Cloud Computing
Cloud Computing
• Self-service on demand
• Storage that is distributed
• Rapid elasticity
• Services that are measured
• Management by automation
• A virtualization system
• Infrastructure-as-a-Service (IaaS)
• Platform-as-a-Service (PaaS)
• Software-as-a-Service (SaaS)
Infrastructure-as-a-Service (IaaS)
Infrastructure as a service, or IaaS, is a self-service model. Using IaaS allows you to access, monitor,
and manage your data. As an example, IaaS offers the cloud-based infrastructure to deploy remote
datacenter instead of purchasing firewalls, networking devices, and servers, and spending money on
deployment and management. Amazon EC2, Cisco Metapod, Microsoft Azure, and Google Compute
Engine (GCE) are some of the most popular examples of IaaS.
Platform-as-a-Service (PaaS)
Another cloud computing service is the platform as a service. Application development, deployment,
and management are all made possible by it. A PaaS service offers Development Tools, Configuration
Management, Deployment Platforms, and the ability to migrate apps to hybrid models. Applications
can be developed and customized, OSes can be managed, storage and networking can be handled,
etc., with the help of this software. Google App Engine, Microsoft Azure, Intel Mash Maker, etc., are
all examples of PaaS.
Software-as-a-Service (SaaS)
The most widely used type of Cloud Computing service is Software as a Service (SaaS). On-demand
software is centrally hosted so it can be accessed by users using client software via browsers. There
are many examples of SaaS in the workplace, such as Microsoft Office 365, Cisco WebEx, Citrix
GoToMeeting, Google Apps, DBMS, CAD, ERP, HRM, and messaging software.
Cloud Computing Benefits
The following are some of the most important advantages of cloud computing;
Increased Capacity:
A cloud computing platform provides unlimited capacity, so users do not need to worry about the size
of their infrastructure. We can also say that by using a cloud platform, a customer can use as much or
as little capacity as they desire.
Increased Speed:
As a result of the cloud computing environment, organizations can access IT resources faster, less
expensive, and faster manner than ever before.
Low Latency:
As a result of the cloud computing technology, customers can easily implement their applications with
just a couple of clicks, so they can achieve all their tasks quickly at minimal costs, i.e. not too much
time is consumed and there is a minimum amount of latency.
Security
As far as security is concerned, cloud computing is also very efficient when it comes to cloud
computing. There are several benefits to patch management and security updates, including less
investment in security. Protection against cloud computing threats comes in the form of disaster
recovery, dynamic scalability defensive resources, and other security services.
Understanding Virtualization
A virtual machine or multiple virtual machines are deployed on a host machine through virtualization
in computer networking. The virtual machines use the system resources of the host machine by
logically dividing them. Virtual machines differ greatly from physically deployed machines in terms of
their system resources and hardware. The physical deployment of an operating system requires
separate hardware, while a virtual machine host can share storage and resources between multiple
operating systems.
Data Loss/Breach
A large number of platforms are at risk of losing or breaching their data due to data loss and data
breaches. If the encryption key is lost or improperly encrypted, the data may be modified, erased,
stolen, and misused as a result.
Furthermore, there are also other attackers which have been discussed earlier which could also be
vulnerable to Cloud Computing, including SQL Injection attacks (injecting malicious SQL statements
into the system to extract information), Cryptanalysis attacks (weak or outdated encryption),
Wrapping attacks (duplicating the body of a message), Denial-of-Service (DoS) and Distributed Denial-
of-Service (DDoS) attacks.
Cloud Security
Cloud Computing Security refers to the deployment, implementation, and prevention of security
threats. It includes the implementation of cloud security policies, the deployment of security devices
such as application firewalls and Next Generation Intrusion Prevention Systems (IPS), as well as the
hardening of the cloud computing infrastructure. As well as some actions that should be taken by the
service provider, it also includes some actions that should be taken by the users in regards to the
action they should take.
Application Layer
A variety of security mechanisms, devices, and policies are available to support cloud security controls
at different levels of the cloud security control hierarchy. A Web application firewall is deployed at the
application layer to filter and observe traffic. A similar approach is used in Systems Development Life
Cycle (SDLC), Binary Code Analysis (BCA), Transactional Security (TS), etc., to ensure the security of
online transactions and script analysis.
Information
To ensure the confidentiality and integrity of the information that is being communicated between
clients and servers in cloud computing, different policies are configured to monitor any loss of data
that might occur during the communication process. Data Loss Prevention (DLP) and Content
Management Framework (CMF) are among these policies. In Data Loss Prevention (DLP), information
leakage is prevented by preventing it from leaving the network. A typical example of this type of
information is confidential information about a company or organization, proprietary information,
financial information, and other types of secrets. As part of the Data Loss Prevention feature, the user
is prevented from intentionally or unintentionally sending confidential information by using Data Loss
Prevention policies.
Management
Many approaches are employed to manage the security of Cloud Computing, including Governance,
Risk Management, and Compliance (GRC), Identity and Access Management (IAM), and Patch and
Configuration Management. Access to resources can be controlled and managed using these
approaches.
Network layer
Security solutions for cloud computing include Next-Generation IDS/IPS, Next-Generation Firewalls,
DNSSec, Anti-DDoS, OAuth, and Deep Packet Inspection (DPI). One of the efficient-proactive
components of the Integrated Threat Security Solution is NGIPS or Next-Generation Intrusion
Prevention System. The NGIPS provides enhanced security intelligence, enhanced visibility, and
advanced protection against emerging threats to secure complex network infrastructures.
In addition to deep network visibility, automation, and security intelligence, Cisco NGIPS Solution
provides next-generation protection. To detect increasingly sophisticated network attacks, it uses the
most advanced and effective intrusion prevention capabilities. Data regarding the network is
continuously collected, including information about the operating system, files, applications, devices,
as well as user information. In the context of intrusion events, this information enables NGIPS to
determine network maps and host profiles.
Trusted Computing
From the end entity up to the root certificate, each component of hardware and software must be
validated to establish the root of trust (RoT). In addition to maintaining flexibility, it aims to ensure
that only trusted software and hardware can be used.
Physical Security
Physical security is always a priority when it comes to securing anything. Since it is also the first layer
of the OSI model, if it is not physically secured, any security configuration will be ineffective. A physical
security system protects against man-made attacks such as theft, damage, unauthorized physical
access, and environmental threats such as rain, dust, power outages, fires, etc.
Responsibilities in Cloud Security
Among the responsibilities of a cloud service consumer are the following security controls that must
be met: -