COP Module 08 - Securing the Cloud
COP Module 08 - Securing the Cloud
AFRALTI AFRALTI 1
Objectives
Describe Cloud Computing
How Cloud Works
Explain Cloud Architecture
Types of Clouds Computing Services
Advantages of Cloud
Cloud Threats
AFRALTI 2
What it is ?
The term cloud computing refers to the
practice of remotely storing data or
running applications on a network or
Internet servers. These servers are
controlled and managed by companies
providing the cloud service.
A framework that enables a business or
an individual to access shared IT
resources i.e. hardware, software, and
business applications from any location.
These resources are hosted at locations
known as the ‘cloud’ which facilitates
AFRALTI
access at ‘any-time’ and from ‘any-where’
3
Cloud Concept
Users rent a particular amount of
storage space on these servers which is
accessible from anywhere.
Users can also rent appropriate
resources from the service providers.
remote computing,
Not all companies can invest in the
cyber infrastructure needed for
processing large amounts of data, in
such a case such companies rent the
resources from the cloud providers.
AFRALTI 4
Traditional Data Center vs Cloud
Services
AFRALTI 5
Cloud - Advantages
Just like the utility systems e.g. electricity
and water, each person does not need to
build their own.
Can be less expensive compared to
buying software and hardware
Can be used from any computer or device
with an Internet connection
The device does not need as large of an
internal storage system
Compatible with most computers and
operating systems
AFRALTI
6
Cloud Architectures
Cloud computing uses a shared pool of
computing resources (e.g., networks,
servers, storage, applications, and
services) to provide on-demand network
access.
An organization has a choice of building
their own cloud or using an already
established cloud as indicated below
Public
Private
Hybrid cloud
AFRALTI
7
Public Cloud
This is the general storage and
hosting service that we as individual
consumers use. It is owned by a
service provider and shared by
several resource tenants. This cloud
typically operates remotely.
Cloud providers lease out the
resources to the public (several
organizations/individuals).
AFRALTI 8
Private Cloud
Private Cloud – This cloud is set up
and used for a single entity or
organization. It is that
organization's private storage,
hosting, and computing space.
A private cloud can be remote or
local and can be managed locally
or outsourced. Generally
companies with sensitive data go
for this option.
AFRALTI 9
Hybrid Cloud
Hybrid Cloud is a mixture of two or
more different clod architectures.
The participants clouds retain their
individuality but are connected
through a shared standard or
patented technology.
This enables data portability
between different kind of cloud
while retaining their individual
benefits.
AFRALTI Processing can be hosted in the 10
Community Cloud
A community cloud belong to a
group of organizations with similar
interests. The convergence of their
interests may be social or
commercial.
This cloud can also be called semi-
private or semi-public cloud. It can
be operated remotely or locally
depending upon the agreements
terms of the organizations sharing
AFRALTI
it. 11
Public Clouds - Advantages
Public clouds often cost less than
private clouds to initially set up,
and move IT spending from a
capital-expense-based to an
operating-expense-based model.
They can offer the fastest route to
adopting cloud technology, since
services can immediately be
accessed.
The shared resource pool for
AFRALTI public clouds is often larger than12
Private Clouds - Advantages
Access to a large resource pool that
offers new choices for running
workloads.
Not burdened by public network
bandwidth and availability issues
No potential security exposures that
can be associated with public clouds.
Readily auditable and can provide a
more secure environment with high
availability.
Provide a potentially smoother
AFRALTI migration path from a traditional IT 13
Hybrid Clouds - Advantages
An enterprise can decide which
services are offered through public
or private clouds and at what
service levels
Enterprises can meet strict
security and service level
agreements for critical services.
AFRALTI 14
Cloud computing Services
AFRALTI 15
Infrastructure-as-a-Service
(IaaS)
A service model that involves
outsourcing the basic
infrastructure used to support
operations--including storage,
hardware, servers, and
networking components.
The service provider owns the
infrastructure equipment and
is responsible for housing,
running, and maintaining it.
The customer typically pays
on a per-use basis.
AFRALTI
The customer uses their own 16
Platform-as-a-Service (PaaS)
A service model that involves
outsourcing the basic
infrastructure and platform
(Windows, Linux, Unix, Mac
OS)
PaaS facilitates deploying
applications without the cost
and complexity of buying and
managing the underlying
hardware and software where
the applications are hosted.
AFRALTI
The customer uses their own 17
Software-as-a-Service (SaaS)
Also referred to as
“software on demand,” this
service model involves
outsourcing the
infrastructure, platform,
and software/applications.
Typically, these services
are available to the
customer for a fee, pay-as-
you-go, or a no charge
AFRALTI
model. 18
Threats to Cloud Security
Data Breach - A single cloud can hold sensitive
data like credit card details or personal
information.
Data Loss - Data stored on the cloud which is
not backed up locally by consumers results in
permanent data loss.
Account Hacking - Consumers access their
cloud accounts using usernames and passwords.
Disgruntled Insider - A disgruntled employee
could decide to compromise the data on the
cloud to hurt company's reputation.
Technology Vulnerabilities - Every technology
vulnerabilities which can be exploited by
AFRALTI hackers. 19
Cloud Threats Safeguards
Data Backup - Create local backup or create a
backup cache in a different cloud.
Update Backup Regularly - Create and
update backup regularly
Strong password - User complex password or
even use two step authentication.
Data Encryption - converts readable data into
coded form using a secret key.
Have a Disciplined Online Behavior - Always
log out and keep "Remember Password" option
disabled.
Avoid Keeping Sensitive Information on
Cloud - Do not upload credit card information,
AFRALTI passport details, and intimate pictures 20
Cloud Services Issues
Data Ownership - There is always a
question of who owns data after uploading on
the cloud.
Data Location - With data centers scattered
around the world, consumers should be wary
of the location of the servers that host their
files due to different privacy laws.
Data Migration - When data is migrated
from one data center to another in a different
country for maintenance purposes, user are
exposed to a host of privacy issues
Data Permanency - When users delete data
on the cloud there's no assurance that data
AFRALTI is permanently deleted due to the way data21
Summary
Describe Cloud Computing
How Cloud Works
Explain Cloud Architecture
Types of Clouds Computing
Services
Advantages of Cloud
Cloud Threats
AFRALTI 22