4
4
Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy, and Security in cloud:
Cloud computing security architecture, General Issues, Trusted Cloud computing, Security challenges:
Virtualization security management-virtual threats, VM Security Recommendations, VM-Specific
Security techniques, Secure Execution Environments and Communications in the cloud.
VIRTUAL THREATS
Some of the virtual threats to Cloud computing security are:
1. Shared clipboard:
Shared clipboard technologies enable information to become transferred between VMs as well as the host,
offering a means of moving information between malicious programs in VMs of various security realms.
2. Keystroke logging:
Some VM technologies allow the logging of keystrokes and screen updates to become passed across virtual
terminals within the virtual machine, writing to host files and permitting the monitoring of encrypted
terminal connections in the VM.
3. VM monitoring in the host:
Since all network packets coming from or planning to a VM pass with the host, the host may be able to
impact the VM from the following this:
Starting, stopping, pausing, and restart VMs
Monitoring and configuring resources available to the VMs, including CPU, memory, disk, and network
usage of VMs
Adjusting the amount of CPUs, level of memory, quantity, and variety of virtual disks, and quantity of
virtual network interfaces offered to a VM.
Monitoring the applications running inside the VM.
The viewing, copying, and modifying data stored about the VM’s virtual disks.
4. Virtual machine monitoring from another VM:
VMs shouldn’t have the ability to directly access one another’s virtual disks around the host. Nevertheless, if
the VM platform uses a virtual hub or switches for connecting the VMs to the host, then intruders may be
able to use a hacker technique called “ARP poisoning” to redirect packets planning to or in the other VM for
sniffing.
5. Virtual machine backdoors:
Virtual machine backdoors, covert communications channel between guest and host could allow intruders to
execute potentially harmful operations.
VM SECURITY RECOMMENDATIONS
Following virtual machine security recommendations help ensure the integrity of the cloud:
General Virtual Machine Protection: A virtual machine is, in most respects, the equivalent of a physical
server. Employ the same security measures in virtual machines that for physical systems.
Minimize Use of the Virtual Machine Console: The virtual machine console provides the same function
for a virtual machine that a monitor provides on a physical server.
Users with access to the virtual machine console have access to virtual machine power management and
removable device connectivity controls. Console access might therefore allow a malicious attack on a virtual
machine.
Prevent Virtual Machines from Taking over Resources: When one virtual machine consumes so much of
the host resources that other virtual machines on the host cannot perform their intended functions, a Denial
of Service (DoS) might occur.
To prevent a virtual machine from causing a DoS, use host resource management features such as setting
Shares and using resource pools.
Disable Unnecessary Functions Inside Virtual Machines: Any service that is running in a virtual machine
provides the potential for attack. By disabling system components that are not necessary to support the
application or service that is running on the system, to reduce the potential.
The need for cloud communications has resulted from the following trends in the enterprise:
Distributed and decentralized company operations in branch and home offices
Increase in the number of communication and data devices accessing the enterprise networks
Hosting and managing IT assets and applications
These trends have forced many enterprises to seek external services and to outsource their requirement for IT
and communications. The cloud is hosted and managed by a third party, and the enterprise pays for and uses
space on the cloud for its requirements. This has allowed enterprises to save on costs incurred for hosting and
managing data storage and communication on their own.
The following are some of the communication and application products available under cloud communications
that an enterprise can utilize:
Private branch exchange
SIP Trucking
Call center
Fax services
Interactive voice response
Text messaging
Voice broadcast
Call-tracking software
Contact center telephony
All of these services cover the various communication needs of an enterprise. These include customer relations,
intra-branch and inter-branch communication, inter-department memos, conference, call forwarding, and
tracking services, operations center, and office communications hub.
Cloud communication is a center for all enterprise-related communication that is hosted, managed, and
maintained by third-party service providers for a fee charged to the enterprise.