ACC Ans Sheet
ACC Ans Sheet
1. Con dentiality
• Example: Online banking uses multi-factor authentication and data encryption to keep account
details con dential.
2. Integrity
• Ensures the accuracy, consistency, and reliability of data throughout its lifecycle.
• Maintained through hashing, checksums, error detection codes, and digital signatures.
• Example: Digital signatures on e-mails guarantee that the content has not been altered.
3. Availability
• Ensures that data, systems, and services are available when required by authorized users.
• Techniques include redundancy, load balancing, backup systems, disaster recovery, and DoS
protection.
• Example: Cloud providers like AWS use replication across multiple servers to ensure 24×7
availability.
In summary, the CIA Triad provides a balanced framework for cloud security. Breach of any one
element (C, I, or A) can result in serious security risks.
fi
fi
fi
Q2. Differentiate between Traditional vs Cloud Security
Traditional Security and Cloud Security differ in their approach due to the
environment they protect.
Disaster Backup and recovery managed in- Built-in disaster recovery and
Recovery house, often time-consuming. redundancy provided by CSP.
Summary:
• Traditional Security protects physical IT assets with full organizational control but is costly and
less exible.
• Cloud Security protects virtual assets in shared environments, offers scalability, cost savings, and
advanced resilience, but requires trust in CSP and strong governance.
• Aim to overload cloud servers with excessive traf c, making them unable to process legitimate
requests.
• Example: Flooding a cloud-hosted website so that genuine users cannot access it.
2. Account Hijacking
• Once hijacked, attackers may steal sensitive data, manipulate services, or misuse resources.
• Happens when cloud resources are not properly con gured (e.g., leaving storage buckets open
to the public).
• Attackers exploit human errors like weak passwords, phishing, or malware infections.
• Unlike account hijacking (which is external), this often happens because of careless user
actions.
• Attackers upload malicious code, services, or infected virtual machines into the cloud system.
• Once injected, the malware can steal data, damage les, or redirect traf c to attacker-controlled
systems.
6. Insider Threats
• Employees or contractors with legitimate access misuse privileges for personal gain or by
mistake.
• Hard to detect as insiders often have trust and higher access rights.
7. Side-Channel Attacks
• Attackers running a malicious VM on the same physical host may access sensitive data of other
tenants.
fi
fi
fi
fi
fi
8. Cookie Poisoning
◦ Modifying or injecting malicious data into session cookies used in SaaS applications.
9. Insecure APIs
◦ APIs are central to cloud services, but poorly secured APIs allow attackers to exploit
vulnerabilities.
• Attackers hijack cloud resources to perform cryptocurrency mining without the owner’s
knowledge.
• Causes high billing costs, performance issues, and resource drain for victims.
Cloud vulnerabilities are weaknesses or miscon gurations in cloud environments that can be
exploited by attackers to gain unauthorized access, steal data, or disrupt services. Major types
include:
• Occurs when cloud resources (e.g., storage buckets, databases) are left publicly accessible or
incorrectly con gured.
• Weak IAM policies, excessive permissions, or lack of multi-factor authentication (MFA) allow
attackers to misuse accounts.
• Solution: Apply least privilege principle and regularly review access rights.
• Storing sensitive data in publicly accessible storage systems without encryption makes it
vulnerable.
• Leaving unnecessary network ports open provides attackers easy entry points for intrusion or
malware injection.
• Storing API keys, passwords, or certi cates in insecure locations (like code repositories)
increases risk of leakage.
Summary:
Cloud vulnerabilities mainly arise from miscon gurations, weak access control, insecure storage,
and poor security practices. Minimizing them requires strong IAM, encryption, secure
con guration, monitoring, and compliance checks.
Authentication in cloud computing is the process of verifying and validating the identity of users,
devices, or systems before granting access to cloud services and resources. It ensures that only
authorized entities can log in and use sensitive information, thereby protecting against unauthorized
access.
Key Points:
1. De nition:
• Authentication answers the question “Who are you?” and con rms that the user is genuine.
• It is the rst step of cloud security, before authorization and access control.
2. Purpose:
• Token-based authentication – Digital certi cates, SSO (Single Sign-On), or security tokens
that grant time-limited access.
fi
fi
fi
fi
fi
fi
fi
fi
fi
• OAuth & Identity Federation – Common in enterprise setups, where third-party identity
providers authenticate users (e.g., logging into apps using Google or Microsoft account).
• Secures multi-tenant environments where many users share the same cloud resources.
• Essential for compliance with security standards like GDPR, HIPAA, and ISO.
1. Non-Repudiation
• Importance: Provides accountability and trust in cloud environments. For example, in online
banking, digital signatures ensure that transactions cannot later be denied.
2. Access Control
• De nition: Access control is the mechanism of restricting and regulating who can use cloud
resources and what actions they can perform.
• Types:
• Importance: Prevents unauthorized access, limits data leakage, and enforces the principle of
least privilege.
3. Defense in Depth
• De nition: A multi-layered security strategy where multiple protective measures are applied
at different levels (physical, network, application, data).
• Importance: Even if one layer is compromised, other layers continue to protect resources.
This makes cloud systems more resilient against attacks.
fi
fi
fi
fi
fi
Summary:
Cloud computing offers different deployment models depending on ownership, security, and scope
of use. The main types are:
1. Public Cloud
• Infrastructure is owned and operated by third-party cloud providers like AWS, Microsoft
Azure, or Google Cloud.
• Services (storage, networking, applications) are delivered over the internet and shared by
multiple users (multi-tenancy).
2. Private Cloud
• Provides greater security, control, and customization, making it suitable for industries
handling sensitive data such as banks, hospitals, and government agencies.
• However, it is expensive compared to public cloud because the organization bears most of
the infrastructure cost.
3. Hybrid Cloud
• Critical or sensitive workloads are kept on private cloud, while general workloads are
deployed on public cloud.
• Example: A company may use private cloud for nancial data and public cloud for customer
support applications.
fl
fi
4. Community Cloud
• Reduces cost through shared infrastructure, while still being more secure than public cloud.
Q8. Explain the Cloud Infrastructure Architecture/ Cloud service models with
image.
Cloud services are generally classi ed into three major service models, which form the backbone
of cloud infrastructure:
• Users can install their own operating systems, middleware, and applications.
• Advantage: High exibility, scalability, and cost savings since physical infrastructure is
managed by the provider.
- IAAS is like renting virtual computers and storage space in the cloud.
- You have control over the operating systems, applications, and development frameworks.
- Scaling resources up or down is easy based on your needs.
• Provides a ready-to-use platform with OS, runtime, and development tools for application
deployment.
- PAAS is like a toolkit for developers to build and deploy applications without
worrying about infrastructure.
- It speeds up the development process and allows for easy collaboration among
developers
• Provides ready-made software applications hosted on the cloud and delivered via the
internet.
• Users access apps through web browsers without managing infrastructure or platforms.
- Applications are ready to use, and updates and maintenance are handled by the provider.
- You access the software through a web browser or app, usually paying a subscription fee.
- It’s convenient and requires minimal technical expertise, ideal for non-technical users.
Q9. Differentiate between IAAS,PASS and SAAS.
Q10. 5 Key Components of Cloud Computing Security Architecture
Cloud Computing Security Architecture consists of several essential components that protect cloud
systems and data. The ve key components are:
• Includes features like Multi-Factor Authentication (MFA), Single Sign-On (SSO), and role-
based access control (RBAC).
• Protects data at rest, in transit, and in use through encryption, tokenization, and secure key
management.
3. Network Security
• Continuous monitoring for threats, anomalies, and intrusions using SIEM tools (Security
Information and Event Management).
• Ensures cloud operations meet legal, regulatory, and organizational security standards (e.g.,
GDPR, HIPAA, ISO 27001).
• Involves policies, audits, and risk assessments to maintain trust and accountability.
Summary:
The ve key components — IAM, Data Security, Network Security, Monitoring & Response,
and Compliance — together provide a layered defense ensuring cloud systems remain secure,
reliable, and trustworthy.
fi
fi
fi
fi
fi
Q11. What is Hypervisor, explain the types of Hypervisors.
De nition:A Hypervisor, also called a Virtual Machine Monitor (VMM), is a software, rmware, or
hardware layer that enables virtualization. It allows multiple virtual machines (VMs) to run on a
single physical host by sharing its hardware resources such as CPU, memory, storage, and network.
• Each VM behaves like a separate independent system with its own operating system and
applications.
• Hypervisors also provide isolation between VMs, so failure or attack in one VM does not
affect others.
• They play a key role in cloud computing, data centers, and server consolidation.
Types of Hypervisors:
• Installed directly on the physical hardware of the host machine, without any underlying
operating system.
• Because it has direct access to hardware, it provides better performance, reliability, and
stronger security.
• It is widely used in enterprise data centers and cloud providers where ef ciency and
scalability are critical.
• The host OS manages the hardware, while the hypervisor runs as an application and creates
VMs.
• Easier to install and use, but has slightly lower performance compared to Type 1, since it
depends on the host OS.
Summary:
• Type 2 Hypervisors → hosted, run on OS, easier to use → used for personal/test
environments.
fi
fi
fi
Q12. Infrastructure Security at the Network Level
De nition: Network-level security in cloud infrastructure focuses on protecting communication
channels, data ows, and networked resources from unauthorized access, interception, or attacks. It
ensures that only trusted users and systems can connect to cloud resources, while malicious traf c is
detected and blocked.
◦ Divides cloud networks into isolated zones to limit lateral movement of attackers.
5. DDoS Protection
◦ Defends against Distributed Denial-of-Service attacks that ood cloud services with
excessive traf c.
◦ Ensures data in transit is encrypted using protocols like TLS/SSL, HTTPS, and
IPsec.
diagram:
fi
fi
fi
fl
Q13. Infrastructure Security at the Application Layer in Cloud Computing
De nition: Application layer security in cloud computing focuses on securing applications and the
data they process from vulnerabilities, miscon gurations, and malicious attacks. Since applications
are the interface through which users access cloud services, securing them is critical to prevent data
breaches and service disruption.
◦ Protect against attacks like SQL injection, Cross-Site Scripting (XSS), and CSRF.
2. Application Hardening:
◦ Secure con guration of applications and servers.
1. Malware Attacks
◦ Malicious software such as viruses, worms, trojans, and ransomware is injected into
cloud systems.
◦ Threat: Can result in data corruption, theft of sensitive les, or complete denial of
service if critical workloads are locked or destroyed.
◦ Threat: Leads to account hijacking, privilege escalation, and data leakage across the
cloud environment.
4. Insider Threats
◦ Employees, contractors, or partners may intentionally misuse access or act carelessly
with credentials.
◦ Threat: Leads to loss of con dentiality, altered messages, and theft of login details or
nancial data.
fi
fi
fl
fi
fi
fi
fi
fi
Q15. Explain the term Isolation, Virtualization, Contaiernization and
Segmentation
1. Isolation:
• It ensures that data and applications of different tenants remain secure and independent.
• Example: In a multi-tenant cloud, one customer’s VM crash does not impact another’s VM.
2. Virtualization:
• De nition: Abstraction of physical hardware into multiple virtual resources such as servers,
networks, or storage.
Types of Virtualization:
1. Server Virtualization – Splits a physical server into multiple virtual servers (each with its
own OS).
2. Storage Virtualization – Combines multiple storage devices into a single logical pool.
3. Segmentation:
• Each segment can have its own security policies and controls.
• Example: Separating sensitive databases from general user applications using virtual LANs
(VLANs).
• Purpose: Minimizes attack surface, prevents lateral movement of attackers, and enforces
stricter access control.
fi
fi
fi
fi
fl
fi
fl
4. Containerization
• Bene ts:
◦ Easy scaling and deployment using tools like Docker and orchestration via
Kubernetes.
• De nition: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) are
advanced network security mechanisms used to protect cloud infrastructure from
unauthorized or malicious activities. They continuously monitor, analyze, and respond to
network traf c.
• Working:
◦ IPS (Prevention): Works like a security guard. It not only detects but also takes
immediate action to block, drop, or quarantine malicious traf c in real-time.
• Examples: Snort (IDS), Suricata (IDS/IPS), Cisco Firepower, Palo Alto Threat Prevention.
fi
fi
fi
fi
fi
fi
fi
2. Firewall:
• De nition: A rewall is a security system (hardware or software) that enforces a set of rules
and policies to regulate traf c entering or leaving a network. It acts as a protective barrier
between trusted internal systems and the untrusted outside world (e.g., the internet).
• Working:
◦ Evaluates each packet of network traf c based on IP address, port number, and
protocol.
• Purpose: Firewalls prevent unauthorized access, block malicious connections, and reduce
the risk of attacks like worms, ransomware, or brute force logins.
• Types of Firewalls :
• Examples: AWS Security Groups and NACLs (in cloud), pfSense, Palo Alto, Fortinet.
Q17. Explain the term OS Hardening and minimization, Veri ed and measured
boot.
• Example: Disabling unused ports, uninstalling default applications, and enforcing strong
password policies.
2. Veri ed Boot
• De nition: Veri ed Boot ensures that the system boots only with trusted and digitally
signed software components.
• Working: Each boot stage checks the integrity of the next stage (using cryptographic
signatures) before execution. If tampered les are detected, the boot process is stopped or
repaired.
• Purpose: Prevents rootkits, bootkits, or unauthorized changes from loading during startup.
3. Measured Boot
• De nition: Measured Boot is a security process where each component loaded during
boot is measured (hashed) and recorded into a secure hardware module like TPM
(Trusted Platform Module).
• Working: Instead of blocking boot like Veri ed Boot, it records the measurements in TPM
so they can be validated later by trusted authorities (remote attestation).
• Example: Windows Measured Boot with TPM and remote attestation in enterprise
networks.
fi
fi
fi
fi
fi
fi
fi
Q18. Cloud security principles
Key Cloud Security Principles:
1. Con dentiality
2. Integrity
3. Availability
◦ Ensure cloud services and resources are reliable and accessible when needed.
6. Non-Repudiation
7. Defense in Depth
◦ Adhere to laws, standards, and regulations (like GDPR, HIPAA, ISO standards) for
cloud data protection.
fi
fi
Q19. What is Data retention, deletion and archiving procedures for tenant data,
Encryption, Data Redaction, Tokenization, Obfuscation, PKI
• Data Retention: Policy that de nes how long tenant data is stored in the cloud (e.g.,
months/years) based on business or legal needs.
• Data Deletion: Secure and permanent removal of tenant data when no longer required,
ensuring it cannot be recovered.
• Data Archiving: Moving inactive or old tenant data to long-term, low-cost storage while
keeping it accessible if needed for compliance.
• Purpose: Ensures regulatory compliance, cost-ef ciency, and data lifecycle management.
2. Encryption
• Purpose: Protects con dentiality of tenant data both at rest (storage) and in transit
(network).
• Example: AES encryption for cloud storage, TLS for secure communication.
3. Data Redaction
• De nition: The process of masking or removing sensitive parts of data (e.g., hiding credit
card digits except last 4).
• Purpose: Prevents exposure of con dential details when sharing logs, reports, or
documents.
4. Tokenization
• De nition: Sensitive data is replaced with a random token (non-sensitive substitute) that has
no exploitable meaning.
• Purpose: Protects data like credit cards or healthcare records while still allowing business
processes to use the token.
• De nition: Technique of making data or code harder to understand without changing its
function.
• Purpose: Protects intellectual property (source code) and makes it dif cult for attackers to
misuse stolen data.
• De nition: A framework that uses public key cryptography for secure communication,
authentication, and digital signatures.
• Components: Certi cate Authorities (CA), digital certi cates, public/private key pairs.
Summary:
• PKI provides the underlying trust framework for secure communication and identity
veri cation.
fi
fi
fi
fi
fi
fi
fi
fi
fi