CC Unit 2
CC Unit 2
Software-as-a-Service,
Security Governance,
Data Security.
1.Security Governance
Security governance in cloud computing refers to the framework of policies, procedures, and controls put in
place to ensure that security objectives are met effectively and consistently within a cloud environment.
Here are key components of security governance in cloud computing:
Policy Framework: Establishing a comprehensive set of security policies specific to cloud computing,
covering areas such as data protection, access control, incident response, and compliance requirements.
These policies should align with organizational objectives and regulatory obligations.
Risk Management: Implementing processes for identifying, assessing, and mitigating risks associated with
cloud computing. This includes evaluating the security capabilities of cloud service providers, assessing the
sensitivity of data stored in the cloud, and addressing potential security vulnerabilities.
Compliance Management: Ensuring compliance with relevant laws, regulations, and industry standards
applicable to cloud computing, such as GDPR, HIPAA, or PCI DSS. This involves understanding regulatory
requirements, conducting audits, and maintaining compliance documentation.
Security Awareness and Training: Providing education and training to employees and stakeholders on
security best practices, risks associated with cloud computing, and their roles and responsibilities in
maintaining security.
Vendor Management: Establishing processes for selecting and managing cloud service providers based on
their security capabilities and compliance with security requirements. This includes evaluating vendor
security controls, negotiating contracts, and monitoring vendor performance.
Identity and Access Management (IAM): Implementing robust IAM controls to manage user identities,
access permissions, and authentication mechanisms within the cloud environment. This includes enforcing
least privilege access, implementing multi-factor authentication, and regularly reviewing access rights.
Incident Response and Disaster Recovery: Developing and testing incident response and disaster recovery
plans specific to cloud computing to ensure timely detection, containment, and recovery from security
incidents or service disruptions.
Security Monitoring and Logging: Deploying monitoring tools and logging mechanisms to continuously
monitor cloud environments for security threats, unauthorized access, or suspicious activities. This includes
collecting and analyzing security logs to identify and respond to security incidents.
Security Metrics and Reporting: Establishing key performance indicators (KPIs) and metrics to measure the
effectiveness of security controls and governance processes in the cloud environment. Regular reporting on
security metrics helps track progress and identify areas for improvement.
Effective security governance in cloud computing requires collaboration between various stakeholders,
including IT, security, legal, compliance, and business teams. By implementing a robust security governance
framework, organizations can mitigate security risks and ensure the confidentiality, integrity, and availability
of data and services in the cloud.
A business model called SECaaS, or Security as a Service, offers security to IT companies on a subscription
basis. A superior security platform is provided by the outsourced approach, which lowers the total cost of
ownership than the business could supply on its own. With the use of cloud computing, security for the
company is maintained by an outside party. For the necessary computational and storage resources to run
their websites and apps, many enterprises rely on security services.
SECaaS is impressed by the “Security as a Service (SaaS)” model as applied to implement security kind
services and doesn’t need on-premises hardware, avoiding substantial capital outlays. These security
services typically embody authentication, antivirus, anti-malware/spyware, intrusion detection, penetration
testing, and security event management, among others.
Working of SECaaS:
When the IT department installs virus protection software, spam filtering software, and other security tools
on every computer, on the network, or on the server in your geographic location, keeping the package up to
date or instructing them to use it, security solutions are no longer delivered regionally with security as a
service.
The former method of doing things involved paying direct pricing for hardware as well as ongoing fees for
licenses to allow for the usage of that security code, which made it much more expensive. Instead, security
as a service makes it simple and rational to use similar technologies.
Encryption: makes the data unreadable until it has been authentically decoded, or encrypted.
Network security: Network access management protocols are used to secure and keep an eye on
network services.
Email security: Protects against email frauds, spam, phishing, malware etc.
Identification: Users can access with a valid log-in ID and legal permission, else forbids if it is not
authenticated.
Data loss prevention: Tools are built to monitor and secure data to protect from data loss.
Examples of SECaaS :
No security platform is perfect, since they all have a number of weaknesses. Nothing provides services that
are in line with our demands. Lack of complete control over security alternatives, susceptibility to shared
technology, data breach, poor architecture, resource allocation, and many other issues may be problems
associated with the outsourcing approach.
Selecting efficient SECaaS suppliers is crucial to addressing these ongoing difficulties. Partnering with the
right SECaaS requires experience and produces optimum production with a better profit.
It should be assured that the security team is available to respond to any system-related issues and
inquiries.
To be able to respond to any potential threats, the provided solution must be adaptable.
It needs to be strong.
Following an investigation into the security issues, service suppliers must propose an exact
resolution.
Endpoint and workload protection given through the cloud should be offered by IT providers.
Cloud security should be addressed by vendors.
Benefits of SECaaS:
Security Planning
Before deploying a particular resource to the cloud, one should need to analyze several aspects of the
resource, such as:
A select resource needs to move to the cloud and analyze its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS, and These models require the customer to be
responsible for Security at different service levels.
Consider the cloud type, such as public, private, community, or
Understand the cloud service provider's system regarding data storage and its transfer into and out
of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.
Cloud security architecture is often called cloud computing security architecture. It consists of security layers,
design and structure of infrastructure, tools, software, platform, and best practices adopted within a cloud
security solution.
Cloud security architecture provides a visual and written model to establish how to secure and configure
activities and operations in cloud; methods and controls in place for protection of applications, data;
approach towards visibility in compliance, threats, and overall security posture.
Processes documented and implemented to instil security principles in coding, development, and operations.
Policies and governance to meet standards of security and compliance including physical security
infrastructure components.
When developing cloud security architecture several critical elements should be included:
Let’s look at key principles we need to focus on while defining cloud security architecture as under:
Identification – Overall cloud resource repository knowledge involving users, assets, business
environment, policies, vulnerabilities, threats, risk management strategies which exist
Controls for security – Parameters and policies implemented across users, assets, data, and
infrastructure to manage overall security posture.
Security by design – Standardized and repeated deployment of common use cases with security
controls, standards, and audit requirements.
Compliance – Integration of industry standard and regulatory standards into cloud architecture to
meet the requirements.
Perimeter Security – Management of connection points between corporate networks and public /
external networks.
Segmentation – To prevent lateral movement of attackers in cloud network segregation of sections.
User Identity and Access Management – Visibility, understanding, and control on all users which
have access to cloud assets. Access, permissions, and protocol enforcement.
Data Encryption – Data at Rest and data in motion is encrypted to minimize breach impact.
Automation – Rapid security and configuration provisioning and quick threat detection.
Logging and Monitoring – activities are captured and monitored related to all connected systems and
cloud-based services to ensure operations visibility, compliance, and early detection of threats.
Visibility in Multi-cloud – Bring visibility in multiple cloud deployments by incorporating tools and
processes.
Flexibility in Design – Agility in architecture design to develop and incorporate new components and
solutions without compromising security, Standardization and automation across cloud
The goal of the cloud security architecture is accomplished through a series of functional elements. These
elements are often considered separately rather than part of a coordinated architectural plan. It includes
access security or access control, network security, application security, contractual Security, and
monitoring, sometimes called service security. Finally, there is data protection, which are measures
implemented at the protected-asset level.
The types of service models in use by a business define the types of cloud security architectures that are
most applicable. The cloud security models are: Infrastructure as a Service (IaaS), Software as a Service
(SaaS), and Platform as a Service (PaaS).
With SaaS, an organization purchases the use of a cloud-based application from a provider. Examples of SaaS
include Office 365 or Salesforce. In a SaaS, the customer is typically only responsible for the security
components associated with accessing the software, such as identity management, customer network
security, etc. The software provider manages the security backend.
With PaaS, a business purchases a platform from a cloud provider to develop, run, and manage applications
without developing or managing the underlying platform infrastructure required for the applications. An
example of a PaaS would be Amazon Web Services (AWS). In a PaaS, the customer is responsible for the
security associated with application implementation, configurations, and permissions.
The ability to successfully manage and optimize your portfolio of applications across your portfolio of clouds
will make the difference in how much business value IT can deliver to your organization.
In order to deliver the significant business value that a cloud portfolio can provide while ensuring the
necessary level of governance, enterprises require new approaches. Cloud Portfolio Management (CPM) is a
new type of solution — designed to help companies capitalize on this growing array of cloud technologies.
Cloud Portfolio Management solutions provide a comprehensive set of management capabilities that span all
aspects of cloud usage across a broad variety of cloud options, going well beyond what vendor-specific public
or private cloud management features provide.
CPM solutions are designed to provide the enterprise with a single pane of glass to manage a portfolio of
applications and optimize usage across a portfolio of clouds. They enable companies to choose the right
cloud — public or private — for each application and to move applications between clouds as circumstances
change. And they prevent lock-in and provide investment flexibility.
Here are six key characteristics of a Cloud Portfolio Management (CPM) solution.
For the greatest efficiency and control, large companies abstract the significant differences between public
and private clouds – and use a consistent management solution across these disparate environments.
A Cloud Portfolio Management (CPM) solution allows you to operate seamlessly across varied cloud services
and private cloud environments. Each cloud will differ in a wide variety of characteristics, including APIs,
behaviors (for example how clouds provision storage differently), resource sizes and types, and security
capabilities.
2) Delivering Self-Service IT
A critical requirement of enterprise cloud initiatives is to provide developers and application teams with self-
service access to cloud services. Enterprise developers often face 4–8-week delays for the approval,
purchasing, and provisioning of servers.
Self-service access to cloud decreases the time it takes to access infrastructure from months to minutes,
unleashing innovation and helping to speed new products to market.
In order to deliver self-service capabilities and bring shadow IT into the fold, central IT organizations need to
provide the same easy access to infrastructure that developers have come to expect from public cloud
services. Internal users are unlikely to be satisfied with modest improvements to lengthy waits when they
can take advantage of ever-increasing public cloud options.
As enterprises embrace self-service access to cloud infrastructure, IT organizations also need to ensure that
they have visibility and governance across their portfolio of public and private clouds. The first challenge is to
gain visibility across all cloud usage. Enterprises need a comprehensive view of which applications have been
deployed in which clouds. In addition, they want to easily see how each application is architected, which
technology components were used, and what security configurations are in place. To comply with
regulations and internal policies, companies also need access to detailed audit trails that track every change.
The second challenge is putting in place appropriate governance controls. This includes identity and access
controls that define what each user can do as well as budget controls that ensure costs stay within approved
budgets.
Cloud Portfolio Management (CPM) provides a platform to manage cloud-based applications across their
entire lifecycle — from development and test to staging and production – with full visibility and version
control.
CPM also supports modern practices including agile development, continuous deployment, dynamic
configuration, and DevOps. As organizations seek to gain control over VM sprawl, best practices for
application deployment have evolved to dynamic configuration of servers using such tools as Chef, Puppet,
and Salt. These tools enable the creation of consistent, repeatable, and clone-able servers and deployments.
CPM solutions will support a choice of configuration management tools while providing support for the
unique requirements of multiple clouds. CPM solutions should offer out-of-the-box configuration templates
with the ability to customize or create new templates that meet the specific requirements of the
organization. Version control helps companies to manage changes over time and ensure consistency from
development through production.
Cloud environments require new and innovative approaches to ensure that applications meet required SLAs.
A CPM solution helps organizations to architect and automate applications to deliver both scalability and
reliability. Cloud-based applications can be scaled horizontally by adding more instances to an application
tier and scaled vertically by upsizing instances.
Cloud bursting among cloud resource pools can help to provide additional flexibility as application demands
grow. CPM solutions can act as a key foundation by enabling all three Scaling options. In addition, cloud
experts know that it is critical to plan for failure. Outages are inevitable – whether you are using a public
cloud, your data center, or an outsourced provider.
Spreading risk across vendors is a critical requirement for your CPM solution. In addition, to ensure that you
can automate failover and DR strategies in the event of a cloud outage, a SaaS-based CPM solution will
ensure that your management plane is operating even if your private or public cloud is experiencing
problems. As a result, you can increase reliability and deliver SLAs.
6) Managing and Optimizing Costs
Cost management is an essential component of managing the financial options and impacts of a cloud
portfolio strategy. As business units embrace the value that cloud delivers, usage and costs can easily spiral if
not carefully managed and continuously optimized.
The variable cost model of cloud computing introduces significant opportunities for savings, but also requires
new approaches to minimize waste and optimize your spend. Users can often overprovision capacity or
forget to de-provision temporary resources.
A cloud cost analytics solution provides visibility into past, present, and future cloud usage and provides the
critical information needed to manage spend. A cost management solution enables enterprises to do “what
if” analysis on different deployments, clouds, and purchase options (on-demand cost vs. pre-purchased cost
scenarios, for example).
Cloud Portfolio Management is a critical technology foundation that will support enterprise multi-cloud
strategies and help drive innovation, growth, and efficiency. By implementing a CPM solution, IT teams can
deliver self-service access to cloud services while maintaining the necessary governance, control, and cloud
cost optimization. Understanding the role of CPM will help you deliver on your multi-cloud strategy and help
your organization innovate and grow.
IAM doesn’t provide any replica or backup. IAM can be used for many purposes such as, if one want’s to
control access of individual and group access for your AWS resources. With IAM policies, managing
permissions to your workforce and systems to ensure least-privilege permissions becomes easier. The AWS
IAM is a global service.
IAM Definitions
Authentication
Authentication is the process of verifying the identity of a user or system (e.g., Lightweight Directory Access
Protocol [LDAP] verifying the credentials presented by the user, where the identifier is the corporate user ID
that is unique and assigned to an employee).
Authorization
Authorization is the process of determining the privileges the user or system is entitled to once the identity is
established.
User Management:
Related to the administrative capabilities of the system, the user management program is responsible for
creating new user identities and access groups, resetting passwords, defining password policies and
managing privileges.
Credential management
The credential management system establishes identities and access control rules for defined user accounts
which mitigate the threats of insufficient authorization.
User Management: - It consists of activities for the control and management over the identity life
cycles.
Authentication/CredentialManagement: - It consists of activities for effectively controlling and
managing the processes for determining which user is trying to access the services and whether
those services are relevant to him or not.
Authorization Management: - It consists of activities for effectively controlling and managing the
processes for determining which services are allowed to access according to the policies made by
the administrator of the organization.
Access Management: - It is used in response to a request made by the user wanting to access the
resources with the organization.
Data Management and Provisioning: - The authorization of data and identity are carried towards
the IT resource through automated or manual processes.
Monitoring and Auditing:- Based on the defined policies the monitoring, auditing, and reporting
are done by the users regarding their access to resources within the organization.
Operational Activities of IAM:- In this process, we onboard the new users on the organization’s
system and application and provide them with necessary access to the services and data.
Deprovisioning works completely opposite in that we delete or deactivate the identity of the user
and de-relinquish all the privileges of the user.
Credential and Attribute Management:- Credentials are bound to an individual user and are
verified during the authentication process. These processes generally include allotment of
username, static or dynamic password, handling the password expiration, encryption
management, and access policies of the user.
Entitlement Management:- These are also known as authorization policies in which we address
the provisioning and de-provisioning of the privileges provided to the user for accessing the
databases, applications, and systems. We provide only the required privileges to the users
according to their roles. It can also be used for security purposes.
Identity Federation Management:- In this process, we manage the relationships beyond the
internal networks of the organization that is among the different organizations. The federations
are the associate of the organization that came together for exchanging information about the
user’s resources to enable collaboration and transactions.
Centralization of Authentication and Authorization:- It needs to be developed in order to build
custom authentication and authorization features into their application, it also promotes the
loose coupling architecture.
6. Explain third party authentication using the Oauth protocol. What is open Id and
information cards?
Oauth is an open standard protocol for authorization of an application for using user information, in general,
it allows a third-party application access to user related info like name, DOB, email or other required data
from an application like Facebook, Google etc. without giving the third-party app the user password. It is
pronounced asoh-auth.
OAuth is an emerging authentication standard that allows consumers to share their privateresources (e.g.,
photos, videos, contact lists, bank accounts) stored on one CSP with anotherCSP without having to disclose
the authentication information (e.g., username and password).
OAuth is an open protocol and it was created with the goal of enabling authorization via asecure application
programming interface (API)—a simple and standard method for desktop,mobile, and web applications. For
application developers, OAuth is a method for publishingand interacting with protected data. For CSPs,
OAuth provides a way for users to access theirdata hosted by another provider while protecting their
account credentials.
Within an enterprise, OAuth may play a role to enable SSO(Standards and Specifications for Organizations)
with a trusted service provider byemploying a web services SSO model. OAuth facilitates authorization of a
pair of services tointeract without requiring an explicit federation architecture.
Much like OpenID, Oauthstarted in the consumer-centric world to help consumer services access customer
data hostedacross providers. Recently, Google released a hybrid version of an OpenID and OAuth
protocolthat combines the authorization and authentication flow in fewer steps to enhance
usability.Google’s GData API recently announced support for OAuth. (GData also supports SAML forbrowser
SSO.)
7. The web application sends a request to the Google Authorization service to exchange the authorized
request token for an access token.
8. Google verifies the request and returns a valid access token.
9. The web application sends a request to the Google service in question. The request is signed and includes
the access token.
10. If the Google service recognizes the token, it supplies the requested data.
OpenID
OpenID is an open, decentralized standard for user authentication and access control, allowing users to log
on to many services with the same digital identity—i.e., a single sign-on user experience with services
supporting OpenID. As such, it replaces the common logon process that uses a logon username and
password, by allowing a user to log on once and gain access to the resources of multiple software systems.
OpenID is primarily targeted for consumer services offered by Internet companies including Google, eBay,
Yahoo!, Microsoft, AOL, BBC, PayPal, and so on. OpenID adoption for enterprise use (e.g., non-consumer use)
is almost nonexistent due to trust issues; some researchers have revealed that OpenID could accelerate
phishing attacks that can result in compromising user credentials.
Information cards
Information cards are another open standard for identity on the Web. The standard itself is directed by the
Information Card Foundation, whose steering members include representatives from Google, Microsoft,
PayPal, Oracle Novell, and Equifax. The Foundations states that its mission is “to reduce the instance of
identity theft by securing digital identities in place of traditional logons and passwords.” The goal of this
standard is to provide users with a safe, consistent, phishing-resistant user interface that doesn’t require a
username and password.
People can use an information card digital identity across multiple sites for convenience without
compromising their login information (similar to using an OpenID identity across multiple sites). The
information Cards Protocol is designed for use in high-value scenarios, such as banking, where phishing
resistance and support for secure authentication mechanisms such as smart cards are critical business
requirements.
Identity and Access Management (IAM): IAM systems authenticate users' identities and control their access
to cloud resources based on roles, permissions, and policies. This ensures that only authorized users can
access sensitive data and applications.
Encryption: Encryption mechanisms protect data in transit and at rest by encoding it into unreadable
formats that can only be decrypted with the appropriate keys. This safeguards data from interception or
unauthorized access, even if it is compromised.
Network Security: Network security systems, such as firewalls, intrusion detection/prevention systems
(IDS/IPS), and virtual private networks (VPNs), monitor and control traffic flowing in and out of cloud
environments, preventing unauthorized access and detecting suspicious activities.
Vulnerability Management: Vulnerability management tools scan cloud infrastructure and applications for
security weaknesses, such as outdated software, misconfigurations, or known vulnerabilities. They help
identify and remediate potential risks to prevent exploitation by attackers.
Security Monitoring and Logging: Security monitoring tools continuously monitor cloud environments for
suspicious activities, unauthorized access attempts, and security incidents. They generate logs and alerts to
provide visibility into security events and enable rapid response to threats.
Incident Response and Forensics: Incident response plans outline procedures for detecting, containing, and
mitigating security incidents within cloud environments. Forensic analysis tools help investigate security
breaches and identify the root causes to prevent future incidents.
Compliance and Governance: Cloud security systems facilitate compliance with regulatory requirements and
industry standards by enforcing security controls, conducting audits, and maintaining documentation. They
help ensure that cloud environments adhere to security best practices and regulatory obligations.
Cloud Access Security Broker (CASB): CASB solutions provide centralized visibility and control over cloud
applications and services, allowing organizations to enforce security policies, monitor user activities, and
detect unauthorized usage of cloud resources.
Security management in cloud computing involves various roles and responsibilities to ensure the security of
data and systems hosted in the cloud. Here are some key personnel typically involved in security
management within a cloud computing environment:
Chief Information Security Officer (CISO): The CISO is responsible for overseeing the overall security
strategy, policies, and procedures within an organization, including those related to cloud computing. They
ensure that security measures align with business objectives and regulatory requirements.
Cloud Security Architect: This role involves designing and implementing security controls specific to cloud
environments. Cloud security architects assess risks, develop security architectures, and work with cloud
service providers to implement appropriate security measures.
Cloud Security Engineer: Cloud security engineers are responsible for implementing and maintaining security
solutions within cloud environments. They may configure and monitor security tools, conduct security
assessments, and respond to security incidents.
Cloud Compliance Manager: Ensuring compliance with relevant regulations and standards is crucial in cloud
computing. The cloud compliance manager is responsible for understanding and implementing regulatory
requirements, conducting audits, and maintaining compliance documentation.
Cloud Operations Manager: This role involves overseeing the day-to-day operation of cloud environments,
including security-related tasks such as access control, identity management, and incident response. Cloud
operations managers work closely with security teams to ensure that security measures are effectively
implemented and maintained.
Security Analyst: Security analysts monitor cloud environments for security threats and vulnerabilities,
analyze security incidents, and recommend remediation actions. They may also be involved in security
testing and risk assessment
Factors of Authentication:
Knowledge Factor: Something the user knows, such as a password, PIN, or answer to a security question.
Possession Factor: Something the user has, such as a smartphone, hardware token, or smart card.
Inherence Factor: Something inherent to the user, such as a fingerprint, retina scan, voice recognition, or
other biometric data.
Authentication Process:
When a user attempts to log in, they are prompted to provide their username and password as the first
factor of authentication.
After successfully entering their credentials, they are then prompted to provide additional authentication
factors. This could involve receiving a one-time code via SMS or email, using a mobile app to generate a
time-based code, scanning a QR code, or providing a fingerprint or other biometric data.
Once the user successfully presents the required authentication factors, access is granted.
Types of MFA:
Two-factor authentication (2FA): Requires users to provide two factors of authentication (typically a
password and one additional factor).
Three-factor authentication (3FA): Requires users to provide three factors of authentication for increased
security.
Benefits of MFA:
Enhanced Security: MFA significantly reduces the risk of unauthorized access, as even if an attacker obtains a
user's password, they would still need the additional authentication factor to gain access.
Protection Against Credential Theft: MFA mitigates the risk of credential theft and phishing attacks, as stolen
passwords alone are insufficient for accessing accounts.
Compliance Requirements: MFA is often required by industry regulations and standards to protect sensitive
data and systems.
Considerations:
User Experience: While MFA enhances security, it can also introduce complexity and inconvenience for
users. Organizations should strive to implement MFA solutions that balance security with usability.
Integration: MFA should be seamlessly integrated into existing authentication systems and workflows to
ensure smooth user experience and minimal disruption to operations.
Adoption: Encouraging user adoption of MFA through education, training, and clear communication about
the benefits of enhanced security.
Overall, multi-factor authentication is a powerful security measure that helps organizations protect against
unauthorized access and strengthen their overall security posture in an increasingly digital and
interconnected world.