CSM Module 2
CSM Module 2
Module-2
By
3
Cloud Security Cont...
Security Considerations
1) On-Premise Security
Physical control and specially designed security
methods, such as badge readers and cameras.
Equipment management to destroy items having sensitive
data.
No traffic in the means less incidence of threats outside the
business
2) Cloud Security
Adherence to strict security protocols
More affordable for many businesses
Built-in features for various regulations
4
Cloud Security Cont...
Cost Comparison
1) On-Premise
High initial costs for hardware and software licenses
Ongoing expenses for maintenance, upgrades, and IT staff
2) Cloud
Lower upfront costs
Predictable monthly or annual fees
Reduced IT staff requirements
5
Cloud Security Cont...
Scalability and Flexibility
1) On-Premise
Limited by purchased hardware capacity
Scaling up requires additional investment and time
2) Cloud
Easily scalable resources on-demand
Quick adaptation to changing business needs
In terms of work-from-home arrangements during the COVID-
19 pandemic, many businesses have scaled up dramatically in
their use of cloud resources. For instance, Zoom, a cloud video
conferencing company, increased its daily meeting
participants from 10 million back in December 2019 to 300
million in April 2020.
Hybrid Solutions Offer Best of Both
Most of the organizations adopt a hybrid approach when on-
premise and cloud solutions are being put together. The
rationale behind their decision to go hybrid is to:
A) Keep sensitive data at on-premise resources while benefiting
from the cloud for other jobs that aren’t that important.
6
Cloud Security Cont...
B) Scale resources whenever needed without obliterating
existing infrastructure.
C) Gradually transit to the cloud and experience minimal
disruption.
As per Flexera’s 2024 report, 89% companies had a hybrid
cloud strategy compared to 84% in previous years.
7
Cloud Security Cont...
Virtualization Security Primer
The term “Virtualized Security,” sometimes known as
“security virtualization,” describes security solutions that
are software-based and created to operate in a virtualized IT
environment.
This is distinct from conventional hardware-based network
security, which is static and is supported by equipment like
conventional switches, routers, and firewalls.
Virtualized security is flexible and adaptive, in contrast to
hardware-based security. It can be deployed anywhere on the
network and is frequently cloud-based so it is not bound to a
specific device.
Types of Hypervisors
1) Type-1 Hypervisors: Its functions are on unmanaged
systems. Type 1 hypervisors include Lynx Secure, RTS
Hypervisor, Oracle VM, Sun xVM Server, and Virtual
Logic VLX. Since they are placed on bare systems, type 1
hypervisor do not have any host operating systems.
2) Type-2 Hypervisor: It is a software interface that simulates
the hardware that a system typically communicates with.
Examples of Type 2 hypervisors include containers, KVM,8
Cloud Security Cont...
3) Type I Virtualization: In this design, the Virtual Machine
Monitor (VMM) sits directly above the hardware and
eavesdrops on all interactions between the VMs and the
hardware. On top of the VMM is a management VM that
handles other guest VM management and handles the
majority of a hardware connections. The Xen system is a
common illustration of this kind of virtualization design.
4) Type II virtualization: In these architectures, like VMware
Player, allow for the operation of the VMM as an application
within the host operating system (OS). I/O drivers and guest
VM management are the responsibilities of the host OS.
Benefits of Virtualized Security
1) Cost-Effectiveness: Cloud computing’s virtual machine
security enables businesses to keep their networks secure
without having to significantly raise their expenditures on
pricey proprietary hardware. Usage-based pricing for cloud-
based virtualized security services can result in significant
savings for businesses that manage their resources effectively.
2) Flexibility: It is essential in a virtualized environment that
security operations can follow workloads wherever they go. A
company is able to profit fully from virtualization while9
Cloud Security Cont...
3) Operational Efficiency: Virtualized security can be
deployed more quickly and easily than hardware-based
security because it doesn’t require IT, teams, to set up and
configure several hardware appliances. Instead, they may
quickly scale security systems by setting them up using
centralized software. Security-related duties can be
automated when security technology is used, which frees up
more time for IT employees.
4) Regulatory Compliance: Virtual machine security in cloud
computing is a requirement for enterprises that need to
maintain regulatory compliance because traditional
hardware-based security is static and unable to keep up with
the demands of a virtualized network.
Virtualization Machine Security Challenges
As we previously covered, buffer overflows are a common
component of classical network attacks. Trojan horses,
worms, spyware, rootkits, and DoS attacks are
examples of malware.
In a cloud context, more recent assaults might be caused via
VM rootkits, hypervisor malware, or guest hopping and
hijacking. Man-in-the-middle attacks against VM migrations10
Cloud Security Cont...
HIDS or NIDS are both types of IDSs. To supervise and check
the execution of code, use programmed shepherding. The RIO
dynamic optimization infrastructure, the v Safe and v
Shield tools from VMware, security compliance for hypervisors,
and Intel vPro technology are some further protective
solutions.
Working of Virtualized Security
Virtualized security is like a digital guard for the virtual world,
such as cloud services and virtual machines. It blends into the
virtual setup, acting like an invisible shield that keeps each
part safe. Instead of watching over just one computer or
server, it oversees the whole virtual landscape, spotting and
stopping dangers.
This security type is smart and can handle lots of virtual
spaces at once. It watches the data moving around in these
spaces to catch any harmful activity, like viruses or hackers.
When it finds something bad, it acts quickly to block it,
keeping every part of the virtual environment safe.
Virtualized security is also flexible, growing or shrinking to
match the size of the virtual area it needs to protect. It's
always on duty, ensuring that even as the virtual world11
Cloud Security Cont...
Types of Security Virtualization
The types of virtualization include:
Server virtualization: This splits one physical server into
several virtual servers. Each one acts like a separate
computer, running its own operating system and applications.
This setup increases efficiency, saves space, and reduces
costs.
Desktop virtualization: It separates the desktop environment
from the physical device. You can access your desktop, with all
its apps and files, from any device, like a PC, laptop, or tablet.
This offers flexibility and secure remote access.
Storage virtualization: This combines multiple physical storage
units into one virtual storage device. It’s like putting different
hard drives together to make a single, big storage space. This
makes managing storage easier and can improve performance
and data backup.
Network virtualization: This type creates a virtual version of a
physical network. It allows you to split one physical network
into many separate, independent networks. This can enhance
security, speed up data transfer, and help manage network
resources better. 12
Cloud Security Cont...
Benefits of Virtualized Security Scalability
Flexibility
Cost-Effectiveness
Efficiency
Enhanced Protection
Disadvantages Virtualized Security (Risks)
Shared Resources: In a virtualized environment, resources
like CPU, memory, and storage are shared among multiple
virtual machines. If one VM is compromised, it can potentially
impact the security of others sharing the same physical host.
Complexity: The complexity of virtualized systems can
increase the risk of configuration errors, making the
environment more vulnerable to attacks. Properly securing a
virtualized environment requires a thorough understanding of
both virtualization technology and security principles.
Hypervisor Vulnerabilities: The hypervisor, which creates
and runs virtual machines, is a critical component in
virtualization. If the hypervisor has vulnerabilities, it can be
exploited to gain control over the entire virtualized
environment. 13
Cloud Security Cont...
Visibility and Control: Traditional security tools may not
have full visibility into the virtualized components, leading to
gaps in monitoring and control that attackers can exploit.
Insider Threats: With virtualization, administrative access is
more powerful. Insiders with malicious intent or negligent
actions can cause significant damage or breaches.
Dynamic and Elastic Nature: The ability to quickly spin up
and down virtual machines can be exploited by attackers to
create transient attack vectors that are hard to trace and
mitigate.
14
Cloud Security Cont...
15
Cloud Security Cont...
Cloud Network Security
Cloud network security describes the technology, policies,
controls, and processes used to protect public, private, and
hybrid cloud networks from unauthorized access, exposure,
modification, or misuse.
Network security is a foundational component of a multi-layer
cybersecurity strategy used to prevent breaches, malware,
and other cyber-attacks on cloud users and resources. Keep
reading to learn how cloud network security works and best
practices to secure storage, VMs, APIs and workstreams.
16
Cloud Security Cont...
How does cloud network security work?
Cloud network security combines multiple layers of defense
between edge devices and network infrastructure to protect
data and the people who use it.
It works within software-defined networks (SDN) to inspect
packets and route traffic enforcing an organization’s pre-
defined rules and security policies.
Each security layer, or key capability, uses packet analysis to
apply policies and controls to protect cloud deployments and
their digital assets.
Cloud firewalls and gateways work similar to data center ones
by inspecting network packets in near real-time without
impacting application performance.
Authorized users are allowed secure access to assigned
network resources, but malicious actors are blocked,
preventing attacks and data loss.
Cloud network security provides operational simplicity through
API and other software integration techniques across multiple
vendor platforms and virtualization solutions.
They easily deploy scalable firewalls and virtual gateways to
17
achieve enterprise-wide control required to perform network
Cloud Security Cont...
Cloud gateways and firewalls are similar in function and
capability to on-premises devices of the same name, often
running the exact same software but in cloud vendor
infrastructure VMs (virtual machines).
Premium security services are engineered to auto-scale with
gateway load balancers, virtual WAN (wide area networks),
and other cloud infrastructures to ensure cost-efficient
delivery of resources.
What are the common threats to cloud networks?
Cloud computing consists of a Front Door that faces the
internet; where customers, partners prospects, and third-party
SaaS applications interact with cloud assets.
This entry point is a high-traffic area, exposing the cloud
instance to a wide range of AI-based external threats from
across the world. Common Front
Door attack vectors include exploiting software weaknesses,
such as the OWASP Top 10, known and unknown OSS security
vulnerabilities, DDoS attacks, insecure APIs, and unauthorized
access from misconfigured security settings.
Your cloud security strategy should also include advanced
threat prevention and integration with WAF (Web Application18
Cloud Security Cont...
This adds a crucial layer, protecting APIs and stopping attacks
like cross-site scripting (XSS), SQL injection, and other
application-layer threats before they reach cloud assets.
The WAF inspects incoming requests and blocks any malicious
attempts to exploit vulnerabilities in the application code
base.
Cloud network security key capabilities
Network security is a critical layer of defense for cloud
deployments, especially for smaller businesses where it may
be the only layer.
Since cloud providers deploy a shared responsibility model,
customers of all sizes must protect their own data and
understand the security risk.
So, cloud network security should protect against all known
and unknown threats requiring a wide range of capabilities,
including:
1) AI-powered threat prevention: To stay ahead of AI-enabled
attackers, you need advanced machine learning-based zero-
day, anti-phishing, and DNS security capabilities. As
cybercriminals leverage AI so must security vendors build and
train their own proprietary AI inference engines. 19
Cloud Security Cont...
3) SSL/TLS Traffic Inspection: Network traffic is often
encrypted, making it challenging to detect and block malicious
connections. Network security services need to provide
fast SSL/TLS traffic inspection with minimal latency.
4) Network Segmentation: Enables network macro-
segmentation and micro-segmentation in cloud environments.
This “fences off” network subnets from one another reducing
the potential threat blast radius if something does happen and
stopping lateral movement by an attacker if a breach occurs.
5) Automation: Cloud application infrastructure, often
container-based, can be ephemeral and highly dynamic
supporting fluctuating demand. A cloud network security
service must be responsive to support cloud native network
scaling and application load balancing.
6) Access Control: Governs access to the network, ensuring
that only authorized devices gain entry. Cloud network
security policies are enforced by cloud firewall and gateway
rules. Access control capabilities allow an organization to gain
visibility to cloud network traffic sources and destinations and
also limit network access to guests, contractors, and block
completely unauthorized or risky devices.
20
Cloud Security Cont...
8) Third-Party Integrations: Cloud network security operates
within a cloud provider environment alongside their existing
tools and solutions. Integration with third-party solutions helps
to optimize configuration management, network
monitoring, and lowers costs through security automation.
9) Cloud VPNs: Cloud VPNs (virtual private networks) allow
organizations to securely scale access to their cloud-based
resources from a home or public Wi-Fi network, enabling
employees, partners, and customers to safely use critical
cloud resources regardless of location.
10) Content Sanitization: Rather than completely blocking
potentially malicious content, high quality cloud network
security services should be able to remove malicious,
executable content and provide users with access to sanitized
content.
11) Firewalls: Monitors, filters, and controls incoming and
outgoing network traffic based on predefined security rules.
Acting as a barrier between trusted internal and untrusted
external networks, it works by inspecting data packets and
choosing to block or allow them.
12) Gateways and Next-Generation Firewalls
(NGFW): Incorporate deep packet inspection to enable21
Cloud Security Cont...
13) Intrusion Prevention Systems (IPS): Detect and block
known and unknown threats before they can impact the
network core or edge devices. In addition to north/south
(internet to network) and east/west (within or between
networks) deep packet inspection, including inspection of
encrypted traffic, they can also provide virtual patching, which
mitigates vulnerabilities at the network level.
14) DNS and URL filtering: As part of a data loss
prevention strategy, Domain Name System (DNS) filtering
stops domain-based attacks, such as DNS hijacking, and
tunneling. URL filtering prevents users and applications from
accessing suspicious URLs linked to malicious sites or
cybercriminal activity.
15) Antivirus and Sandboxing: Antivirus and sandboxing tools
are key to determining whether a file is malicious. While
antivirus blocks known malware threats, sandboxing provides
a safe environment to analyze suspicious files. When a user
downloads an email attachment the antivirus scans it for
known attack signatures and behaviors. If a threat is found the
software quarantines or deletes the file. For an unknown file,
sandboxing isolates it into a protected space where it can be
tested to see if it’s malicious and block it if necessary. 22
Cloud Security Cont...
Benefits of cloud network security
Consistent policy enforcement: Easily enforce consistent
corporate and security policies across on premises, hybrid and
multi-cloud environments. A cloud security solution integrated
with existing on-premises solutions enables more consistent
security controls and threat monitoring.
Centralized security orchestration and
automation: Allows security teams to quickly identify and
respond to potential threats to on premises and cloud-based
infrastructure, critically important when security is a shared
responsibility with vendors.
Clear security visibility: On premises and cloud security
monitoring and management is delivered from a unified
management interface. This simplifies threat prevention,
security monitoring, reporting, forensics, and remediation for
cloud environments while reducing risk and SecOps costs.
Reduced risk from attacks and ransomware: Strong,
robust security measures and deep packet inspection coupled
with AI-powered threat analysis can ensure your data stays
protected, and you won’t be paying ransom to get it back.
Enhanced compliance and data privacy: Proactively23
Cloud Security Cont...
Improved business continuity: Protected networks are
more resilient against potential disruptions and experience
minimal downtime, leading to optimal revenue generation and
customer satisfaction levels.
Better network and application performance: Network
security prevents bad actors from disabling the network
ensuring resources are running optimally and safe from
cyberattacks.
Challenges of cloud network security
Accuracy – Reduction of False Positives
Human Error
Increasing outsider and Insider threats
Affordability
What is private cloud vs. public cloud network security?
Because the resources within a private cloud are typically
visible to and under the control of an organization and its IT
teams, private clouds inherently offer a greater degree of
network security.
Public cloud providers offer their customers more limited
visibility into their cloud environments, and the multi-tenanted24
Cloud Security Cont...
27
Cloud Security Cont...
Instance Group: An instance group is a collection of virtual
machine instances managed as a single entity. It has the same
machine type, image, and the same configuration.
28
Cloud Security Cont...
3. Trusted images
In a cloud environment, users work with either pre-installed
images or images they upload themselves. In both cases,
users should be able to ensure the image they are utilizing has
not been tampered with. The ability to verify images is a
fundamental imperative for security.
A chain of trust is needed from the source of the image to the
destination where it’s used. This can be accomplished by
signing images obtained from trusted sources and by verifying
the signature prior to use. Various ways to obtain and create
32
Cloud Security Cont...
4. Image creation process
5. Image signature verification
6. Firewalls and other host-based security controls
An Image in Cloud
An Amazon Machine Image (AMI) is an image that provides the
software that is required to set up and boot an Amazon EC2
instance. Each AMI also contains a block device mapping that
specifies the block devices to attach to the instances that you
launch. You must specify an AMI when you launch an instance.
The AMI must be compatible with the instance type that you
chose for your instance. You can use an AMI provided by AWS,
a public AMI, an AMI that someone else shared with you, or an
AMI that you purchased from the AWS Marketplace.
An AMI is specific to the following:
Region
Operating system
Processor architecture
Root device type
Virtualization type
33
Cloud Security Cont...
We can launch multiple instances from a single AMI when you
require multiple instances with the same configuration. You
can use different AMIs to launch instances when you require
instances with different configurations, as shown in the
following diagram.
34
Cloud Security Cont...
We can create an AMI from your Amazon EC2 instances and
then use it to launch instances with the same configuration.
You can copy an AMI to another AWS Region, and then use it to
launch instances in that Region. You can also share an AMI
that you created with other accounts so that they can launch
instances with the same configuration. You can sell your AMI
using the AWS Marketplace.
35
Cloud Security Cont...
40
Cloud Security Cont...
Data Security for the Cloud
"Data security for the cloud" refers to the practices and
technologies used to protect sensitive data stored and
processed in cloud computing environments, ensuring its
confidentiality, integrity, and availability by implementing
measures like encryption, access controls, data classification,
and monitoring to prevent unauthorized access, data
breaches, and data loss, while maintaining compliance with
relevant regulations.
Key aspects of cloud data security:
Encryption:
Encrypting data both at rest (stored on cloud servers) and in
transit (during data transfer) using strong algorithms like AES-
256 to scramble data and make it unreadable without the
decryption key.
Identity and Access Management (IAM):
Implementing robust user authentication and authorization
controls to limit access to sensitive data only to authorized
users based on their roles and permissions.
Data Classification:
41
Cloud Security Cont...
Access Controls:
Implementing granular access controls to restrict who can
access, modify, or delete data depending on their role and
need-to-know basis.
Data Loss Prevention (DLP):
Utilizing tools to detect and prevent sensitive data leaks by
monitoring data usage and implementing policies to restrict
unauthorized data transfers.
Monitoring and Logging:
Continuously monitoring cloud environments for suspicious
activities, unusual access patterns, and potential security
threats to detect and respond to incidents promptly.
Data Backup and Recovery:
Regularly backing up cloud data to ensure the ability to
restore critical information in case of a system failure or
cyberattack.
Compliance with Regulations:
Adhering to relevant data privacy regulations like GDPR,
HIPAA, and CCPA depending on the type of data being stored
and processed. 42
Cloud Security Cont...
Application Security for the Cloud
"Application Security for the Cloud" refers to the practice of
protecting cloud-based applications by implementing security
measures to safeguard data, user access, and the application
itself from potential threats, including unauthorized access,
data breaches, and vulnerabilities, leveraging specific security
controls designed for cloud environments like identity and
access management (IAM), encryption, vulnerability scanning,
and robust logging mechanisms.
Key aspects of Cloud Application Security:
Identity and Access Management (IAM): Securely
managing user identities and access levels to cloud
applications through strong authentication methods like multi-
factor authentication (MFA) and granular permission controls.
Data Encryption: Encrypting sensitive data both at rest and
in transit to protect against unauthorized access even if a
breach occurs.
Vulnerability Management: Regularly scanning applications
for potential vulnerabilities and promptly patching them to
mitigate risks.
Secure Development Practices: Implementing secure43
Cloud Security Cont...
Network Security: Securing network connections between
cloud services and on-premises systems with firewalls,
intrusion detection/prevention systems (IDS/IPS), and network
segmentation.
Logging and Monitoring: Implementing robust logging
systems to track user activity and detect suspicious behavior,
enabling timely threat detection and incident response.
Compliance Management: Adhering to relevant industry
regulations and compliance standards related to data privacy
and security.
Challenges in Cloud Application Security:
Shared Responsibility Model: Understanding the division of
security responsibilities between the cloud provider and the
application owner.
Complexity of Cloud Environments: Managing security across
diverse cloud services and infrastructure components.
Rapid Innovation: Keeping up with the latest cloud
technologies and security best practices.
44
Cloud Security Cont...
Benefits of Cloud Application Security:
Improved Data Protection: Enhanced security measures to
safeguard sensitive data from unauthorized access.
Reduced Risk of Breaches: Proactive identification and
mitigation of vulnerabilities to prevent data breaches.
Enhanced Compliance: Meeting industry regulations and
compliance requirements.
Operational Efficiency: Streamlined security management
across cloud environments.
Provider Security: Cloud Risk Assessment
A "Provider Security: Cloud Risk Assessment" refers to a
process where an organization evaluates the security posture
of their cloud service provider by examining their
infrastructure, configurations, and practices to identify
potential vulnerabilities and risks, allowing them to
understand and mitigate potential threats to their data stored
in the cloud.
Key aspects of a cloud risk assessment:
Identifying cloud assets: Cataloging all data, applications,
and systems residing in the cloud to understand the scope of45
Cloud Security Cont...
Analyzing cloud configurations: Reviewing settings and
configurations within the cloud environment to identify any
misconfigurations that could expose sensitive information.
Evaluating access controls: Assessing the effectiveness of
user authentication, authorization, and privilege management
mechanisms to prevent unauthorized access.
Data encryption practices: Examining how data is
encrypted at rest and in transit to protect against
unauthorized access even if breached.
Compliance with standards: Checking whether the cloud
provider adheres to relevant industry security standards and
regulations like HIPAA, GDPR, or SOC 2.
Incident response capabilities: Evaluating the provider's
plan for responding to security incidents and data breaches.
Data sovereignty concerns: Assessing where data is stored
geographically and whether it complies with data residency
requirements.
46
Thank you
47