification
rules, Omnibus rule, etc. It has also granted specific rights to patients to ensure
control over their sensitive information.

The PCI data security standard protects cardholder data from theft, loss, or
unauthorized access. It ensures that entities that accept, process, or transmit
cardholder data follow a set of requirements and best practices to prevent breaches
and maintain a secure CDE (cardholder environment). It covers 12 detailed
requirements to ensure safe credit card transactions with various security controls
like network security, access controls, encryption, etc.

Organizations in the healthcare industry (healthcare professionals, healthcare


clearinghouses etc.) accepting credit card payments are required to get PCI and
HIPAA compliant. They are also looking to:

Avoid fines and penalties


HIPAA and PCI DSS are legal compliance obligations with severe fines and
penalties for non-adherence. HIPAA violations can cost you anywhere from $127
to $250,000, and PCI DSS non-compliance fines can go from $5000 per month to
$100000 per month.
Build trust in the market
Maintaining a security profile or a trust page with PCI DSS and HIPAA
Compliance can enhance your market perception. Compliance confidence assures
customers about the safety of their data and helps businesses gain a competitive
advantage.

Reduce data breach risks


The healthcare industry is a lucrative target for criminals, making it an industry
with the highest number of attacks and breaches. Stolen payment information is yet
another popular breach case scenario. These security breaches impact customers
and the organization with reputational and financial consequences. The average
cost of breaches in both these industries can reach millions of dollars, and
achieving compliance minimizes this costly risk.

Pitch to global clients


PCI is a globally recognized standard, while HIPAA is required for businesses
handling the PHI of U.S. residents. Compliance with these regulations can fast-
track the international expansion process and shorten the sales cycle.

Difference between PCI DSS and HIPAA Compliance


PCI and HIPAA are centered around protecting different kinds of information
applicable to specific industries. The way these regulations need to be interpreted
and enforced also varies.

Let’s look at the major differences between HIPAA vs PCI:


Scope of information protected
HIPAA and PCI DSS safeguard very different types of data.

 HIPAA aims to protect the confidentiality, integrity, and availability


of PHI (protected health information) like medical records, treatment
information, personal details, etc.
 PCI DSS ensures the safeguard of cardholder data such as credit card
numbers, CVVs, etc. by controlling how data is accessed and processed.
Covered organizations

 HIPAA applies to entities in the healthcare sector. These include healthcare


providers, health plans, and clearinghouses.
 PCI DSS standard applies to the payment card industry. Merchants, payment
processors, and service providers that collect, process, or store sensitive
cardholder information must adhere to PCI regulations.

Enforcement authority

 HIPAA is enforced by the Office for Civil Rights (OCR) under the U.S.
Department of Health and Human Services (HHS), making it a regulatory
law (since 1996).
 PCI DSS is not a government regulation and is rather enforced by the PCI
Security Council (PSC) formed by major credit card brands. These include
Visa, Mastercard, American Express, Discover Financial Services, and JCB
International.

Control interpretation

 HIPAA contains 2 types of security measures-addressable and required. The


addressable measures can be interpreted as per the organization’s context but
must satisfy the objectives specified by HIPAA. Required controls are
required to be implemented as mandated by HIPAA rules.
 Although the requirements have been specified in detail for PCI, these are
not mandatory. If an organization cannot comply with a requirement, it can
implement compensatory controls to mitigate the intended risks.

Certification process

 HIPAA does not have a formal certification process. However, the OCR or
HHS can conduct audits and investigations to verify if the organization
adheres to HIPAA rules. Organizations should, therefore, conduct frequent
self-assessments to ensure HIPAA compliance.
 In the case of PCI DSS, smaller organizations are required to fill out a Self-
assessment Questionnaire (SAQ). Larger organizations must undergo a
Qualified Security Assessors (QSA) assessment and obtain a Report on
Compliance (ROC).

Continual vs point-in-time assessment

 HIPAA is a continual assessment, which means in the case of an external


party risk assessment, compliance is verified from year to year.
 For PCI DSS, the organization must comply with the standard throughout
the year, but the assessment verifies the compliance at a specific time (for a
particular period).
Similarities between PCI DSS and HIPAA Compliance
Even with differences in scope and applicability, the frameworks share a common
purpose and some common compliance requirements.

Let’s have a look at these similarities:

Focus on data security


The primary goal of both standards is to protect critical and sensitive data. Both
frameworks advocate conducting risk assessments and vulnerability scans to
identify potential threats to ensure data security.

Non-compliance consequences
Non-compliance with these frameworks attracts serious repercussions—
fines, penalties, lawsuits, increased scrutiny, and reputational damage. However,
the degree of these consequences can differ based on the severity of violations.
Control overlap
There are several overlapping controls for both these frameworks. Check out the
key requirements on common controls:

Common control for PCI and


Control
HIPAA?

Risk Assessment Yes

Information System Activity Review Yes

Access Control and Access Management Yes

Security Roles & Responsibilities Yes

Workforce Security Yes

Entry & Exit Process Yes

Awareness & Training Program Yes

Protection from Malware Yes

Log-in Monitoring Yes

Account & Password Management Yes

Incident Response Plan Yes

Transmission Security Yes


Contingency Plan No, applies only to HIPAA

Evaluation Program Yes

Third-Party Security Yes

Physical Security Yes

Device & Media Control Yes

Policies and Procedures Documentation Yes

Integrity Protection No, applies only to HIPAA

Denial of Service No, applies only to HIPAA

Workstation Security Yes

Standard Operating Procedures Yes

Case Study 1: PCI DSS Compliance – Retail Company

Company: Large Online Retailer

Challenge:

A major online retailer handling millions of transactions struggled with PCI DSS
compliance due to:

 Storing unencrypted credit card data.


 Weak access control policies.
 Lack of network segmentation between payment systems and other
applications.
 Inconsistent security monitoring.

Solution:

1. Encryption & Tokenization – Implemented encryption for stored


cardholder data and tokenization to reduce exposure.
2. Network Segmentation – Isolated payment processing systems from non-
sensitive environments to minimize risk.
3. Access Control – Adopted multi-factor authentication (MFA) and role-
based access controls.
4. Continuous Monitoring – Deployed security information and event
management (SIEM) tools to detect threats.
5. Regular Audits & Penetration Testing – Engaged third-party auditors to
validate compliance and conduct security testing.

Here’s a breakdown of implementation strategies for PCI DSS


compliance in cloud environments.

Objective: Protect cardholder data and ensure secure payment


processing.
Key Implementation Strategies:

A. Secure Data Storage & Encryption

 Encrypt cardholder data at rest and in transit using strong


encryption (AES-256).
 Use tokenization to replace sensitive data with a non-sensitive
equivalent.
 Avoid storing sensitive authentication data (CVV, full card
number) post-authorization.

B. Implement Access Controls

 Enforce role-based access control (RBAC) and least privilege


principle.
 Require multi-factor authentication (MFA) for accessing
payment data.
 Regularly review and update user access rights.

C. Secure Network Architecture

 Use network segmentation to isolate payment processing systems


from other services.
 Deploy firewalls and intrusion detection systems (IDS/IPS) to
prevent unauthorized access.
 Implement end-to-end encryption (E2EE) for payment
transactions.

D. Continuous Monitoring & Logging

 Enable real-time logging using tools like AWS CloudTrail, Azure


Monitor, or Google Cloud Logging.
 Implement Security Information and Event Management
(SIEM) tools to detect anomalies.
 Conduct vulnerability scans and penetration testing regularly.

E. Compliance Automation & Reporting

 Use cloud compliance tools like:


o AWS PCI DSS Quick Start
o Azure Security Center PCI Blueprint
o Google Security Command Center
 Maintain an incident response plan for breaches.
 Schedule periodic PCI DSS audits.

Outcome:

 Achieved full PCI DSS compliance and reduced cardholder data risks.
 Prevented potential fines and legal issues.
 Improved customer trust and payment security.
Case Study 2: HIPAA Compliance – Healthcare Provider

Company: A National Healthcare Network

Challenge:

A healthcare provider handling electronic health records (EHR) faced HIPAA


compliance challenges, including:

 Lack of encryption for patient data.


 Weak authentication mechanisms.
 Poor vendor management (third-party software handling patient
information).
 Inadequate employee training on HIPAA policies.

Solution:

1. Data Encryption – Encrypted patient records in transit and at rest.


2. Identity & Access Management – Enforced strict role-based access control
(RBAC) and MFA for medical staff.
3. Vendor Risk Management – Conducted risk assessments for third-party
service providers and ensured Business Associate Agreements (BAAs)
were in place.
4. Employee Training – Provided mandatory HIPAA compliance training for
all employees handling patient data.
5. Automated Compliance Monitoring – Used cloud-native tools (AWS
GuardDuty, Azure Security Center) for real-time compliance tracking.

Objective: Protect electronic protected health information (ePHI) and ensure data
privacy.
Key Implementation Strategies:

A. Data Encryption & Privacy

 Encrypt ePHI using AES-256 in storage and TLS 1.2+ in transit.


 Enable de-identification and anonymization of patient data.
 Use cloud-native key management systems (KMS) to control encryption
keys.

B. Access Management & Identity Controls

 Implement Identity and Access Management (IAM) policies.


 Enforce multi-factor authentication (MFA) for all privileged users.
 Regularly review access logs to prevent unauthorized access.

C. Secure Data Storage & Backups

 Use HIPAA-compliant cloud storage (e.g., AWS S3 with encryption,


Google Cloud Healthcare API).
 Enable automatic backups with immutability to prevent data tampering.
 Store backups in a geographically redundant location.

D. Security Monitoring & Compliance Audits

 Enable continuous monitoring using SIEM tools like Splunk, AWS


GuardDuty, or Microsoft Defender.
 Conduct HIPAA risk assessments and document remediation actions.
 Use automated compliance frameworks like:
o AWS HealthLake (for HIPAA-compliant data processing)
o Azure Blueprints for HIPAA
o Google Cloud’s Compliance Frameworks

E. Vendor & Third-Party Risk Management

 Ensure Business Associate Agreements (BAA) with all third-party vendors


handling ePHI.
 Verify vendor security certifications (SOC 2 Type II, HITRUST, etc.).
 Conduct periodic security reviews and audits of external service providers.

Outcome:

 HIPAA compliance achieved, avoiding fines and legal actions.


 Improved security posture and reduced risk of data breaches.
 Increased patient confidence in data privacy protections.

Benefits in cloud computing

Cloud computing offers numerous benefits to organizations of all sizes, enabling


efficiency, scalability, and cost savings. Here are the key advantages:

1. Cost Savings

 Pay-as-you-go pricing – Only pay for the resources you use, reducing
capital expenses (CapEx).
 No hardware maintenance – Cloud providers manage infrastructure,
eliminating hardware costs.
 Lower operational costs – Automated scaling and managed services reduce
IT management expenses.
2. Scalability & Flexibility

 On-demand scaling – Easily scale resources up or down based on demand.


 Global reach – Deploy applications in multiple geographic regions with
minimal effort.
 Elasticity – Handle sudden traffic spikes without infrastructure investment.

3. Security & Compliance

 Built-in security – Cloud providers offer security tools like encryption,


IAM, and firewalls.
 Compliance support – Many clouds comply with HIPAA, PCI DSS,
GDPR, SOC 2, and more.
 Disaster recovery – Automatic backups, redundancy, and failover options
ensure data availability.

4. Performance & Speed

 High availability – Cloud infrastructure is designed for minimal downtime.


 Content delivery networks (CDN) – Improve app and website load speeds
by serving content from edge locations.
 Optimized performance – Managed services like auto-scaling and load
balancing enhance efficiency.

5. Innovation & Productivity

 Rapid deployment – Launch applications within minutes instead of weeks.


 AI & Big Data integration – Access advanced tools for analytics, machine
learning, and automation.
 Collaboration tools – Cloud-based collaboration (Google Workspace,
Microsoft 365) improves teamwork.

6. Business Continuity & Reliability

 Automatic backups – Data is replicated across multiple locations.


 Disaster recovery – Quick recovery options in case of failure.
 99.9%+ uptime guarantees – Major cloud providers offer SLA-backed
uptime.

7. Environmentally Friendly

 Energy efficiency – Cloud data centers optimize power usage.


 Reduced carbon footprint – Fewer physical servers mean less waste and
lower energy consumption.

Cloud computing provides businesses with cost-effective, scalable, and secure


solutions for modern IT needs. Whether for startups or enterprises, leveraging
cloud services boosts efficiency, security, and innovation.

Security challenges in cloud computing

Cloud computing offers many benefits, but it also presents several security
challenges that organizations must address. Here are the most critical security
concerns:

1. Data Breaches & Data Leaks

 Cloud environments store vast amounts of sensitive data, making them


prime targets for cyberattacks.
 Misconfigurations, weak access controls, and unencrypted data can lead to
breaches.
 Solution: Implement strong encryption (AES-256), multi-factor
authentication (MFA), and continuous security monitoring.

2. Insecure APIs & Interfaces

 Cloud services rely on APIs for communication, but weakly secured APIs
can be exploited by attackers.
 Publicly exposed APIs may have vulnerabilities that lead to unauthorized
access.
 Solution: Use secure authentication (OAuth, JWT), API gateways, and
perform regular security testing.

3. Misconfigurations & Human Errors

 Common mistakes include publicly exposed storage buckets, weak identity


access policies, and improper security group settings.
 Misconfigurations account for a significant number of cloud security
incidents.
 Solution: Use Cloud Security Posture Management (CSPM) tools,
conduct automated compliance checks, and enforce least privilege access.

4. Identity & Access Management (IAM) Weaknesses

 Poor IAM policies can allow unauthorized access to sensitive cloud


resources.
 Stolen credentials and privilege escalation attacks can compromise systems.
 Solution: Implement zero-trust security, enforce MFA, and regularly
review IAM policies.

5. Insider Threats

 Employees, contractors, or vendors with access to cloud resources may


intentionally or unintentionally cause harm.
 Solution: Implement user behavior analytics (UBA), strict role-based
access control (RBAC), and monitor for suspicious activities.

6. Compliance & Legal Risks

 Organizations using the cloud must comply with GDPR, HIPAA, PCI DSS,
SOC 2, ISO 27001, and other regulatory requirements.
 Data residency laws require certain data to remain within specific
geographic regions.
 Solution: Choose compliant cloud providers, use data classification, and
maintain audit logs.

7. Data Loss & Lack of Backups

 Cloud providers offer high availability, but accidental deletions,


ransomware attacks, or service outages can still cause data loss.
 Solution: Implement automated backups, data redundancy, and disaster
recovery plans.

8. DDoS (Distributed Denial of Service) Attacks

 Cloud services can be overwhelmed by large-scale DDoS attacks, causing


downtime.
 Solution: Use cloud-based DDoS protection (AWS Shield, Azure DDoS
Protection, Google Cloud Armor) and rate limiting for APIs.

9. Shared Responsibility Model Risks

 Cloud providers secure the infrastructure, but customers are responsible for
securing data, applications, and access controls.
 Many organizations fail to properly configure security settings.
 Solution: Understand the shared responsibility model and follow best
practices for cloud security.

10. Lack of Cloud Security Expertise

 Many organizations lack skilled professionals who understand cloud security


risks.
 Improper configurations and poor security management lead to
vulnerabilities.
 Solution: Train employees, use cloud security certifications (AWS
Certified Security, Azure Security Engineer, Google Cloud Security
Engineer), and adopt managed security services.

Security Threats

Cloud computing introduces unique security risks that organizations must address
to protect data and infrastructure. Here are the most critical security threats in
cloud environments:

1. Data Breaches & Data Leaks


 Cause: Misconfigurations, weak authentication, or malware attacks can
expose sensitive data.
 Impact: Financial loss, reputational damage, and regulatory penalties
(GDPR, HIPAA, PCI DSS).
 Mitigation:
o Encrypt data at rest and in transit (AES-256, TLS 1.2+).
o Use multi-factor authentication (MFA).
o Enforce zero-trust security models.

2. Account Hijacking

 Cause: Phishing, weak passwords, or stolen credentials can lead to


unauthorized access.
 Impact: Attackers can modify or delete critical data, inject malware, or
impersonate users.
 Mitigation:
o Implement multi-factor authentication (MFA).
o Monitor login activities for suspicious behavior.
o Enforce strong password policies and passwordless authentication.

3. Insecure APIs & Interfaces

 Cause: Poorly secured APIs expose cloud services to attacks like SQL
injection or DDoS.
 Impact: Attackers can exploit API vulnerabilities to steal data or disrupt
services.
 Mitigation:
o Use secure authentication (OAuth, JWT, API Gateway).
o Implement rate limiting and IP whitelisting.
o Perform regular API security testing.

4. Misconfigurations

 Cause: Exposed S3 buckets, default passwords, overly permissive access


controls.
 Impact: Unauthorized access, data leaks, and compliance violations.
 Mitigation:
o Use Cloud Security Posture Management (CSPM) tools.
o Implement least privilege access and IAM policies.
o Conduct automated security audits.

5. Insider Threats

 Cause: Employees, contractors, or partners misusing credentials or data.


 Impact: Data theft, system sabotage, or compliance violations.
 Mitigation:
o Enforce role-based access control (RBAC).
o Monitor user activity with UEBA (User and Entity Behavior
Analytics).
o Conduct security awareness training.

6. Distributed Denial-of-Service (DDoS) Attacks

 Cause: Attackers flood cloud resources with excessive traffic, causing


service outages.
 Impact: Downtime, loss of revenue, and reputation damage.
 Mitigation:
o Use DDoS protection services (AWS Shield, Azure DDoS
Protection, Google Cloud Armor).
o Implement rate limiting and firewall rules.
o Distribute traffic using Content Delivery Networks (CDN).

7. Lack of Visibility & Monitoring

 Cause: Cloud environments are dynamic, making security monitoring


challenging.
 Impact: Delayed threat detection, compliance failures, and data loss.
 Mitigation:
o Deploy SIEM (Security Information and Event Management)
tools.
o Use cloud-native security monitoring (AWS GuardDuty, Azure
Security Center, Google Security Command Center).
o Enable real-time logging and alerting.

8. Compliance Violations

 Cause: Failing to meet regulatory requirements (GDPR, HIPAA, PCI DSS,


SOC 2).
 Impact: Legal penalties, data loss, and loss of customer trust.
 Mitigation:
o Conduct regular compliance audits.
o Use automated compliance tools (AWS Audit Manager, Azure
Compliance Center).
o Implement data localization and access controls.

9. Data Loss & Inadequate Backups


 Cause: Accidental deletions, malware attacks, or lack of redundancy.
 Impact: Permanent data loss and operational disruptions.
 Mitigation:
o Implement automated cloud backups.
o Use immutable storage to prevent data tampering.
o Test disaster recovery (DR) plans regularly.

10. Supply Chain Attacks

 Cause: Compromised third-party software, libraries, or cloud services.


 Impact: Attackers can inject malicious code or gain backdoor access.
 Mitigation:
o Vet third-party providers before integration.
o Use software composition analysis (SCA) tools to check
dependencies.
o Apply timely security patches and updates.

Vulnerabilities in cloud computing

Cloud computing introduces various security vulnerabilities that organizations


must address to protect their data and infrastructure. Below are the most common
vulnerabilities and how to mitigate them.

1. Misconfigured Cloud Storage

 Cause: Publicly exposed storage buckets, improper access control settings,


and default permissions.
 Impact: Unauthorized access, data leaks, and compliance violations (GDPR,
HIPAA, PCI DSS).
 Mitigation:
o Use least privilege access and IAM policies.
o Regularly audit cloud storage settings (AWS S3, Azure Blob, Google
Cloud Storage).
o Enable encryption at rest and in transit.

2. Weak Identity & Access Management (IAM)

 Cause: Poorly enforced authentication, lack of Multi-Factor


Authentication (MFA), excessive privileges.
 Impact: Unauthorized access, privilege escalation, and insider threats.
 Mitigation:
o Implement Zero Trust security model.
o Enforce MFA and use role-based access control (RBAC).
o Regularly review and update IAM policies.

3. Insecure APIs & Endpoints

 Cause: Exposed cloud APIs, lack of authentication, weak security


configurations.
 Impact: Attackers can exploit vulnerabilities to steal data or disrupt
services.
 Mitigation:
o Use secure API authentication (OAuth, JWT, API keys).
o Implement rate limiting and input validation.
o Conduct regular API security testing.

4. Insufficient Data Encryption


 Cause: Unencrypted data in transit or at rest, weak encryption algorithms.
 Impact: Data exposure if intercepted by attackers.
 Mitigation:
o Use AES-256 encryption for data at rest.
o Enforce TLS 1.2+ for data in transit.
o Use Cloud Key Management Services (KMS) to manage encryption
keys securely.

5. Shared Responsibility Model Misunderstanding

 Cause: Assuming cloud providers handle all security measures instead of


implementing necessary customer-side protections.
 Impact: Data breaches due to misconfigured settings or lack of security
controls.
 Mitigation:
o Understand shared responsibility model for your cloud provider
(AWS, Azure, GCP).
o Regularly audit configurations and implement cloud security best
practices.

6. Lack of Cloud Security Monitoring

 Cause: Failure to monitor cloud environments for unauthorized access and


anomalies.
 Impact: Delayed detection of breaches and malicious activities.
 Mitigation:
o Use Security Information and Event Management (SIEM) tools.
o Enable real-time logging and alerting (AWS CloudTrail, Azure
Monitor, Google Cloud Logging).
o Implement User and Entity Behavior Analytics (UEBA).

7. Insecure Third-Party Integrations

 Cause: Unverified software, plugins, and cloud services with security flaws.
 Impact: Attackers can exploit vulnerabilities in third-party services to gain
access to your environment.
 Mitigation:
o Perform vendor security assessments before integration.
o Ensure third-party applications meet compliance standards.
o Regularly update and patch third-party software.

8. Distributed Denial-of-Service (DDoS) Attacks

 Cause: Cloud services overwhelmed by excessive traffic from attackers.


 Impact: Service outages, degraded performance, and downtime.
 Mitigation:
o Use DDoS protection services (AWS Shield, Azure DDoS
Protection, Google Cloud Armor).
o Deploy auto-scaling and load balancing to handle sudden traffic
spikes.

9. Lack of Secure Backup & Disaster Recovery

 Cause: No backup strategy or reliance on a single cloud provider without


redundancy.
 Impact: Data loss due to accidental deletions, ransomware attacks, or cloud
outages.
 Mitigation:
o Implement automated backups with immutability.
o Use geo-redundant storage for disaster recovery.
o Regularly test disaster recovery plans.

10. Compliance Violations & Legal Risks

 Cause: Failure to meet industry regulations like HIPAA, PCI DSS, GDPR,
ISO 27001.
 Impact: Legal penalties, reputational damage, and customer trust loss.
 Mitigation:
o Use cloud compliance automation tools (AWS Audit Manager,
Azure Compliance Center).
o Conduct regular security audits and ensure data localization
requirements are met.

Configuration error and Path management

Configuration error

A "cloud configuration error" in the context of cloud computing, often


referred to as "cloud misconfiguration," means errors made during the deployment
or maintenance of cloud-based platforms and applications, potentially leading to
security vulnerabilities or operational issues.
Misconfigurations are one of the leading causes of cloud security breaches. They
occur when cloud settings are improperly set, leading to data exposure,
unauthorized access, and compliance violations.

Common Cloud Misconfigurations

 Publicly exposed storage buckets (AWS S3, Azure Blob, Google Cloud
Storage).
 Overly permissive IAM roles and policies (e.g., granting "Everyone"
access).
 Unrestricted API endpoints leading to unauthorized access.
 Lack of encryption for data at rest and in transit.
 Disabled or improperly configured logging (CloudTrail, Azure Monitor,
etc.).

Impact of Cloud Misconfigurations

 Data leaks & breaches (e.g., exposed databases, open storage buckets).
 Compliance violations (GDPR, HIPAA, PCI DSS, etc.).
 Privilege escalation due to weak IAM settings.

Mitigation Strategies

Use Cloud Security Posture Management (CSPM) – Automated tools (AWS


Config, Azure Security Center, Google Security Command Center) help detect and
fix misconfigurations.
Apply Least Privilege Access Control – Restrict permissions to only necessary
users and services.
Regular Security Audits – Continuously review configurations and security
settings.
Encrypt Everything – Ensure AES-256 encryption for stored data and TLS 1.2+
for data in transit.

Path Management in Cloud Computing

Path management refers to the process of securing access paths to cloud


resources, ensuring only authorized entities can reach critical systems.

Key Cloud Path Management Challenges

 Exposed administrative interfaces (e.g., open SSH, RDP ports).


 Unprotected API endpoints allowing unauthorized access.
 Improperly configured networking rules (e.g., open firewall rules,
misconfigured VPCs).

Best Practices for Secure Path Management

Restrict Public Access – Close unnecessary ports (22, 3389) and only allow
access from trusted IPs.
Use Private Endpoints & VPNs – Avoid exposing sensitive services to the
internet.
Enable Identity-Aware Proxies – Restrict access based on identity (Google IAP,
AWS IAM).
Monitor & Log Access – Use tools like AWS Cloud Trail, Azure Monitor, and
Google Cloud Logging for tracking access patterns.
Cloud Computing Architecture

Cloud computing architecture is the framework that defines the structure of


cloud environments, including how resources, services, and networks interact. It
consists of two primary components: Front-end and Back-end, connected via the
Internet or a Cloud Network.

The below figure represents an internal architectural view of cloud


computing.

Architecture of Cloud Computin


1. Components of Cloud Computing Architecture

A. Front-End (Client Side)

Frontend of the cloud architecture refers to the client side of cloud


computing system. Means it contains all the user interfaces and applications
which are used by the client to access the cloud computing services/resources.
For example, use of a web browser to access the cloud platform.

The front-end is what users interact with to access cloud services.

 User Devices – Computers, mobile phones, IoT devices.


 Web Browsers & Applications – Interfaces for cloud services (e.g., AWS
Console, Google Cloud Console).
 Client-Side Software – Applications or APIs that connect to cloud services.

B. Back-End (Cloud Infrastructure)

Backend refers to the cloud itself which is used by the service provider. It
contains the resources as well as manages the resources and provides security
mechanisms. Along with this, it includes huge storage, virtual applications,
virtual machines, traffic control mechanisms, deployment models, etc. The back-
end is where all cloud processing, storage, and management take place. It consists
of:

1. Cloud Services

 IaaS (Infrastructure as a Service) – Provides virtualized computing


resources (e.g., AWS EC2, Azure Virtual Machines).
 PaaS (Platform as a Service) – Provides a platform for app development
(e.g., Google App Engine, AWS Elastic Beanstalk).
 SaaS (Software as a Service) – Delivers software over the internet (e.g.,
Google Workspace, Microsoft 365).

2. Virtualization Layer

 Creates virtual machines (VMs) and containers to optimize resource use.


 Examples: Hypervisors (VMware, KVM, Xen), Kubernetes, Docker.

3. Cloud Storage

 Stores and manages data in the cloud.


 Examples: AWS S3, Google Cloud Storage, Azure Blob Storage.

4. Cloud Networking

 Includes Virtual Private Clouds (VPCs), Load Balancers, and APIs for
communication.
 Examples: AWS VPC, Azure Virtual Network, Google Cloud VPC.

5. Cloud Security & Management

 Includes Identity & Access Management (IAM), Firewalls, Monitoring,


and Compliance Tools.
 Examples: AWS IAM, Azure Active Directory, Google IAM.

Components of Cloud Computing Architecture


Following are the components of Cloud Computing Architecture
1. Client Infrastructure – Client Infrastructure is a part of the frontend
component. It contains the applications and user interfaces which are
required to access the cloud platform. In other words, it provides a GUI(
Graphical User Interface ) to interact with the cloud.
2. Application : Application is a part of backend component that refers to a
software or platform to which client accesses. Means it provides the service
in backend as per the client requirement.
3. Service: Service in backend refers to the major three types of cloud based
services like saas,paas,iaas Also manages which type of service the user
accesses.
4. Runtime Cloud: Runtime cloud in backend provides the execution and
Runtime platform/environment to the Virtual machine.
5. Storage: Storage in backend provides flexible and scalable storage service
and management of stored data.
6. Infrastructure: Cloud Infrastructure in backend refers to the hardware and
software components of cloud like it includes servers, storage, network
devices, virtualization software etc.
7. Management: Management in backend refers to management of backend
components like application, service, runtime cloud, storage, infrastructure,
and other security mechanisms etc.
8. Security: Security in backend refers to implementation of different security
mechanisms in the backend for secure cloud resources, systems, files, and
infrastructure to end-users.
9. Internet: Internet connection acts as the medium or a bridge between
frontend and backend and establishes the interaction and communication
between frontend and backend.
10.Database: Database in backend refers to provide database for storing
structured data, such as SQL and NOSQL databases. Example of Databases
services include Amazon RDS, Microsoft Azure SQL database and Google
CLoud SQL.
11.Networking: Networking in backend services that provide networking
infrastructure for application in the cloud, such as load balancing, DNS and
virtual private networks.
12.Analytics: Analytics in backend service that provides analytics capabilities
for data in the cloud, such as warehousing, business intelligence and machine
learning.

Key Takeaways from the Cloud Architecture

1Front-End: Users interact via a web app, mobile app, or API.


2Network Layer: Ensures secure connectivity between users and cloud resources.
3Compute Layer: Runs applications using VMs, containers, or serverless
functions.
4Storage Layer: Stores user data, databases, and backups.
5Security & IAM: Protects resources using authentication, encryption, and
monitoring.

You might also like