Chapter 6
Chapter 6
Cloud Security
6
6.1 Cloud Security Fundamentals
6.2 Privacy and Security in Cloud
6.3 Cloud Security Architecture
6.4 Identity Management and Access Control
6.5 Cloud Computing Security Challenges
6.6 Case Study based on Cloud Computing Concepts
6.7 Shared Responsibility Model
6.8 Introduction to Docker Container
Introduction:
It refers to a broad set of policies, technologies, and controls deployed to protect data, applications,
and the associated infrastructure of cloud computing.
Cloud computing and storage solutions provide users and enterprises with various capabilities to
store and process their data in third-party data centers. Organizations use the Cloud in a variety of
different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, Hybrid,
and Community). There are a number of security concerns associated with cloud computing.
These issues fall into two broad categories: security issues faced by cloud providers
(organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and
security issues faced by their customers (companies or organizations who host applications or
store data on the cloud).
The responsibility is shared, however. The provider must ensure that their infrastructure is secure
and that their clients’ data and applications are protected, while the user must take measures to
fortify their application and use strong passwords and authentication measures.
According to a recent Cloud Security Alliance Report, insider attacks are the sixth biggest threat
in cloud computing. Therefore, Cloud Service providers must ensure that thorough background
Page | 61
checks are conducted for employees who have physical access to the servers in the data center.
Additionally, data centers must be frequently monitored for suspicious activity.
Security in cloud computing is a major concern. Data in cloud should be stored in encrypted form.
To restrict client from accessing the shared data directly, proxy and brokerage services should be
employed.
A) Security Planning:
Before deploying a particular resource to cloud, one should need to analyze several aspects of
the resource such as:
Select resource that needs to move to the cloud and analyze its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS, and SaaS. These models require
customer to be responsible for security at different levels of service.
Consider the cloud type to be used such as public, private, community or hybrid.
Understand the cloud service provider's system about data storage and its transfer into and
out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.
Page | 62
employed to detect attacks on cloud systems and the supporting communications
infrastructure.
d) Corrective controls: Corrective controls reduce the consequences of an incident, normally
by limiting the damage. They come into effect during or after an incident. Restoring system
backups in order to rebuild a compromised system is an example of a corrective control.
Page | 63
i) Security Mechanisms: Countermeasures are typically described in terms of security
mechanisms, which are components comprising a defensive framework that protects IT
resources, information, and services.
j) Security Policies: A security policy establishes a set of security rules and regulations.
Often, security policies will further define how these rules and regulations are
implemented and enforced. For example, the positioning and usage of security controls
and mechanisms can be determined by security policies.
Page | 64
Same passwords were used in Google, Twitter, and LinkedIn. Now the attackers had
access to the CMS plus other applications like email.
The CEO's was the admin for their Google Apps Mail services. By resetting users
passwords, could gain access.
B) Vulnerability Vs Protection:
Vulnerability Protection
SQL Injection: Attacker runs own SQL Parameterized queries
XSS: Attacker exploits no escaping of Escape all entrusted data
input parameters to run script in user's
browser, e.g. Send session Id to attacker
Broken authentication and session Use hardened and centralized
management authentication system. Step up
authentication
Indirect Object Reference: Attacker Map indirect to direct values on
changes a parameter to object the server. Access control checks.
attacker isn’t authorized for.
Security in cloud computing is a major concern. Proxy and brokerage services should be
employed to restrict a client from accessing the shared data directly. Data in the cloud should be
stored in encrypted form.
Security Planning:
Before deploying a particular resource to the cloud, one should need to analyze several aspects of
the resource, such as:
A select resource needs to move to the cloud and analyze its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS,and These models require the customer to
be responsible for Security at different service levels.
Consider the cloud type, such as public, private, community, or
Understand the cloud service provider's system regarding data storage and its transfer into and
out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.
Page | 65
Fig.6.1: Cloud Security Architecture (CSA) model
Security Boundaries: The Cloud Security Alliance (CSA) stack model defines the boundaries
between each service model and shows how different functional units relate. A particular service
model defines the boundary between the service provider's responsibilities and the customer. The
following diagram shows the CSA stack model:
Although each service model has security mechanism, the security needs also depend upon
where these services are located, in private, public, hybrid or community cloud.
Cloud security architecture describes all the hardware and technologies designed to protect data,
workloads, and systems within cloud platforms.
Page | 66
Cloud Security Core Capabilities:
Secure cloud computing architecture encompasses three core capabilities: confidentiality, integrity,
and availability.
1. Confidentiality is the ability to keep information secret and unreadable to the people who
shouldn’t have access to that data, such as attackers or people inside an organization without
the proper access level. Confidentiality also includes privacy and trust, or when a business
pledges secrecy in handling their customers’ data.
2. Integrity is the idea that the systems and applications are exactly what you expect them to be,
and function exactly as you expect them to function. If a system or application has been
compromised to produce an unknown, unexpected, or misleading output, this can lead to
losses.
3. Availability is the third capability and is generally the least considered by cloud architects.
Availability speaks to denial-of-service (DoS) attacks.
Page | 67
threshold has been crossed and the threat has generated an alarm or warning picked up by
security analysts monitoring the systems.
e) Vulnerabilities Detection and Management: Vulnerabilities detection and management
enables automated verification and management of the security level of information
systems.
f) Continuous System Patching/Upgrade and Fortification: Security posture is enhanced
with continuous system patching and upgrading of systems and application software. New
patches, updates, and service packs for the equipment’s operating system are necessary to
maintain adequate security levels and support new versions of installed products.
g) Intervention, Forensics, and Help Desk Services: Quick intervention when a threat is
detected is crucial to mitigating the effects of a threat. This requires security engineers with
ample knowledge in the various technologies and with the ability to support applications as
well as infrastructures on a 24/7 basis.
B) Ensuring Privacy in Cloud Computing Environment
Privacy protection in cloud computing environment is less of a technical issue and more of a
policy and legal issue. Policies are required to be framed to conform to the legal framework
protecting the privacy of individual and organizations. Policies have to empower people to
control the collection, use, and distribution of their personal information. A very good framework
on privacy protection is given by the Safe Harbor privacy principles5 developed by the U.S.
Department of Commerce and the European Commission. It is based on 7 principles. These
principles must provide:
Notice - Individuals must be informed that their data is being collected and about how it will
be used.
Choice - Individuals must have the ability to opt out of the collection and forward transfer of
the data to third parties.
Onward Transfer - Transfers of data to third parties may only occur to other organizations
that follow adequate data protection principles.
Security - Reasonable efforts must be made to prevent loss of collected information.
Data Integrity - Data must be relevant and reliable for the purpose it was collected for.
Access - Individuals must be able to access information held about them, and correct or
delete it if it is inaccurate.
Enforcement - There must be effective means of enforcing these rules.
These tenets provide a framework for the development of privacy principles developed by
major organizations across the world, which guide the use and management of customer and
partner information. Therefore, some of the key issues while framing a suitable policy could be
as given below-
a) Accountability – In handling personal information by the cloud provider and with the
vendors and partners
b) Notice – to individuals about how the personal information is collected, used, retained and
disclosed to third parties.
c) Collection – of personal information from the individuals only for the purposes specified in
the privacy notice and acceptable to the individual.
d) Choice and consent - for individuals regarding how the cloud provider collects, uses, and
discloses their personal information. The individual should be given a choice to accept or
opt out.
e) Use and retention - of personal information in accordance with the privacy notice and
consent that individuals have provided. Individuals should be given adequate information
on how the data will be used and for how long it will be retained.
f) Disclosure or onward transfer – of personal information to vendors and partners only for
purposes that are identified in the privacy notice, and in a secured manner to avoid
leakage in transit.
Page | 68
g) Quality assurance - steps to ensure that personal information in the records is accurate
and relevant to the purposes for which it was collected.
h) Access - for individuals who want to inquire about and, when appropriate, review and
update their personal information in the cloud provider’s possession. Individuals should
have the choice to correct the information in case of errors.
i) Enhanced security - of personal information to help protect against unauthorized access
and use. Only authorized users to have access to the data and also to ensure that they
are adequately isolated from each other.
j) Monitoring and enforcement – of compliance with the privacy policies, both internally
and with the vendors and partners, along with established processes to address inquiries,
complaints, and disputes.
6.4 Identity Management and Access Control:
A) Managing Identities in Cloud: General Identity Management considerations
Initial identity verification, federated identities: Decide which makes sense
Password complexity rules, expiration period, password reuse
User roles defined with access entitlements: Some users should have less privileged
access based on role
System access granted, periodically reviewed, and revoked based on business need
Access is logged, accountability maintained: Required to trace for any anomalies
Identify and resolve separation of duties conflicts:
Strong authentication and encryption of remote administration
Monitor privileged access: Should ensure business need for this and access regularly
B) Different Approaches for providing Cloud identity
Users get new Identity for each Cloud Provider
Users login to their intranet and identity passed to cloud provider (federated identity)
User identity passed between Cloud providers
User provides other services with access to Cloud Provider resources e.g. Flickr photos
shared with facebook account.
Federating Identity and Single Sign On
Security and
Privacy
Reliability and
Availability Portability
Security
Challenges
Computing
Performance Interoperability
Page | 71
the organization's headquarters.
Recommendations
Enterprises that need to build a management foundation promptly, without local IT
infrastructure professionals, as part of preparation for a global business rollout while
reinforcing IT governance should consider implementing a SaaS-based ERP system.
To maximize the benefits from a SaaS-based ERP system for an SMB — that is, a
shorter time to delivery and lower initial capital investment — it is important to be
prepared to be satisfied with restricted functionalities and minimum vendor support.
Actively consider the responsibilities associated with the choice made by users. Perform
independent planning and take the necessary steps driven by the user organization.
Localization requirements based on local laws and regulations which need additional
customization should be examined with scrupulous care in advance.
Page | 72
6.8 Introduction to Docker Container:
A container is a standard unit of software that packages up code and all its dependencies so the
application runs quickly and reliably from one computing environment to another.
Heavyweight Lightweight
Startup times in minutes In milliseconds
Each VM runs in its own OS All Containers share host OS
Page | 73
Hardware level virtualization OS virtualization
Allocates required memory Requires less memory space
Isolate Systems Isolates Applications
Difficult to maintain Easy to maintain
Ex. Vmware, VirtualBox, KVM Ex. Linux container, Docker, Windows
Experts predict that Containers are not replacing virtual machines, but rather
complementing them
Page | 74
Review Questions
Page | 75