CH 5 Cloud NOtes
CH 5 Cloud NOtes
- **Key Concepts**:
- **Shared Responsibility Model**: Defines the division of
security responsibilities between the cloud service provider
(CSP) and the user. CSP manages infrastructure security, while
users are responsible for securing their data and applications.
- **Encryption**: Uses algorithms to encode data to
prevent unauthorized access. In-transit encryption secures
data during transmission, while at-rest encryption safeguards
stored data.
- **Access Controls**: Determine who can access resources
and what actions they can perform. Implemented through
identity and access management (IAM) tools, role-based
access control (RBAC), and least privilege principles.
- **Identity Management**: Authentication methods like
multi-factor authentication (MFA) and single sign-on (SSO)
ensure secure user access to systems and resources.
- **Compliance**: Adherence to regulatory standards (e.g.,
GDPR, HIPAA) and industry-specific security frameworks to
protect sensitive data and ensure legal compliance.
- **Protocols**:
- **SSL/TLS**: Ensuring secure communication by
encrypting data transmitted between clients and servers.
- **OAuth**: Providing secure, delegated access to APIs on
behalf of users without sharing credentials.
- **SAML**: Enabling single sign-on (SSO) authentication for
web-based applications across different domains.
- **Controls**:
- **Firewalls**: Monitoring and controlling incoming and
outgoing network traffic to prevent unauthorized access or
malicious activities.
- **IDS/IPS**: Detecting and responding to potential
security threats or policy violations within the network.
- **Data Loss Prevention (DLP)**: Implementing strategies
and tools to prevent sensitive data from being accessed or
distributed outside authorized channels.