Unit 3 Cloud Security
Unit 3 Cloud Security
Delivery models
Software as a Service (SaaS) Deployment models
Platform as a Service (PaaS) Public cloud
Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity
Applications
More storage
For software and applications to execute as quickly and efficiently as possible, it provides
more servers, storage space, and computing power. Many tools are available for cloud
storage such as Dropbox, Onedrive, Google Drive, iCloud Drive, etc.
Cloud security
Cloud security is a collection of procedures and technology designed to address external and
internal threats to business security. Organizations need cloud security as they move toward
their digital transformation strategy and incorporate cloud-based tools and services as part of
their infrastructure.
Securing Software as a Service (SaaS) applications and data is a critical concern for
organizations that rely on cloud-based services. SaaS security encompasses a range of measures
and techniques designed to protect the confidentiality, integrity, and availability of SaaS
applications and the data they handle.
There are many characteristics of Cloud Computing here are few of them :
1. On-demand self-services: The Cloud computing services does not require any human
administrators, user themselves are able to provision, monitor and manage computing
resources as needed.
2. Broad network access: The Computing services are generally provided over standard
networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that are able to scale
out and in quickly and on as needed basis. Whenever the user require services it is
provided to him and it is scale out as soon as its requirement gets over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage, applications, and
services) present are shared across multiple applications and occupant in an uncommitted
manner. Multiple clients are provided service from a same physical resource.
5. Measured service: The resource utilization is tracked for each application and occupant,
it will provide both the user and the resource provider with an account of what has been
used. This is done for various reasons like monitoring billing and effective use of
resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants (users or
organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to abstract
underlying hardware resources and present them as logical resources to users.
8. Resilient computing: Cloud computing services are typically designed with redundancy
and fault tolerance in mind, which ensures high availability and reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing models, including pay-
per-use, subscription-based, and spot pricing, allowing users to choose the option that
best suits their needs.
10. Security: Cloud providers invest heavily in security measures to protect their users’ data
and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated, allowing users to
deploy and manage resources with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on sustainable practices, such as
energy-efficient data centers and the use of renewable energy sources, to reduce their
environmental impact.
Fig – characteristics of cloud computing
Data in use includes all data that is accessed, processed, and regularly modified by applications,
users, or devices. It is the state where data is most vulnerable to security risks due to the
numerous threat vectors present when it is accessed or shared.
Each state of data differs in terms of its vulnerability to attacks, threats, and the security controls
that can be applied.
Unauthorized access: Unauthenticated users can gain access to sensitive data during
processing, leading to data breaches and leaks.
Malware and malicious code: Infected applications or devices can compromise data in use,
potentially leading to data corruption or theft.
Memory scrapping: Sophisticated attackers can exploit vulnerabilities to extract data from an
application's memory.
Insider threats: Employees or collaborators with access to data in use can misuse it intentionally
or inadvertently.
Data leakage: Inadequate controls can result in unintended data exposure, such as through
copy-paste operations or screen captures.
You can protect data in use by safeguarding it where it is used the most, usually within the
organization. Approach data security from a 360-degree perspective to close as many security
backdoors as possible:
Implement sound user authentication and authorization controls, like enforcing multi-factor
authentication to minimize the chances of user credentials being stolen by hackers.
Periodically review and resolve user permissions for permission inheritance issues, such as
excess privileges to user roles that don't require them. Tools like a security permission
analyzer can help identify effective user permissions.
Get notified about crucial file events for files classified as restricted, sensitive, or confidential
by a data classification tool.
Look for sudden spikes in file modifications or deletions that can indicate a ransomware attack.
Deploy a file integrity monitoring solution to track real-time file changes.
Keep your endpoints secure by monitoring outbound emails, USB activity, potential web
uploads, and more using data leak prevention software.
Data privacy is the right of people to control their own personal data. When it comes to data
privacy, there are two major types of information:
Personal Information: This includes any identifying information about a person, such
as your name, home address, phone number, etc.
Sensitive Personal Information: This includes any information that is related to an
individual’s sexual orientation or health history.
Different jurisdictions have different requirements for data privacy. For example, with the new
and controversial General Data Protection Regulation (also known as GDPR), the privacy of
minors is prioritized, as is the explicit consent of users to collect information while they use a
website. In the context of medical records, health care professionals in the United States must
abide by HIPPA, the Health Insurance Portability and Accountability Act. This is a set of
guidelines that all practitioners must follow that serves to protect the privacy of patients.
Data privacy is necessary because it ensures that our personal information stays private. Data
privacy is important so that we don’t have to worry about our data being used in malicious
ways against us. It also helps ensure the integrity of businesses, as well as governments. If
companies and organizations didn’t have data privacy, they could use the information they
gather about you in any way they want.
The future of data privacy is hard to predict. The laws are changing rapidly and they will
continue to change as time goes on. It’s unclear what the future of data privacy will look like
and how it will affect our lives in the coming years, but we can make some educated guesses
about what it could be like in the next few years.
As technology improves and evolves, so does the way we communicate, share information,
and work - which means we are constantly putting more personal information out into the
world, making it easier for hackers to steal that information. We have seen many large data
breaches occur over the last few years from Target to Equifax. These incidents pose a
significant risk for companies who store their customers’ sensitive data online because when
that information gets hacked, it can lead to massive identity theft cases across the country."
- Data confidentiality. This means that all data collected is only shared between the consenting
parties.
- Data security. This ensures that the data collected is housed somewhere secure and that the
proper precautions are taken to prevent it from being misused or accessed maliciously.
- Transparency in data usage. The terms and conditions laid out between both parties is clear,
understood, and represents the full picture of how the data will be used.
- Compliance. Depending on the geographically location, the data in question, and the role of
the parties involved, ensuring that proper compliance with applicable legislations is followed.
Examples
Data privacy is a crucial issue in today's world of increasing data breaches and cyber attacks.
It refers to the protection of personal information and ensuring that it is not misused or accessed
without authorization. One example of data privacy is ensuring that sensitive data, such as
financial information or medical records, is only accessed by authorized personnel. This can
be achieved through access control measures, such as usernames and passwords, or biometric
authentication.
Encrypting data is another example of data privacy. This means encoding sensitive information
so that it cannot be read by unauthorized individuals. Encryption is commonly used for data
transmitted over the internet, such as online banking transactions or email correspondence.
Limiting the collection and use of personal data to only what is necessary is another key aspect
of data privacy. This means that organizations should only collect and use personal information
that is needed for a specific purpose, and not collect more data than necessary. For example, a
retailer may ask for a customer's name and email address to send promotional emails, but
should not ask for sensitive information such as their social security number.
Providing users with control over their personal data is also important for data privacy. This
means giving users the ability to delete or modify their data, such as their personal information
or search history. Users should also be able to control who has access to their data and how it
is used.
Finally, complying with relevant laws and regulations around data privacy, such as GDPR or
CCPA, is crucial for protecting personal information. These regulations require organizations
to inform users about how their data is collected and used, and to obtain explicit consent before
collecting or sharing personal information.
Identity and access management (IAM) is the discipline of managing user accounts and IT
permissions in an organization. In simple terms, IAM ensures that users can access the
resources they need, while protecting sensitive data from unauthorized access. When done
right, IAM helps companies save time, improve their cybersecurity and comply with laws and
industry standards. Learn how IAM works and how companies can automate user and privilege
administration by reading our beginner’s guide to identity and access management!
Identity and access management refers to the administration of user accounts (identities) and
their permissions and privileges (access). Permissions in IT systems such as NTFS
permissions on Windows file servers govern which files users can open, which
applications they can use and which areas of the network they can access. Therefore, assigning
the correct privileges to each user is a key requirement for a safe and productive IT
environment.
The more users, devices and applications are part of a network, the more difficult it becomes
to manage accounts and permissions by hand. Once your organization reaches a size where user
management and access rights management become an ongoing challenge, you should consider
dedicated identity and access management software to automate and centralize the process. An
IAM system ensures the efficient, accurate and secure administration of accounts and privileges
across your entire digital infrastructure.
While identity management is concerned with creating, updating and deleting accounts as part
of the user lifecycle, access management deals with the specific permissions of each account,
including access to unstructured data stored on file servers, SharePoint and similar platforms.
More on the difference between identity management and access management.
Without the right accounts and permissions, there is almost nothing employees can get done in
a modern workplace. Users depend on their Windows accounts, email accounts, cloud
accounts, accounts in third-party apps and more. At the same time, businesses store more and
more sensitive data in these different applications, and the threat of data breaches and cyber
attacks continues to rise.
Identity and access management ensures that only the right people can access IT resources.
This way, IAM protects critical data from both external attacks and insider threats such
as employee data theft. At the same time, IAM helps your IT department save valuable time by
automating routine tasks like user provisioning and permission audits, while providing self-
service features for end users.
Advantages of Identity and Access Management
While identity and access management is critical to data security, this is far from the only
advantage IAM brings to organizations. Managing accounts and permissions through a central,
automated platform drastically reduces the administration workload for your IT staff. Even
common helpdesk tickets like password resets or access requests can be outsourced to the IAM
system, allowing your admins to focus on more important tasks and long-term projects.
Meanwhile, IAM helps your end users get to the data they need faster and easier since they can
request new permissions directly through the platform instead of sending out tickets or emails.
That means fewer delays in the day-to-day operations. And with every change documented
automatically, the business is always in control of who has access to what.
Benefits of IAM:
Identity and access management covers different tasks and functions. Learn more in our
overview.
Is Identity and Access Management Mandatory?
There are various laws, industry norms and security standards that require organizations to
restrict access to sensitive data and actively manage accounts and permissions. It is not
mandatory to use an identity and access management system to meet these requirements.
However, there is no practical way to comply with these regulations without the support of an
IAM system.
Without IAM software, it would take astronomical effort to enforce least privilege access,
perform regular user access reviews and document all changes to accounts and permissions. So
while identity and access management is not explicitly mandatory, there is simply no way
around IAM for organizations with more than a few dozen IT users.
Identity and access management lets organizations control which users have access to which
files and systems. On a technical level, there are two separate steps that govern access to IT
resources:
Authentication: Users verify their identity by entering their credentials (username and
password) and completing multi-factor authentication. If the verification is completed
successfully, the user is allowed into the system. In the case of central identity providers
like Active Directory and Azure AD, they are also logged into various connected apps (single
sign-on).
Authorization: Once a user authenticates their identity, they are authorized to perform specific
actions. What a user is allowed to do depends on which permissions have been assigned to
them by the admin. In Windows environments, authorization is determined by checking an
account’s security identifier against the access control list of an object.
Account Provisioning
When an admin creates a new account, the IAM system automatically assigns the correct
permissions, groups and organizational units. Identity and access management determines
which privileges to give to which user through an access control model known as role-based
access control: First, organizations define the intended permissions for different business roles,
such as people working in different departments.
The identity and access management software then provides new accounts with the permissions
matching their role: employees in the sales department receive the permissions of the sales role,
employees in marketing receive marketing permissions and so on. This process also applies
when the role of a user changes: when a new role is assigned, the person is given all privileges
of their new role and loses all permissions associated with their old role.
PHYSICAL SECURITY
Physical security has an important role to play in protecting critical information and data. With
work and collaboration paradigm shifts, new cases of security threat arise. The physical
security structure consists of three main components: access control, permanent active
surveillance and testing. The success of an organisation’s physical security program can often
be attributed to how each of these components are implemented, improved, and maintained.
Physical security keeps your employees, facilities, and assets safe from real-world threats.
These threats can arise from internal or external intruders that question data security. Physical
attacks can cause a safe area to break into or the invasion of a restricted area part. An attacker
can easily damage or steal critical IT assets, install malware on systems, or leave a remote
access port on the network.
It is important to have strict physical security to protect against external threats, as well as
equally effective measures to avoid the risks of any internal intruder. The key is to understand
that physical security refers to the entire space, and it should not be restricted only to the front
door, but to the entire building. Any area that is left unprotected – such as the smoking area
(with doors for example facing the outside of the building, without the main entrance controls)
or the entrance to the car park, can pose a risk.
Security experts refer to this form of protection as a deep or layered protection, since there are
several control points in the physical infrastructures. Physical damage is as harmful as digital
loss, and therefore strict physical security measures must be taken.
• Access control and monitoring of physical access should cover the entire area, using
sophisticated physical security tools such as biometric and ID card restrictions. However, it is
important to understand the pros and cons of each measure and how these access controls can
be forged.
• Surveillance, containing burglar alarms, guards, and CCTV that keeps a complete record of
the entire movement. High-risk areas may have sophisticated detectors to ensure a more holistic
view.
Traditionally, physical and digital security were two distinct fields. Today organisations are
increasingly dependent on IoT and its integrations, increasing by themselves the need for an
improvement in their digital and physical security controls (network, servers, data, etc.). Virtual
machines and applications, even if they’re in the cloud, are as secure as your physical servers.
With technology constantly evolving, integrations with AIs are increasingly popular. With
regard to physical security, these integrations will continue to evolve, for example by allowing:
Physical security focuses on keeping your facilities, people, and assets safe from real-world
threats. Currently, there are multiple attack vectors, and these can have a focus not only from
a physical and technological point of view, but also exploring weaknesses specific to the human
condition (social engineering).
Physical security also focuses on rules and controls that allow the protection of persons and
property in the event of natural disasters or catastrophes.
Some of the most common and most difficult attacks to mitigate are focused on Social
Engineering, psychologically manipulating people to perform actions or disclose confidential
information. Examples:
Your physical assets might get stolen, and that could be a major threat. In the following list,
we find some of the most commonly used controls for protection with regard to physical safety: