CC Unit - 4
CC Unit - 4
Scalability: Being able to actively scale up and down with flux in demand
for resources is one of the major points of cloud computing
Speed: Users can quickly spin up multiple machines as per their usage
without the need for an IT Administrator
Savings: Pay as you go model allows for enormous cost savings for users,
it is facilitated by provisioning or removing resources according to the
demand
Introduction
Cloud Exchange (CEx) serves as a market maker, bringing service providers and
users together. The University of Melbourne proposed it under Intercloud
architecture (Cloudbus). It supports brokering and exchanging cloud resources for
scaling applications across multiple clouds. It aggregates the infrastructure demands
from application brokers and evaluates them against the available supply. It supports
the trading of cloud services based on competitive economic models such as
commodity markets and auctions.
Entities of the Global exchange of cloud resources
Now we will talk about the various entities of the global exchange of cloud resources.
Market directory
A market directory is an extensive database of resources, providers, and participants
using the resources. Participants can use the market directory to find providers or
customers with suitable offers.
Auctioneers
Auctioneers clear bids and ask from market participants regularly. Auctioneers sit
between providers and customers and grant the resources available in the Global
exchange of cloud resources to the highest bidding customer.
Brokers
Brokers mediate between consumers and providers by buying capacity from the
provider and sub-leasing these to the consumers. They must select consumers
whose apps will provide the most utility. Brokers may also communicate with
resource providers and other brokers to acquire or trade resource shares. To make
decisions, these brokers are equipped with a negotiating module informed by the
present conditions of the resources and the current demand.
The consumer participates in the utility market via a resource management proxy
that chooses a set of brokers based on their offering.SLAs are formed between the
consumer and the brokers, which bind the latter to offer the guaranteed resources.
After that, the customer either runs their environment on the leased resources or
uses the provider's interfaces to scale their applications.
Providers
A provider has a price-setting mechanism that determines the current price for their
source based on market conditions, user demand, and the current degree of
utilization of the resource.
There is no doubt that Cloud Computing provides various Advantages but there are
also some security issues in cloud computing. Below are some following Security
Issues in Cloud Computing as follows.
Data Loss –
Data Loss is one of the issues faced in Cloud Computing. This is also known as Data
Leakage. As we know that our sensitive data is in the hands of Somebody else, and
we don’t have full control over our database. So, if the security of cloud service is to
break by hackers then it may be possible that hackers will get access to our sensitive
data or personal files.
Lack of Skill –
While working, shifting to another service provider, need an extra feature, how to use
a feature, etc. are the main problems caused in IT Company who doesn’t have
skilled Employees. So it requires a skilled person to work with Cloud Computing.
Infrastructure (server-side)
Network (the internet)
Application and Software (client-side)
Infrastructure
Every IoP initiated from the client-side starts at this level. Moreover,
depending upon the kind of storage you purchase (shared, dedicated,
or individual server), you must enhance your SaaS security
measures.
Network
We must ensure that all the 3rd party applications and software that
you use are continuously monitored. Further, the unpredictability of
the client-side environment demands higher standards of security
measures than conventional methods.
Encryption is a must
Customer Education
Compliance Manager
Event Analytics
These are a few of the many ways that Cloudlytics can help you build
SaaS security measures for successful future platforms. We are
passionate about security because we believe that the world would be
a better place if our data is secure against malicious forces of the
internet.
Let’s build impenetrable SaaS platforms that offer safety and security
to their users. Get in touch to know more about Cloudlytics SaaS
security products and services.
2. Vendor lock-in :
Many vendors opt for this, as this clause causes organizations to depend
on the cloud service provider (or vendor) for products and services.
This can be avoided by making changes to the SLA suitably and reduce
dependencies on a single vendor, thus ensuring freedom to the
organization.
3. Cloud Sprawl :
This happens when employees of different departments use different
programs and cloud infrastructure from third-party providers without
involving the IT department and getting necessary approvals.
If not detected and restricted, crowd sprawl may lead to fragmented,
redundant, inefficient, and unmanaged cloud programs sitting on the
enterprise cloud and unnecessarily creating trouble.
Types of Hypervisors
Type-1 Hypervisors
Type-2 Hypervisor
In this design, the Virtual Machine Monitor (VMM) sits directly above the
hardware and eavesdrops on all interactions between the VMs and the
hardware. On top of the VMM is a management VM that handles other guest
VM management and handles the majority of a hardware connections. The
Xen system is a common illustration of this kind of virtualization design.
Type II virtualization
In these architectures, like VMware Player, allow for the operation of the
VMM as an application within the host operating system (OS). I/O drivers
and guest VM management are the responsibilities of the host OS.
Service Provider Security
The system’s virtualization hardware shouldn’t be physically accessible to
anyone not authorized. Each VM can be given an access control that can
only be established through the Hypervisor in order to safeguard it against
unwanted access by Cloud administrators. The three fundamental tenets of
access control, identity, authentication, and authorization, will prevent
unauthorized data and system components from being accessed by
administrators.
Hypervisor Security
The Hypervisor’s code integrity is protected via a technology called Hyper
safe. Securing the write-protected memory pages, expands the hypervisor
implementation and prohibits coding changes. By restricting access to its
code, it defends the Hypervisor from control-flow hijacking threats. The only
way to carry out a VM Escape assault is through a local physical setting.
Therefore, insider assaults must be prevented in the physical Cloud
environment. Additionally, the host OS and the interaction between the guest
machines need to be configured properly.
Virtual Machine Security
The administrator must set up a program or application that prevents virtual
machines from consuming additional resources without permission.
Additionally, a lightweight process that gathers logs from the VMs and
monitors them in real-time to repair any VM tampering must operate on a
Virtual Machine. Best security procedures must be used to harden the guest
OS and any running applications. These procedures include setting up
firewalls, host intrusion prevention systems (HIPS), anti-virus and anti-
spyware programmers, online application protection, and log monitoring in
guest operating systems.
Guest Image Security
A policy to control the creation, use, storage, and deletion of images must be
in place for organizations that use virtualization. To find viruses, worms,
spyware, and rootkits that hide from security software running in a guest OS,
image files must be analyzed.
Benefits of Virtualized Security
Virtualized security is now practically required to meet the intricate security
requirements of a virtualized network, and it is also more adaptable and
effective than traditional physical security.
Cost-Effectiveness: Cloud computing’s virtual machine security enables
businesses to keep their networks secure without having to significantly
raise their expenditures on pricey proprietary hardware. Usage-based
pricing for cloud-based virtualized security services can result in
significant savings for businesses that manage their resources effectively.
Flexibility: It is essential in a virtualized environment that security
operations can follow workloads wherever they go. A company is able to
profit fully from virtualization while simultaneously maintaining data
security thanks to the protection it offers across various data centers, in
multi-cloud, and hybrid-cloud environments.
Operational Efficiency: Virtualized security can be deployed more
quickly and easily than hardware-based security because it doesn’t
require IT, teams, to set up and configure several hardware appliances.
Instead, they may quickly scale security systems by setting them up using
centralized software. Security-related duties can be automated when
security technology is used, which frees up more time for IT employees.
Regulatory Compliance: Virtual machine security in cloud computing is
a requirement for enterprises that need to maintain regulatory compliance
because traditional hardware-based security is static and unable to keep
up with the demands of a virtualized network.
Virtualization Machine Security Challenges
As we previously covered, buffer overflows are a common component of
classical network attacks. Trojan horses, worms, spyware, rootkits,
and DoS attacks are examples of malware.
In a cloud context, more recent assaults might be caused via VM rootkits,
hypervisor malware, or guest hopping and hijacking. Man-in-the-middle
attacks against VM migrations are another form of attack. Typically,
passwords or sensitive information are stolen during passive attacks.
Active attacks could alter the kernel’s data structures, seriously harming
cloud servers.
HIDS or NIDS are both types of IDSs. To supervise and check the
execution of code, use programmed shepherding. The RIO dynamic
optimization infrastructure, the v Safe and v Shield tools from VMware,
security compliance for hypervisors, and Intel vPro technology are some
further protective solutions.
Four Steps to ensure VM Security in Cloud Computing
The fourth and last aspect of cloud virtual network security is to make sure
that connections between tenants or services do not cross over into virtual
networks. Virtual Networking is a fantastic approach to building quick
connections to scaled or redeployed features, but each time a
modification is made to the virtual network, it’s possible that an accidental
connection will be made between two distinct services, tenants, or
feature/function deployments. A data plane leak, a link between the actual
user networks, or a management or control leak could result from this,
allowing one user to affect the service provided to another.
Identity management
Access management
Federation
RBAC/EM
Multi-Factor authentication
Access governance
Customer IAM
API Security
IDaaS – Identity as a service
Granular permissions
Privileged Identity management – PIM (PAM or PIM is the same)
You can use specialized solutions to keep an eye on the behavior of your
staff in order to promote transparency in your cloud infrastructure. You can
spot the earliest indications of a cloud account compromise or an insider
threat by keeping an eye on what your employees are doing while they are at
work. Imagine your cybersecurity experts discover a user accessing your
cloud infrastructure from a strange IP address or outside of normal business
hours. In that situation, they’ll be able to respond to such odd activity
promptly because it suggests that a breach may be imminent.
4. Data Protection
2. ISO-27017
3. ISO-27018
4. CIS controls
Organizations can secure their systems with the help of Internet Security
Center (CIS) Controls, which are open-source policies based on consensus.
Each check is rigorously reviewed by a number of professionals before a
conclusion is reached.
To easily access a list of evaluations for cloud security, consult the CIS
Benchmarks customized for particular cloud service providers. For instance,
you can use the CIS-AWS controls, a set of controls created especially for
workloads using Amazon Web Services (AWS).
5. FISMA
For the European Union, there are laws governing data protection and
privacy. Even though this law only applies to the European Union, it is
something you should keep in mind if you store or otherwise handle any
personal information of residents of the EU.
8. SOC Reporting
For all merchants who use credit or debit cards, the PCI DSS (Payment Card
Industry Data Security Standard) provides a set of security criteria. For
businesses that handle cardholder data, there is PCI DSS. The PCI DSS
specifies fundamental technological and operational criteria for safeguarding
cardholder data. Cardholders are intended to be protected from identity theft
and credit card fraud by the PCI DSS standard.
10. HIPAA
Any business that uses Amazon Web Service cloud resources can help
safeguard sensitive IT systems and data by adhering to the CIS AWS
Foundations Benchmark. Intelligence analysts developed a set of objective,
consensus-driven configuration standards known as the CIS (Center for
Internet Security) Benchmarks to help businesses improve their information
security. Additionally, CIS procedures are for fortifying AWS accounts to
build a solid foundation for running jobs on AWS.