CC - Unit 5 (Security in Cloud Computing)
CC - Unit 5 (Security in Cloud Computing)
Prepared By
Prof. Anand N. Gharu
(Assistant Professor)
Computer Engineering Departement
Telegram Channel
https://t.me/SPPU_TE_BE_COMP
(for all engineering Resources)
WhatsApp Channel
(for all Engg & tech updates)
https://whatsapp.com/channel/
0029ValjFriICVfpcV9HFc3b
Insta Page
(for all Engg & tech updates)
https://www.instagram.com/
sppu_engineering_update
SYLLABUS
· Risks in Cloud Computing: Risk Management, Enterprise-Wide Risk
Security.
6
Risk Management
2. Cybersecurity :
As the complexity and frequency of cyber threats rise, organizations should
create a comprehensive cybersecurity program.
8
Risk Management
4. Backup and recovery :
Almost every company does frequent backups. However, very few
businesses actually undertake frequent restoration to ensure the
functionality and sufficiency of backups, resulting in unpleasant
shocks at the last minute.
1
. 0
Risk Management
6. Platform support :
Many companies are unable to roll out patches on time, or even discover the
appropriate patches, for a variety of reasons such as a lack of a suitable
knowledge base, time, or testing infrastructure.
Most cloud providers do not have these weaknesses, guaranteeing that the
platforms and apps you use on such cloud settings are properly up to date.
The same cannot be true for cloud providers owing to a lack of visibility and
openness. 1
1
Risk Management
6. Platform support :
Many companies are unable to roll out patches on time, or even discover the
appropriate patches, for a variety of reasons such as a lack of a suitable
knowledge base, time, or testing infrastructure.
Most cloud providers do not have these weaknesses, guaranteeing that the
platforms and apps you use on such cloud settings are properly up to date.
The same cannot be true for cloud providers owing to a lack of visibility and
openness. 1
2
Risk Management
7. Vendor Management :
The inclusion of third-party suppliers in cloud business models has raised security
issues. Many cloud providers are undergoing official third-party security assessments,
such as the International Organization for Standardization (ISO), Service Organization
Control (SOC) 2, and the Federal Risk Authorization and Management Program
(FedRAMP).
You will need to understand how to include procurement and sourcing solutions into this
approach. You may also establish and enforce policies on use responsibility and risk
acceptance processes in the cloud.
You will need to understand how to include procurement and sourcing solutions into this
approach. You may also establish and enforce policies on use responsibility and risk
acceptance processes in the cloud.
The benefits of cloud migration are numerous. The cloud architecture allows
for the acceptance of any workload, and the simplicity with which new
services may be added allows for rapid response to changing business
demands.
1
5
Risk Management
8. Cloud Migration :
The process of transferring apps, data or even the whole corporate IT
infrastructure to distant server facilities and a virtual environment is known as
cloud migration.
The benefits of cloud migration are numerous. The cloud architecture allows
for the acceptance of any workload, and the simplicity with which new
services may be added allows for rapid response to changing business
demands.
1
6
Best Practices for Cloud Computing Risk Management
1. Carefully select your cloud service provider (CSP). Conduct supplier
risk evaluations for contract clarity, ethics, legal liability, viability, security,
compliance, availability, and business resilience, among other things.
Determine whether or not the CSP itself has service providers it can rely on to
deliver its solutions and adjust the scope accordingly.
Governance, risk management, and compliance (GRC) software can help you
track and automate many of your risk management tasks to ensure
compliance with various frameworks.
1
9
Enterprise Wide-Risk Management
As defined in COSO’s 2004 Enterprise Risk Management – Integrated
Framework: “Risk is the possibility that an event will occur and
adversely affect the achievement of objectives.”
The types of risks (e.g., security, integrity, availability, and performance)
are the same with systems in the cloud as they are with non-cloud
technology solutions.
An organization’s level of risk and risk profile will in most cases change
if cloud solutions are adopted (depending on how and for what purpose
the cloud solutions are used). This is due to the increase or decrease in
likelihood and impact with respect to the risk events (inherent and
residual) associated with the CSP that has been engaged for services.
2
0
Types of Enterprise Risks in Cloud Computing
Cloud Computing provides recommended risk responses for
the following major risks relating to Cloud Computing :
2
2
Types of Enterprise Risks in Cloud Computing
2. Cloud Vendor Security Risks :
Using cloud providers exposes you to additional third-party risks. Doing business with
any vendor that experiences business challenges such as bankruptcy, lawsuits, regulatory
investigations, or other threats could inadvertently harm your organization’s reputation
and goodwill.
Many small businesses know little about the technology behind the cloud services they
use. As a result, your reputation no longer depends only on the integrity of your
company: it now also relies on the integrity of the cloud provider’s company. And that’s a
risk of cloud computing.
Due to the ease of access to IaaS (infrastructure as a service), there has been a
proliferation of innovative SaaS (software as a service) startups providing cloud services.
Some offer unique features that traditional providers have left unmet.
Some of these providers, however, may lack the expertise required to meet stringent
control requirements. Their products may also be unsustainable for large organizations
that need to exchange increasing amounts of data. 2
3
Types of Enterprise Risks in Cloud Computing
3. Compliance Risks :
Legal or compliance risks arise from non-compliance with various
industry regulations or regulatory requirements, such as the Health
Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley
Act (SOX), Gramm-Leach-Bliley Act (GLBA), or the European Union’s
General Data Protection Regulation (GDPR).
2
5
Types of Enterprise Risks in Cloud Computing
5. Availability Risks :
If your Internet access is lost, you will be unable to access your provider’s cloud
service. You’ll have to wait until the Internet is back up and running if you need
to use the cloud service to process customer payments or access sensitive data.
You don’t have this problem when operating on a local server.
Another risk associated with the cloud is that the service provider may fail. The
service can become unresponsive due to various factors, including adverse
weather, distributed denial of service (DDoS) assaults, or some other system
breakdown.
7. Reliability and performance issues – System failure is a risk event that can
occur in any computing environment but poses unique challenges with cloud
computing. Although service-level agreements can be structured to meet
particular requirements, CSP solutions might sometimes be unable to meet these
performance metrics if a cloud tenant or incident puts an unexpected resource
demand on the cloud infrastructure.
2
7
Types of Enterprise Risks in Cloud Computing
8. Vendor lock-in and lack of application portability or
interoperability – Many CSPs offer application software
development tools with their cloud solutions. When these tools are
proprietary, they may create applications that work only within the
CSP’s specific solution architecture. Consequently, these new
applications (created by these proprietary tools) might not work
well with systems residing outside of the cloud solution. In
addition, the more applications developed with these proprietary
tools and the more organizational data stored in a specific CSP’s
cloud solution, the more difficult it becomes to change providers.
2
8
Types of Enterprise Risks in Cloud Computing
9. High-value cyber-attack targets – The consolidation of multiple organizations
operating on a CSP’s infrastructure presents a more attractive target than a single
organization, thus increasing the likelihood of attacks. Consequently, the inherent risk
levels of a CSP solution in most cases are higher with respect to confidentiality and data
integrity.
10. Risk of data leakage – A multi-tenant cloud environment in which user
organizations and applications share resources presents a risk of data leakage that does
not exist when dedicated servers and resources are used exclusively by one organization.
This risk of data leakage presents an additional point of consideration with respect to
meeting data privacy and confidentiality requirements.
3
2
Types of Risk in Cloud Computing
Segmentation: By the true nature of the subscription policy of cloud
computing, there would be many subscribers, thus making the data of one
organization prone to another organization.
Analogous Situation: The Gotham government’s data is not properly secured,
which can lead to a situation where people can know about someone else’s
health issues (not good to be displayed in public).
2. Availability
Service Disruption: This can be attributed to any fault in the internet
connection as all cloud computing transactions are done over the internet. This
can be either service quality degraded or outage as a whole.
Analogous Situation: The citizens depend on electricity for all their regular
needs. And if there is no electricity in Gotham, the whole idea of growing the
city is foiled.
3
4
Types of Risk in Cloud Computing
3. Changes :
Change in Service: Due to the volatile market, there may be acquisition or
closure of a service provider, thus leading to unavailability of the service within
short notice.
Analogous Situation: The government may come and go, and when they go,
the data might not be available temporarily or permanently depending on the
next government’s plan.
4
0
Security issues in Cloud Computing
3. Interference of Hackers and Insecure API’s –
As we know if we are talking about the cloud and its services it means we are talking
about the Internet. Also, we know that the easiest way to communicate with Cloud is
using API. So it is important to protect the Interface’s and API’s which are used by an
external user. But also in cloud computing, few services are available in the public
domain. An is the vulnerable part of Cloud Computing because it may be possible that
these services are accessed by some third parties. So it may be possible that with the help
of these services hackers can easily hack or harm our data.
4. Lack of Skill –
While working, shifting o another service provider, need an extra feature, how to use a
feature, etc. are the main problems caused in IT Company who doesn’t have skilled
Employee. So it requires a skilled person to work with cloud Computing.
4
1
Security issues in Cloud Computing
5. Changing Service Provider –
Vendor lock In is also an important Security issue in Cloud Computing. Many
organizations will face different problems while shifting from one vendor to another. For
example, An Organization wants to shift from AWS Cloud to Google Cloud Services
then they ace various problem’s like shifting of all data, also both cloud services have
different techniques and functions, so they also face problems regarding that. Also, it
may be possible that the charges of AWS are different from Google Cloud, etc
4
5
Advantages of Cloud Security
1. Efficient recovery –
Cloud computing conveys quicker and more exact recoveries of applications and
information. With less downtime, it is foremost productive recuperation arrange.
2. Openness –
Get to your data wherever, at whatever point. A Web cloud framework increases benefit
and commerce capability by ensuring that your application is constantly accessible. This
takes under consideration basic participation and sharing between clients in different
regions.
3. No material required –
Since everything will be encouraged within cloud, a physical stockpiling community is
never once more critical. In any case, it might justify considering a support in case of a
calamity that seem moderate down your business’ effectiveness. 4
6
Advantages of Cloud Security
4. Preferred position –
Straightforward execution – Cloud encouraging grants an organization to keep up
comparative applications and trade shapes without managing with specialized parts of
back-end. Easily managed over Web, a cloud establishment is viably and quickly
accessible to organizations.
4
7
Disadvantages of Cloud Security
1. Bandwidth issues –
For perfect execution, clients need to arrange in like manner and not pack expansive
sums of servers and capacity gadgets into a little set of information centers.
2. Without excess –
A cloud server is not one or other overabundance nor reinforced. Since development can
bomb to a awesome degree, go without from getting seared by buying an overabundance
course of action. Whereas this can be an additional cost, much of time it is defended, in
spite of all inconvenience.
5. No Redundancy –
A cloud server isn’t excess nor is it supported up. As innovation may fall flat here and
there, maintain a strategic distance from getting burned by obtaining a excess arrange. In
spite of fact that it is an additional taken a toll, in most cases it’ll be well worth it.
4
9
Cloud Digital Pesonas and Data Security
Here are four areas where personas are important in optimizing your digital
strategy.
5
0
Cloud Digital Pesonas and Data Security
2. Enabling design and testing
It’s not just your messaging that can benefit. User experience and design can be
improved with persona research and effective testing.
A brand that has a clear picture of their target personas can ensure sites, experiences,
landing pages, and direct communications are designed in a way that helps move the
customer through their journey. If you know your personas are often on-the-go, for
example, you’ll want to take a mobile-first approach to design.
When it comes to testing the accuracy of your personas, you could A/B test a
range of interaction designs across certain persona groups. Consider the
mobile-using persona example above. You could test various responsive
website designs and see whether or not how consumers interact in real-life
really reflects your understanding. If this testing reveals something
5
unexpected, you can then adapt the experience. 1
Cloud Digital Pesonas and Data Security
4. Supporting campaign creation
You’re starting a new campaign. You know the audience you want to target. How can
you make sure your content resonates? And where should you place ads to get the most
“bang for your buck”? Having detailed personas will help you answer these questions.
Content that engages will speak to your customers’ needs or pain points. It will answer
the different questions your target audience has as they move through their buying
journey. Look to your personas to discover and focus on those needs. For example, you
may have one persona that outlines an IT buyer. They are aware of your products,
understand the industry, and are looking to lead the way when it comes to innovative
technology.
Alternatively, you may have another graphic designer persona that is currently at the
discovery stage of the customer journey. The content you create for the IT buyer won’t
5
be relevant for this second persona 2
Cloud Digital Pesonas and Data Security
3. Supporting segmentation and targeting
You’ve created your messaging and tailored your designs. You’ll also want to
use personas to map your segmentation and targeting.
While we know that every customer has a unique journey and they’ll have
landed on your site from various routes and for different reasons, having clear
personas helps you first identify and then refine different segments. Showing
content to your target audience based on specific behaviors and intentions that
you’ve mapped out helps you deliver appropriate messages to the right
people.
5
3
Content Level Security
Message content is a significant attack vector used by malicious API
consumers. API Services provides a set of Policy types to mitigate
the potential for your backend services to be compromised by
attackers or by malformed request payloads.
5
4
Cloud
Security
Services
5
5
Cloud Security Services
1. Identity and access
You are provided with control for secured management of identities
and access. It includes people, processes and systems used for
managing access to your enterprise resources. It is managed by
making sure that the identity of the user is verified and the access
rights are provided at the correct level.
4. E-mail security
It provides control over the in-bound and out-bound e-mails to protect your
organization from malicious attachments and phishing. This cloud service
helps enforce corporate policies such as acceptable use, spam and in
providing business continuity options. One of the solution adopted by many
cloud e-mail security services is digital signatures, which allows identification
5
and non-repudiation. 7
Cloud Security Services
5. Security assessment
There are various tools implemented for the users of the SaaS delivery model,
such as variant elasticity, low administration overhead, negligible setup time
and pay-per use with low investment in the initial stage.
6. Intrusion management
It is the process that uses pattern recognition for detection and reaction to
events that are statistically unusual and unexpected.
It may also require reconfiguration of your system components in real time so
as to prevent an intrusion.
5
8
Cloud Security Services
8. Encryption
There are typical algorithms that are computationally difficult or nearly
impossible to break.
9. Disaster management
This cloud service helps in continuing your business and managing disasters
by providing flexibility and reliable failover for services that are required in
case of service interruptions.
6
0
Secure Cloud Software Requirements
1. The method of access to the cloud :
First, usually cloud environments are accessed by the CSUs through
a web application in which often is deemed the weakest point of CC.
This is because the current browser based authentication protocols
for the cloud are not secure, due to browsers’ inability to issue XML
based security tokens by itself. In technical solutions to overcome
those obstacles are proposed, e.g. by encrypting data, while it is
stored under the custody of a cloud service provider or while it is
transmitted to a CSU
6
1
Secure Cloud Software Requirements
Second, regarding the architecture of the cloud, one of biggest
challenges is that of virtual machine (VM) instance interconnectivity.
A key concern in virtualization is isolation, which guarantees that
one VM cannot affect another VM running in the same host. When
multiple VMs are present on the same hardware (which is common
for clouds), one VM could be illegally accessed through another VM.
A solution to prevent this is the Virtual Network Framework which
consists of three layers (routing layer, firewall and shared network)
and aims to control the intercommunication among VMs deployed in
physical machines with higher security
6
2
Secure Cloud Software Requirements
Third, requirements should be aligned to the specific context of the
multi-tenant environments in order to avoid the possible problems
caused by role name conflicts, cross-level management and the
composition of tenants' access control. Solutions that address these
requirements are the SaaS Role Based Access Control (S-RBAC)
model, the reference architecture defined in, and the reference
architecture encompassing the concept of “interoperable security”.
These solutions help one to differentiate between a 'home cloud' and
a 'foreign cloud'. The 'home cloud' is a CSP which is unable to meet
demand with its current resources and, therefore, forwards federation
requests to ‘foreign clouds’ with the purpose to exploit their
virtualization infrastructures.
6
3
Cloud Based Software Testing
Cloud Testing is one type of software testing in which the software
faster availability, scalability, and flexibility that saves time and cost
6
4
Cloud Based Software Testing
Cloud-based software testing is a set of procedures, tools, and
processes that are leveraged by testers inefficiently and precisely
testing software. With the utilization of Cloud service models,
enterprises can implement testing as a service, without the need to
completely invest in testing labs, tools, or infrastructure. Cloud
services deal with not just testing but also everything from cloud
security, software development, resource utilization, etc.
6
6
Benefits of Cloud-Based Software Testing
1. It significantly reduces the expenses and the process cycles by
sharing the resources when the testing strategy is performed. This is
because cloud-based Testing as a Service (TaaS) enables IT and
software developers to initialize practical experimental tests on cloud
platforms without the necessity to possess licenses or purchasing the
resource. This reduces the expenses of testing and improves sharing
of resources and the use of services.
Note : The majority of the IT companies and software developers are now
migrating their legacy systems to a cloud ecosystem for better test automation
services. With cloud-based testing, their applications are scalable, flexible, and
easily adaptable. Here are some reasons why enterprises are adopting cloud-based
software testing over traditional or manual application testing.
6
8
REFERENCES
1. https://www.educba.com/risks-of-cloud-computing/
2. analyticssteps.com/blogs/8-pillars-risk-management-cloud-computing
3. https://www.researchgate.net/publication/307899076_Risk_Management_Framework_for_Cloud_C
omputing_A_Critical_Review
4. https://reciprocity.com/blog/enterprise-risk-management-for-cloud-computing/
5. https://www.consultia.co/wp-content/cache/page_enhanced/www.consultia.co/enterprise-risk-
management-for-cloud-computing/_index.html_gzip
6. https://www.sitecore.com/knowledge-center/blog/2020/11/the-importance-of-personas-for-digital-
experience
7. https://www.rishabhsoft.com/blog/10-categories-of-security-services-offered-over-the-cloud
8. https://www.researchgate.net/publication/261038126_Cloud_computing_security_requirements_A_s
ystematic_review
9. https://blog.thundra.io/what-is-cloud-based-software-testing-and-how-can-it-enhance-testing-
services
THANK YOU!!!
My Blog : https://anandgharu.wordpress.com/
Email : [email protected]