Overview of Cloud Security
52 Virtualization System - specific Attack
53 Data Security and Storage
Identity and Access Management (IAM) .
Two Marks Questions with Answers
++ DeG-21, 2-22 Marks 13
(6-1)Sr co ok eae
Cloud Computing 5-2 loud Secury
Overview of Cloud Security
* Cloud security is the protection of data
platforms from theft, leakage, and deletion. Metho
include firewalls, penetration testing, tokenization,
(VPN), and avoiding public internet connections. ’
* Cloud security refers to an array of policies, technological profedures, service,
and solutions designed to support safe functionality when building, deploying
and managing cloud-based applications and associated data.
* Cloud security is designed to protect the following, regardless of you,
responsibilities : F
a) Physical networks - Routers, electrical power, cabling, climate controls, etc,
stored online via cloud computiy
Methods of providing cloud securite
Virtual Private Networks
b) Data storage - Hard drives, etc.
©) Data servers - Core network computing hardware and software
4) Computer virtualization frameworks - Virtual machine software, host
machines and guest machines
e) Operating systems (OS) - Software that houses
) Middleware - Application Programming Interface (API) management
g) Runtime environments - Execution and upkeep of a running program
hy) Data - All the information stored, modified and accessed
i) Applications - Traditional software services (email, tax software, productivity
suites, etc.)
j) End-user hardware - Computers, mobile devices, Internet of Things (lol)
devices, etc.
* Cloud computing security addresses both physical and logical security issues
across all the different service models of software, platform and infrastructure. It
also addresses how these services are delivered in the public, private, hybrid and
community delivery models.
EEREE cloud Security Challenges and Risks
* Cloud computing security challenges fall into three broad categories
1. Data protection : Securing your data both at rest and in transit
2. User authentication : Limiting access to data and monitoring who accesses th
data
3. Disaster and data breach : Contingency planning
TECHNICAL PUBLICATIONS® -
i) Le
@n up-thrust for knowledge
—_——5-3 Cloud Security
“Data protection : Data needs to be encrypted at all times, with clearly defined
roles when it comes to who will be managing the encryption. keys.
User authentication : Data resting in the cloud needs to be accessible only by
those authorized to do so, making it critical to both restrict and monitor who will
be accessing the company's data through the cloud. In order to ensure the
integrity of user authentication, companies need to be able to view data access
logs and audit trails to verify that only authorized users are accessing the data.
Contingency planning : With the cloud servin
for a company's mission-critical data,
‘due to a data breach or temporarily
real concerns.
8 as a single centralized repository
the risks of having that data compromised
made unavailable due to a natural disaster are
If information is encrypted while passing through the cloud, who controls the
encryption/decryption keys ? Is it the customer or the cloud vendor ? Most
customers probably want their data encrypted both ways across the Internet using
secure sockets layer protocol,
They also most likely want their data encrypted while it is at rest in the cloud
vendor's storage pool. Be sure that you, the customer, control the
encryption/decryption keys, just as if the data were still resident on your own
servers
Data integrity means ensuring that data is identically maintained during any
operation.
Cloud-based services will result in many mobile IT users accessing business data
and services without traversing the corporate network. This will increase the need
for enterprises to place security controls between mobile users and cloud-based
services.
Placing large amounts of sensitive data in a globally accessible cloud leaves
organizations open to large distributed threats, attackers no longer have to come
onto the premises to steal data, and they can find it all in the one "virtual"
location.
Virtualization efficiencies in the cloud require virtual machines from multiple
organizations to be co-located on the same physical resources. Although traditional
data center security still applies in the cloud environment, physical segregation
and hardware-based security cannot protect against attacks between virtual
Machines on the same server.
Operating system and application files are on a shared physical infrastructure in a
Virtualized cloud environment and require system, file, and activity monitoring to
Provide confidence and auditable proof to enterprise customers that their resources
have not been compromised or tampered with.
TECHNICAL PUBLICATIONS® - an up-thrust for knowledger identiality :- to tive
aan aes ee dividuals who are not authorized fo ge
the information.
In cloud environments, confidentiality primarily pertains to restricting access ¢,
data in transit and storage.
Integrity can extend to how data is stored, processed, and retrieved by cloyy
services and cloud-based IT resources.
Some common cloud security threats include = ;
a) Risks of cloud-based infrastructure including incompatible legacy jy
frameworks, and third-party data storage service disruptions.
b) Internal threats due to human error such as misconfiguration of user access
controls.
¢) External threats caused almost exclusively by malicious actors, such as
malware, phishing, and DDoS attacks.
Cloud Security Architecture
* Cloud security architecture describes all the hardware and technologies designed
to protect data, workloads, and systems within cloud platforms.
Fig. 5.1.1 shows NIST cloud computing security reference architecture approach,
The reference architecture identifies the five major cloud actors; consumer,
provider, broker, carrier, and auditor.
© Secure cloud computing architecture encompasses
confidentiality, integrity, and availability.
1. Confidentiality is the ability to keep information secret and unreadable to the
people who shouldn't have access to that data.
three core capabilities:
x
. Integrity is the idea that the systems and applications are exactly what you
expect them to be and function exactly as you expect them to function.
. Availability speaks to Denial-of-Service (DoS) attacks. Perhaps an attacker cat
see or change your data, But if an attacker can make systems unavailable
you or your customers, then you can't carry out tasks that are essential !@
maintain your business.
2
TECHNICAL PUBLICATIONS® - an up-thrust for knowledge—
| Goud provider
Cloud broker
fetes
Cloud canier
e z
es
gS He ey Ta z
en ates Genome
a
ess relationship with and
A person or organization that maintains a busin
uuses service form, Cloud Providers,
A person, organization or entity responsible for making a service available _
to interested parties,
A party that can conduct an independent assessment of cloud services,
information system operations, performance and security of the cloud
implementation.
‘An entity that manages the use, performance and delivery of cloud
services and negotiates relationships between Cloud Providers and Cloud
Consumers.
‘An intermediary that provides connectivity and transport of cloud services
from Cloud Providers to Cloud Consumers.
BEE¥ cloug security Services
* The basic security services for information security include assurance of data
confidentiality, integrity and availability
* Fig. 5.1.2 shows organization of data security and privacy in cloud computing
TECHNICAL PUBLICATIONS® ~ an uin-thrust for knowledae4. Confidentiality
© Confidentiality refers to limiting information access. Sensitive information should
be kept secret from individuals who are not authorized to see the information. In
cloud environments, confidentiality primarily pertains to restricting access to data
in transit and storage.
© Data confidentiality is important for users to store their private or confidential
data in the cloud. Authentication and access control strategies are used to ensure
data confidentiality.
* The data confidentiality, authentication and access control issues in cloud
computing could be addressed by increasing the cloud reliability and
trustworthiness.
* Because the users do not trust the cloud providers and cloud storage service
providers are virtually impossible to eliminate potential insider threat, it is very
dangerous for users to store their sensitive data in cloud storage directly.
* Simple encryption is faced with the key management problem and cannot support
complex requirements such as query, parallel modification and fine-grained
authorization.
2. Integrity =
* This service protects data from malicious modification. When having outsource
their data to remote cloud servers, cloud users must have a way to check whethet
or not their data at rest or in transit are intact. Such a security service would be of
the core value to cloud users.
* Integrity can extend to how data is stored, processed and retrieved by cloud
services and cloud-based IT resources.
TECHNICAL PUBLICATIONS® - an up-thrust for knowledaeCloud Security
, Data integrity in the cloud system means Preserving information integrity. The
gata should not be lost or modified by unauthorized users,
integri the cl
, Data integrity in the cloud system means Preserving information integrity. The
data should not be lost or modified by unauthorized users,
Data integrity is the basis to Provide cloud computing service such as SaaS, PaaS
and IaaS.
« Besides data storage of large-scaled data, cloud computing environment usually
provides data processing service, Data integrity can be obtained by techniques
such as RAID-like strategies and digital signature.
1 availability :
+ This service assures that data stored in the cloud are available on each user
retrieval request. This service is Particularly important for data at rest in cloud
servers and related to the fulfillment of service level agreement. :
Data availability means the following : When accidents such as hard disk damage,
IDC fire, and network failures occur, the extent that user's data can be used or
recovered and how the users verify their data by techniques rather than
depending on the credit guarantee by the cloud service provider alone.
The cloud service provider should ensure the data security, particularly data
confidentiality and integrity. The cloud provider should share all such concerns
with the client and build trust relationship in this connection. The cloud vendor
should provide guarantees of data safety and explain jurisdiction of local laws to
the clients.
* Disaster recovery plan is a plan designed to recover all the vital business processes
during a disaster with in a limited amount of time. This plan has all the
_ procedures required to handle the emergency situations.
* A disaster recovery process should have provable recovery capability, and hence it
_ provides the most efficient method to be adopted immediately after a disaster
occurs.
ay Security Authorization Challenges in Cloud
_* Authorization is the function of specifying access rights/privileges to resources
Telated to information security and computer security in general and to access
control in particular.
* Authorization determines what the user can access and what he cannot access
oars
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeCOU Secu
5-8 a
Cloud Computing
4 prioritizing Ti5KS, evaluat
4. Auditing : sing a”
set ity str y
© Cloud security audit can help bY 9°" isting cloud security strategy 4.
current controls, identifying the 84P° d to business priorities.
programs and making recommendations ties
«Functions performed by IT auditors‘
a. Backup controls
b. Data center security
c. System development standards
d. System and transaction controls
e. Contingency plan
2. Accountability : 1's activity while attached to a system,
k of a use!
ime attached, the resources accessed, and how
* This is the process that keeps trac
the trail included the amount of #
much data transferred.
¢ Accounting data is used for
investigating. Keeping track of users
fending detecting. preaches and forensic
‘and their activities serves many Purposes
leading up to a cyber security incident can
* For example, tracing back to events i
lysis and investigation case.
prove very valuable to a forensics anal
EREA cloud Security Threats
4. Traffic eavesdropping
© Data being passively intercepted by a malicious service agent for illegitimate
information gathering purpose while being transferred to or within a cloud
Cloud service
consumer Intercepted message copy
Fig, 5.1.3
* Aim to discredit the confidentiality of data
consumer and cloud provider, and the relationship between the co"
AN etheiet for inewulerneoe
cong : Cloud Security
ys intermediary
d and alt
Pi ges intercepte altered by a mali o
sn defileslaiey ENO uaceay icious service agent discrediting the
possible malicious contents insertion before forwarding it to its destinat
; ‘ination.
Cloud servi
‘consumer
Intercept and
alter message
Fig. 5.1.4
penal of Service (DoS)
Intentional sabotage on shard physical IT resource by overloading it so that the IT
resource can hardly be allocated to other consumers sharing the same IT resource.
+ Typically intentional overloading shared IT resource by generating excessive
messages, consuming full network bandwidth, or sending multiple requests that
consume excessive CPU time and memory.
{insufficient authorization
+ A-case when access is granted to an attacker erroneously or too broadly, resulting
in the attacker getting access to IT resources that are normally protected.
+ Another case (Weak Authentication) when weak passwords or shared accounts
are used to protect IT resources.
Malicious.
Legitimate attacker
‘consumer
Fig. 5.1.5
{Virtualization attack (Overlapping Trust Boundaries)
* Physical resources shared by multiple virtual users in virtualized environment by
the nature of resource virtualization.
* Possible inherent risk that some cloud consumers co}
attack the underlying physical IT resources.
suld abuse their access right to
TECHNICAL PUBLICATIONS® - an up-trust for knowedg@10
Cloud Computing
Cloud gq,
it
Secure Cloud Software Requiremen|
follows :
Requirements of secure cloud ees Ae is Heat erating “tode a
1, Secure development practices : It i tat ier
language Cee: ible validation and content inje phy: tity
the system,
t ineering : A
2. Approaches to cloud software requirements engineering "50Utey
‘it is its, goal-oriented Softw,
rity requirement a
Perspective on cloud software securi Ae tie
security requirements and monitoring internal and extern: . : >
osition :
3. Cloud security policy implementation and cect se eee
implementation issues, decomposing critical secu De rae en
software requirements (Confidentiality, integrity, ” ication
and identification, authorization, auditing).
Virtualization System - specific Attacks
Cloud computing security challenges fall into three broad patescries ss
1. Data protection : Securing your data both at rest and in transit.
2. User authentication : Limiting access to data and monitoring who accesses the
data.
3. Disaster and data breach : Contingency planning.
Data protection : Data needs to be encrypted at all times, with clearly defined
roles when it comes to who will be managing the encryption keys.
User authentication : Data resting in the cloud needs to be accessible only by those
authorized to do so, making it critical to both restrict and monitor who will be
accessing the company's data through the cloud. In order to ensure the integrity of
user authentication, companies need to be able to view data access logs and audit
trails to verify that only authorized users are accessing the data.
Contingency planning : With the cloud serving as a single centralized repository
for a company’s mission-critical data, the risks of having that data compromised
due to a data breach or temporarily made unavailable due to a natural disaster are
real concerns.
If information is encrypted while passing through the cloud, who controls the
soeryption (ssceyetion keyetala this Giatese the cloud vendor ? Most
customers probably want their data encrypted boy
secure sockets layer protocol. th Ways across the Internet using
They also most likely want their data encrypted while it j t in the cloud
vendor's storage pool. Be sure ther eee
fomer, co
TECHNICAL PUBLICATIONS®
* €” up-thrust for knowledgePa
comput 5-11
Cloud Security
ion/decryption ke j
encryes ae eys, just as if the data were still resident on your own
servers
ity means ensi 4 Os
Data integrity uring that data is identical i
operation: ‘ally maintained during any
Cloud-based services will result in many mobile IT users accessing business data
and services without traversing the corporate network. This will ioe the need
for enterprises to place security controls between mobile
use
ea rs and cloud-based
Placing large amounts of sensitive data in a globally accessible cloud leaves
organizations open to large distributed threats, attackers no longer have to come
onto the premises to steal data, and they can find it all in the one "virtual"
location.
Virtualization efficiencies in the cloud require virtual machines from multiple
organizations to be co-located on the same physical resources, Although traditional
data center security still applies in the cloud environment, physical segregation
and hardware-based security cannot protect against attacks between virtual
machines on the same server.
Operating system and application files are on a shared physical infrastructure in a
virtualized al environment and require system, file, and activity monitoring to
provide confidence and auditable proof to enterprise customers that their resources
have not been compromised or tampered with.
In the cloud computing environment, the enterprise subscribes to cloud computing
resources, and the responsibility for patching is the subscriber's rather than the
cloud computing vendor's.
The need for patch maintenance vigilance is imperative. Lack of due diligence in
this regard could rapidly make the task unmanageable or impossible, leaving you
with "virtual patching" as the only alternative.
Confidentiality : Confidentiality refers to limiting information access. Sensitive
information should be kept secret from individuals who are not authorized to see
the information.
In cloud environments, confidentiality primarily pertains to restricting access to
data in transit and storage.
Integrity can extend to how data is stored, processed, and retrieved by cloud
Services and cloud-based IT resources.
Some common cloud security threats include :
a) Risks of cloud-based infrastructure including incompatible legacy IT
frameworks, and third-party data storage service disruptions.
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeCloud Computing
figuration of user a...
as misco}
b) Internal threats due to human error such
controls.
; malicious actors, such
©) External threats caused almost exclusively by
malware, phishing, and DDoS attacks.
EEEXI Guest - hopping attack
i lure between sh,,
In guest-hopping attacks, due to the separation failuré en shareq
: ; ine by penetrating ano:
infrastructures, an attacker gets access to a virtual machine by p* iB an
virtual machine hosted in the same hardware.
One possible mitigation of guest-hopping attack is the ae, and
debugging tools to observe any attempt to compromise the virtual machine
Another solution is to use the High Assurance Platform (HAP), which provides .
high degree of isolation between virtual machines.
Guest to host attack/guest escape : Once the attacker has found a vulnerability in
the virtualization layer in combine with improper configurations of both the
host and the guest, attacker can bypass the virtualization layer and access the
host machine.
Since the host machine contains multiple guests, the attacker can contro! 2
the guest machines and monitor any interaction between the guests and the host
In addition, the attacker can lunch various attacks, like, corrupting resources
memory, CPU and launch arbitrary code.
Guest to guest attack / guest hopping : In this attack, the attacker can inject «
malware in one guest, and once attacker gets a control over the virtual
machine, they can spread this malware to other virtual machines or
attacking the virtualization layer itself. Thus, controlling all the virtual
machines that exist on the host machine. The attacker then can monitor the
usage of various resources, like, CPU, memory, etc. which affects the
confidentiality of the guest machine,
In addition, the attacker has the ability to manipulate existing data in the
virtual machines, modifying their configurations, injecting malicious code, etc
Thus, affecting the integrity and the availability of the data,
Guest mobility : Guest machine contents are stored as files in the host
machine's hard desk drive, thus, easing the process of transferring or copyirs
the contents of one guest to another host through the network,
With this usability, security problems arise,
if the guest is infected with maliciovs
malware, the other host will be contaminated with the same “Sai Thus, the
TECHNICAL PUBLICATIONS® - an up-thn iCloud Security
will have control over multiple virtual
ae possibly use the same technique to affect multiph
1 of i
guest denial of service attack : In virtualization,
§ such as RAM,
fe. DOS attack Een nets and network bandwidth for each guest
Reulting in denying other Meaet ne Beast machine occupies all the resource
i machines from utilizing host's reso r
. Virtual machine overflow, i In this attack, the attacker run; ine
on the guest machine and fills the allocated memory ae ca
nwt
: Ri i
ingless characters, exceeding the allowed boundaries
machine and as a result the machine crashes, ais
machines on multiple hosts
le virtual machines.
the 4
the host machine allocates
guest
ater er the attacker can access the host's memory pointer's and
directing them to run the attacker's malicious script. By that, the attacker
can gain pect access oven the host machine and thus having access over all the
guest machines that resides in the host machine. ‘i
fe Virtualization ORES leak : Each guest machine has a specific space in host's
memory and if the host did not properly free the allocated memory, a
Meal memory leak can occur. f
The attacker can exploit this vulnerability by using this allocated space to
‘execute several attacks, like DOS and buffer overflow attack.
im
VM Migration Attack : Hyperjacking
ba
Hyperjacking is another illicit method that can be used to spy on victims, control
"devices and steal valuable information. Hyperjacking involves the compromise and
“unauthorized control of a virtual machine.
+ Hypervisors form the backbone of virtual machines. These are software programs
are responsible for creating, running and managing VMs. A single hypervisor
an host multiple virtual machines, or multiple guest operating systems, at one
, which also gives it the alternative name of Virtual Machine Manager (VMM)
are two Kinds of hypervisors. The first is known as a “bare metal” or
tive" hypervisor, with the second being a "host" hypervisor.
erjacking involves installing a rogue hypervisor that can take complete control
server. Regular security measures are ineffective because the OS will not even
e aware that the machine has been compromised.
i jacki ks, In
rs are the key target of hyperjacking attac!
hypervisor sca be replaced via the installation of a rogue, malicious
isor that the threat actor has control of. By installing a rogue hypervisor
a typical attack, the
2 niet for knewserine
FEGHNIGAL PUBLICATIONS. - 90 uo-tnrs!&Che
oe
erefore gain control of the legitimgy,
under the original, the attacker can th
hypervisor and exploit the VM.
* By having control over the hypervisor of @
tur, gain control of the entire VM server.
anything in the virtual machine. ot aes
* This mechanism is due to a lack of separation between “TTD, Nts a =
flows, guest OS access to the hypervisor (e.g Via 4 Rey iin can roulll ae
©5), or an unpatched system. The exploitation of this met WNT Ds US ti the
attacker gaining unlimited access to the entire virtualization S2W"" TN ‘Ne Bues
VMs. This attack mechanism can result from poorly managed control and data
flows as well as poorly managed shared access to resources.
virtual machine, the attacker can, i,
‘This means that they can manipulate
Virtual machine migration services : ee
* VM migration are of two types : Hot migration and cold migration.
i) Hot migration : re
* A hot migration is referred to as a live migration. It is a staged migration where
the virtual machine stays powered on during the initial full synchronization and
the subsequent delta sync, using the vSphere vMotion feature.
* There are two types of hot migration :
1. Compute resource - A migration of a virtual server from one compute resource
to another.
2. Full migrate - A migration of a virtual server with or without disks and NICs
between compute resources, data stores and networks.
* The live migration process transfers the VM memory, network connectivity and
storage as the OS continues to run. The obvious advantages of a live migration are
that we do not have to interrupt operations.
* The best time to do a live migration on VMware is when server needs
maintenance or an update, or when we need to switch a VM to a different host.
* The process allows for :
1. A clean separation between hardware and software, including the separation of
concerns between the users and operator of a data center or cluster.
2. Consolidation of clustered hardware into a single management domain. This
means that if we need to remove a certain physical machine from service for
maintenance, we can migrate OS instances to one or more alternative machines
to relieve the load on congested host machines,
Live migration can also be used for load balancing in which work is shared
among computers in order to optimize the utilization of available CPU resources”
—_____—__ == i‘ US
TECHNICAL PUBLICATIONS® an upthrust forB58 Cloud Security
on
gration involves moving a powered-off or suspended virtual machine to a
t. It also usually means relocating configuration and disk files for these
or suspended virtual machines to new storage locations
tion includes moving virtual machines from one virtual switch to
from one data center to another. Fig. 5.2.1 shows cold migration.
Configuration data
Target host
Fig. 5.2.1 Cold migration
tion is easy to implement and is summarized as follows :
configuration files, including NVRAM file, log files and the disks of the
al machines, are moved from the source host to the destination host's
iated storage area.
machine is registered with the new host.
the migration is completed, the old version of the virtual machine is
from the source host.
rity and Storage
ting security challenges fall into three broad categories :
tion : Securing your data both at rest and in transit
and data breach : Contingency planning.
on : Data needs to be encrypted at all times, with clearly defined
1en it comes to who will be managing the encryption keys.
ntication : Data resting in the cloud needs to be accessible only by those
d to do so, making it critical to both restrict a ue pea .
. 's ens
pee ‘company's data through the cloud. In order to
TECHNICAL PUBLICATIONS® - #7” uo-thrust for knovierineCloud
Cloud Computing 5-16 Security
iew data access |
of user authentication, companies need to be able See the dea ae
audit trails to verify that only authorized users are ac
Loss of privacy : CSC's privacy may be violated due to leakage of private
information while the CSP is processing CSC's private data or using the private
information for a purpose that the CSP and CSC haven't agreed upon.
Cloud service provider lock-in : This issue arises if a CSP doesn’t abide by the
standard functions or frameworks of cloud computing and hence makes it
difficult for a CSC using its services to migrate to any other CSP. The use of
non-standard functions and) “cloud framework makes qin inee
non-inter-operable with other CSPs and also leaves CSC open to security
attacks.
TECHNICAL PUBLICATIONS® _ a,
+ 80 Up-thnust for knowledgetralization : service provider takes res
ponsibili oh
need not spend more money for personal eos ae ie
, evice
response : IaaS providers contribute dedicated legal
im gal server which can be
image verification time.
storage requirement for benchmark logs is mechanically solved
yantages
; control : The enterprise's loss of control in enhan:
; is the most significant disadvantage of cloud ee enaaes os
ty of securing the network is shared between the Cloud oe
(CSP) and the enterprise. °F
visibility and control : when migrating to « cloud based computing
ql, organizations will lose a degree of visibility and control, with some
ity for policies and infrastructure moving to the cloud provider.
and Access Management (IAM)
‘and Access Management (IAM) can help a user to manage to compute,
ge and application services in the AWS cloud. It uses access control
through which a user is familiar with which includes users, groups and
AWS IAM, the user can manage the customer and their
e help of a single
help the user to build the
Tt provides Amazon AWS building blocks which
for the security purpose.
help the user to focus on the features and
ity and access management
which includes the security on the other side of the things. AWS
‘also rotate access keys on the virtual machine instances.
e AWS IAM users and their access.
Amazon IAM roles and their permissions.
to federate users and their permissions.Cloud Seq
uty
Cloud Computing ———
Identity Management and Access Control
+ AWS Identity and Access Management (IAM) is
securely control access to AWS resources:
a web service that helps 5,
you begin with a single sign-in ideng,
s and resources in the account,
When you first create an AWS account,
that has complete access to all AWS services an‘ sed by signing in wit
identity is called the AWS account root user and is acces ith the
email address and password that you used to create the coun,
For each AWS account, you can create ‘multiple users with different credentia,
For each user, you can give different rights.
* IAM Users are account objects that allow an individual user to access your AWs
environment with a set of credentials. You can issue user accounts to anyone yoy
want to view or administer objects and resources within your AWS environmen
Permissions can be applied individually to a user, but the best practice fo;
Permission assignments is to assign them via the use of groups.
* IAM groups are objects that have permissions assigned to them via policies
allowing the members of the group access to specific resources. Having users
assigned to these groups allows for a uniform approach to access management and
control.
IAM roles are again objects created within IAM which have policy permissions
associated to them. However, instead of being associated with users as groups are,
roles are assigned to instances at the time of launch. This allows the instance to
adopt the permissions given by the role without the need to have access keys
stored locally on the instance.
* Security groups are used to control access to EC2 instances. Because AWS uses flat
Layer 3 networking, any instance within a user account can communicate with any
other instance.
* AWS Identity Access Management allows to establish access rules and permissions
to specific users and applications. _
1. Set up permissions for users and applications.
. Create user groups for common rules assignment.
Cloud Trail allows to monitor the access,
- Identity federation : allow users to log in with their company credentials.
. Temporary security credentials, obtained by callin, APIs like
AssumeRole or GetFederationToken, tS cae
° TAM policy - A document that defines the effect, actions resources, and optiond!
conditions. ‘ .
* IAM role - An identity with permissi
Policies, to which users can be assigned:
ee
2n up-thrust for knowledge
apona ale: Pie Cloud Security
am group ~ A Group of users to which common policies can be attached
pest practices regarding security groups are as follows
* ,, avoid using the default security group.
1.
Use meaningful names,
2
3, Open only the ports you need to open.
4, Partition applications.
5, Restrict system administrator access.
a security Policies
, User can manage access in AWS by
identities or AWS resources.
» A policy is an object in AWS that, when associated wit!
defines their permissions. AWS evaluates these policie
(user or role) makes a request.
+ IAM policies define permissions for an action regardless of the method that you
use to perform the operation.
y creating policies and attaching them to [AM
fh an identity or resource,
’s when a principal entity
types of Policy :
1, Identity-based policies : Attach managed and inline policies to IAM identities
(users, groups to which users belong, or roles). Identity-based policies grant
permissions to an identity.
2 Resource-based policies : Attach inline policies to resources. For example -
resource-based policies are Amazon S3 bucket policies and IAM role trust policies
Resource-based policies grant permissions to a principal entity that is specified in
the policy. Principals can be in the same account as the resource or in other
accounts.
. Permissions boundaries : Use a managed policy as the permissions boundary for
an IAM entity (user or role). That policy defines the maximum permissions that
the identity-based policies can grant to an entity, but does not grant permissions.
4. Organizations SCPs : Use an AWS Organizations Service Control Policy (SCP) to
define the maximum permissions for account members of an organization or
Organizational Unit (OU). SCPs limit permissions that identity-based policies or
resource-based policies grant to entities (users or roles) within the account, but do
not grant permissions.
5. Access Control Lists (ACLs) : Use ACLs to control which principals in other
accounts can access the resource to which the ACL is attached. ACLs are similar
fo resource-based policies, although they are the only policy type that does not
Use the JSON policy document structure. ACLs are cross-account permissions
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeCloud Computing
rr
pe : | entity. ACLs ca
Policies that grant permissions to the specified principa’ y MOE gran,
\
Permissions to entities within the same accoun
f ou use the A
Session policies : Pass an advanced session Fae Sear Pslaae Clg
AWS API to assume a role or a federated user limit 4,
a i rant te a
Permissions that the role or user's identity-based Peete ioe SeSsion,
Session policies limit permissions for a created session, OF Sra
Permissions,
1AM Abilities and Limitation
Path names must begin and end with a forward slash (/):
Names of users, groups, roles, policies, instance profiles ae Server certificates
must be alphanumeric, including the following common characters : plus (4)
equal (=), comma (,), period (,), at (@), underscore (_), and hyphen (-).
Names of users, groups and roles must be unique within the account.
User passwords (login profiles) can contain any Basic Latin (ASCH) characters,
EZ Machine imaging
Machine imaging is a process that is used to provide system portability ang
provision and deploy systems in the cloud through capturing the state of systems
using a system image.
A system image makes a copy or a clone of the entire computer system inside a
single file. The image is made by using a program called system imaging program
and can be used later to restore a system image.
For example : Amazon Machine Image (AMI) is a system image that is used in the
cloud computing. The Amazon Web Services uses AMI to store copies of a virtual
machine.
An AMI is a file system image that contains an operating system, all device
drivers and any applications and state information that the working virtual
machine would have. .
The AMI files are encrypted and compressed for security purpose and stored in
Amazon S3 (Simple Storage System) buckets as a set of 10 MB chunks.
Machine imaging is mostly run on virtualization perform due to this it is al
called as virtual appliances and running virtual machines are called instances.
TECHNICAL PUBLICATIONS® « an up-thrust fora corti eet Cloud Security
among the choices are Red Hat Linux, Ubuntu, Microsoft Windows, Solaris and
+ gers. Files in AMI are compressed and encrypted and an XML file is written that
‘escribe the AMI archive.
Machine Images are sometimes referred to as “virtual appliances”, systems that are
’ mreant to run on virtualization platforms.
1AM Challenges
|, The major challenges faced by the IAM in the cloud are as follows :
igntity provisioning ! de-provisioning
Wy this concems with providing a secure and timely management of on-boarding
provisioning) and off-boarding (de-provisioning) of users in the cloud.
. When a user has successfully authenticated to the cloud, a Portion of the system
resources in terms of CPU cycles, memory, storage and network bandwidth is
allocated. Depending on the capacity identified for the system, these resources are
made available on the system even if no users have been logged on.
; Maintaining a single ID across multiple platforms and organizations
« It is tough for the organizations to keep track of the various logins and ID that the
employees maintain throughout their tenure. The centralised federated identity
management is the answer for this issue. Here users of cloud services are
authenticated using a company chosen identity provider.
4. Security when using 3rd party or vendor network
+ A lot of services and applications used in the cloud are from 3rd party or vendor
networks. You may have secured your network, but can not guarantee that their
security is adequate.
4. Compliance visibility : Who has access to what ?
* When it comes to cloud services, it's important to know who has access to
applications and data, where they are accessing it and what they are doing with it.
IAM should be able to provide a centralised compliance reports across access
rights, provisioning/de-provisioning and end-user and administrator activity.
There should be a central visibility and control across all your systems for
auditing purposes.
* Identity and access management is an important aspect of any business. It's a
Process that allows organizations to manage user access to data and resources and
‘nsures the security of that data. While the process is not easy, it is important to
Bet it right so it does not become a roadblock to your business. This can be
achieved by having the right tools in place and following best practices.
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeCloud Computing 6-22
ERX 1AM Architecture and Practice
* Fig. 5.4.1 shows architecture of IAM.
Fig. 5.4.1 Architecture of IAM
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgewe:
pas coment di 5-23 Cloud Security
|, User management : It consists of activities for the control mana;
Bi tie oye rol and ement over
« Authentication management : It consists of activities for effectively controlling and
managing the processes for determining which user is t
ying to access the services
and whether those services are relevant to him or not :
i Authorization management : It consists of activities for effectively controlling and
managing the processes for determining which services are allowed to access
according to the policies made by the administrator of the organization.
+ Access management : It is used in response to a request made by the user
wanting to access the resources with the organization.
Data management and provisioning : The authorization of data and identity are
carried towards the IT resource through automated or manual processes.
Monitoring and auditing : Based on the defined policies the monitoring, auditing
and reporting are done by the users regarding their access to resources within the
organization.
Operational activities of IAM : In this process, we onboard the new users on the
organization's system and application and provide them with necessary access to
the services and data.
Credential and attribute management : Credentials are bound to an individual
user and are verified during the authentication process. These processes generally
include allotment of username, static or dynamic password, handling the password
expiration, encryption management and access policies of the user.
+ Entitlement management : These are also known as authorization policies in
which we address the provisioning and de-provisioning of the privileges provided
to the user for accessing the databases, applications and systems.
Identity federation management : In this process, we manage the relationships
beyond the internal networks of the organization that is among the different
organizations. The federations are the associate of the organization that came
together for exchanging information about the user's resources to enable
collaboration and transactions.
Centralization of authentication and authorization : It needs to bi
order to build custom authentication and authorization features into their
application, it also promotes the loose coupling architecture.
e developed in
15.4.7 | Single Sign - On
* A mechanism enabling one cloud service ¢
Security broker which establishes a security con|
onsumer to be authenticated by @
text that is persisted while the
TECHNICAL PUBLICATIONS® - an up-thnust for knowledgeTR
Cloud Computing
5-24 an
we a Se ee
Gloue service consumer accesses other cloud: services or cloud based, Ty ae
in order for the cloud Service consumer not to re-authenticate itself witl every
subsequent request,
Implementation mechanisms
* Not a trivial job at all to propagate the authentication and authorization
information for a cloud service consumer across multiple cloud services, especially
with a numerous cloud services or cloud-based IT resources to be invoked as part
of the same overall runtime activity.
* SSO (or security broker) mechanism to enable mutually independent cloud services
and IT resources to generate and circulate runtime authentication ang
authorization credentials (security token) in order to allow the credentials
Provided by the cloud service consumer at its login time to be valid through out
the duration of the same session
Security brokerage mechanism is especially useful when a cloud service consumer
needs to access cloud services residing on different clouds.
* Not to counter security threats directly, but to enhance the usability of
cloud-based environments for access and management of distributed IT resources
and solutions without violating security policies.
PLS)
f
1.
What is IAM and detail the segregation roles carried out by IAM when services of multiple
organizations are maintained within the same geographical location ?
Two Marks Questions with Answers
Q1 Define cloud security.
Ans. : Cloud computing security consists of a set of policies, controls, procedures and
technologies that work together to protect cloud-based systems, data and infrastructure.
These security measures are configured to protect data,
Support regulatory compliance
and protect customer's privacy as well as setting authentication rules for individual
users and devices.
Q2 Discuss the different cloud security services,
Ans. : Cloud security services are authentication, authorization, auditing and
accountability.
3 How security policies are implemented on cloud computing 2
Ans. : Cloud security is a shared responsibility of the cloud Provider and customer.
TECHNICAL PUBLICATIONS® - an upthnist for mnowiodPerform data classification (Statement of sensitivity),
2: Perform threat risk assessment on the solution;
> 3: Address threats/risks identified by i
3 y implementing the Proper controls;
4: Continuously monitor and periodically audit systems and servic |
is multitenancy issue in cloud computing ? me
iting resources in a public or private cloud. Each tenant's data is isolated
s invisible to other tenants. 5 |
the problem associated with cloud computing.
associated with cloud computing are security, integration and
a ‘ability, governance and regulatory compliance. ©
e governments or enterprises may need to enforce strict limits on the spatial
al existence of data. For example, a government might want to keep
ta of its citizens within the country and for an exact duration.
do you understand by virtualization security management ? |
ualization security is the collective measures, procedures and processes that
protection of a virtualization infrastructure / environment. Tt addresses the
faced by the components of a virtualization environment and methods |
1 it can be mitigated or prevented.
is the difference between identity management and access
management ?
tity management confirms that user are user and stores information about
tity management database holds information about user identity. Access
uses the information about our identity to determine which software |
allowed access to and what we are allowed to do when we access them.
ple, access management will ensure that every manager with direct reports
to an app for timesheet approval, but not so much access that they can |
own timesheets.
t is AWS identity and access management ?
Web Services (AWS) identity and access management is simply the
tem that is built into AWS. By using AWS IAM, we can create AWS users and
| grant or deny them access to AWS services and resources. AWS IAM is
ree of :
a Qo0
TECHNICAL PUBLICATIONS® - an o-thrust for knowledaeSOLVED MODEL QUESTION PAPER
[As Per New Syllabus}
Cloud Computing
Yertical - 3 (Cloud Computing and Data Centre Technologies) (CSE/IT/AI&Ds)
Vertical - 2 (Full Stack Development for IT) (IT/AI&DS)
Vertical - 2 (Cloud Computing and Data Centre Technologies) (CS&BS)
Time : Three Hours) [Maximum Marks : 100
Answer ALL Questions
PART A - (10 x 2 = 20 Marks)
What is meant by IaaS in cloud computing ?
at
(Refer Two Marks Q.25 of Chapter - 1)
a2 What is private clouds ? (Refer Two Marks Q.19 of Chapter - 1)
a3 Define I/O virtualization. (Refer Two Marks Q.10 of Chapter - 2)
a4 What is application server virtualization ?
(Refer Two Marks Q.6 of Chapter - 2)
as What is networking virtualization ? (Refer Two Marks Q.2 of Chapter - 3)
a6 What is cloud analytics ? (Refer Two Marks Q.5 of Chapter - 3)
a7 How virtualization employed in azure ? (Refer Two Marks Q.7 of Chapter - 4)
Qs What is AWS ecosystem ? (Refer Two Marks Q.2 of Chapter - 4)
as Define cloud security. (Refer Two Marks Q.1 of Chapter - 5)
Q40 © What is multitenancy issue in cloud computing ?
(Refer Two Marks Q.4 of Chapter - 5)
PART B - (5 x 13 = 65 Marks)
Q41 a) i) What is cloud computing ? Explain characteristics, pros and cons of cloud
computing. (Refer section 1.1) 7
ii) Explain cloud service model. (Refer section 1.5) {6]
OR
b) i) Discuss briefly infrastructure as a service. What are advantages
and disadvantages of IaaS. (Refer section 1.8) m
ii) Explain migrating into the cloud. (Refer section 1.11) [6]
Q42 a) What is hypervisor ? Explain type 1 and type 2 hypervisor. Write difference
between type 1 and type 2 hypervisor. (Refer section 2.3) (13)
(M- 1)Cloud Computing M-2
b) i) Explain following : Memory virtualization,
Q.13 a)
b)
Q.14 a)
b)
Q.15 a)
b)
Q.16 a)
b)
Solved Model Question p,,
OR
1/0 virtualization
(Refer sections 2.5.1 and 2.5.2) pet of virtua io
ii) What is virtual machine ? Explain advantages 2” 07
machine, (Refer section 2.1) ese 3.7 ;
i) What is docker ? Explain docker architecture. (Refe m
ent.(Refer section 3,6
ii) Discuss briefly virtual clusters and resource manageme a
oR
Sante a in difference between bi
i) What do you mean block level virtualization ? eg iffe pe
level and file level virtualization. (Refer section 3: . 7)
f n te ti ti
ii) Explain about desktop virtualization. Explain types of desktop virtualization,
(Refer section 3.1) a
Write short note on following : i) Microsoft azure ii) Eucalyptus
(Refer sections 4.3 and 4.4) [13]
oR
Write short note on following : i) OpenStack ii) Google App Engine
(Refer sections 4.5 and 4.1) (13)
i) Discuss about identity and access management, (Refer section 5.4) 7
ii) Explain in detail cloud security services, (Refer section 5.1.3) 6)
oR
i) Explain guest - hopping attack and hyperjacking. (Refer section 5.2) 7
ii) Discuss cloud security challenges and risks, (Refer section 5.1.1) (6)
PART C - (1 x 15 = 15 Marks)
What is EC2 instances ? Explain
configuring Amazon EC2 Linux instances.
(Refer section 4.2.3)
(15)
OR
What is public and private cloud 2
lain ai ; a
cloud. (Refer section 1.4) Explain difference between public and priva
(15)
goo
TECHNICAL PUBLICATIONS® . 4p UD-thrist for kno
z "hecina