Interactive session 6-cloudcomputingp
Interactive session 6-cloudcomputingp
on
Cloud Computing
noc25-cs11
by
Mainak Chakraborty
LINK : https://aws.amazon.com/compliance/shared-responsibility-model/
What Makes Cloud Security Different from Traditional IT Security?
•Shared Responsibility Model: In cloud
environments, security responsibilities are
divided between the cloud provider
(infrastructure-level security) and the customer
(data and application-level security)
Links : https://aws.amazon.com/solutions/guidance/multi-
tenant-architectures-on-aws/
What are some real-world examples of
denial-of-service (DoS) attacks?
•Dyn DDoS Attack (2016):
•A massive Distributed Denial-of-Service (DDoS) attack using the Mirai botnet targeted Dyn, a
major DNS provider.
•Impact: Disrupted major websites like Netflix, Twitter, Reddit, and PayPal across the U.S. and
Europe.
•Link : https://en.wikipedia.org/wiki/DDoS_attacks_on_Dyn
•GitHub Attack (2018):
•A record-breaking DDoS attack peaked at 1.35 Tbps using memcached servers for amplification.
•Impact: Temporarily knocked GitHub offline but was mitigated within minute.
•Link : https://github.blog/news-insights/company-news/ddos-incident-report/
•Cloudflare Attack (2020):
•Exploited weaknesses in the Network Time Protocol (NTP) for amplification, generating massive
traffic loads.
•Impact: Demonstrated how protocol vulnerabilities could be leveraged for large-scale DDoS
attacks.
•Link : https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/
Security Mechanisms and Best Practices
•Policies: Define what is allowed or prohibited in a system. They act as the foundation of security by specifying acceptable
behaviors, access controls, and operational guidelines.
•Mechanisms: Enforce the policies through tools and technologies, such as firewalls, encryption, and intrusion detection
systems (IDS).
2. Network Security Steps
To secure cloud environments, organizations should follow these steps:
•Define Security Policy:
•Establish a comprehensive policy covering usage, access controls, and data protection.
•Include user training on password management and social engineering risks.
•Implement Firewalls and IDS:
•Firewalls filter traffic based on predefined rules (e.g., IP addresses, ports).
•IDS monitor network activity for suspicious patterns or breaches.
•Conduct Vulnerability Scanning and Penetration Testing:
•Regularly scan for potential vulnerabilities using tools like Nessus or Metasploit.
•Perform penetration testing to simulate attacks and identify weaknesses.
3. Virtualization Risks
Virtualization introduces unique risks due to the use of hypervisors (software managing virtual machines). Key
vulnerabilities include:
▪Hypervisor Exploits: Attackers can exploit bugs in the hypervisor to gain control of all hosted virtual machines
(VMs).
▪VM Escape: Malicious code can escape a VM’s isolation layer to access the host system or other VMs.
▪Rogue Hypervisors: Unauthorized hypervisors can be installed to control VMs covertly.
▪Denial-of-Service (DoS): Overloading a hypervisor can disrupt all hosted VMs.
Security Measures in AWS
Link : https://docs.aws.amazon.com/vpc/latest/userguide/vpc-security-groups.html
Hands-on Session Checklist
• AWS Free-tier Account
Step 1
• IAM User
Step 2 • MFA
Features of Amazon S3
• Bucket : A general-purpose bucket is a container for objects stored in Amazon S3.
You can store any number of objects in a bucket and all accounts have a default
bucket quota of 10,000 general purpose buckets. Every object is contained in a
bucket. For example, if the object named photos/puppy.jpg is stored in
the amzn-s3-demo-bucket bucket in the US West (Oregon) Region, then it is
addressable by using the URL https://amzn-s3-demo-bucket.s3.us-west-
2.amazonaws.com/photos/puppy.jpg.
• When you create a bucket, you enter a bucket name and choose the AWS Region
where the bucket will reside. After you create a bucket, you cannot change the
name of the bucket or its Region. Bucket names must follow the bucket naming
rules. You can also configure a bucket to use S3 Versioning or other storage
management features.
• Object : Objects are the fundamental entities stored in Amazon S3. Objects consist
of object data and metadata. The metadata is a set of name-value pairs that
describe the object. These pairs include some default metadata, such as the date
last modified, and standard HTTP metadata, such as Content-Type. You can also
specify custom metadata at the time that the object is stored.
https://aws.amazon.com/ec2/pricing/on-demand/
Use Free-tier
Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security, and
performance.
Features of Buckets
• When you create a general purpose bucket, you choose its name and the AWS Region to
create it in. After you create a general purpose bucket, you can't change its name or
Region. The following sections provide information about general purpose bucket
naming, including naming rules, best practices, and an example for creating a general
purpose bucket with a name that includes a globally unique identifier (GUID).
• Important Rules :
•Bucket names must be unique across all AWS accounts in all the AWS Regions within a
partition. A partition is a grouping of Regions. AWS currently has three
partitions: aws (commercial Regions), aws-cn (China Regions), and aws-us-gov (AWS
GovCloud (US) Regions).
•A bucket name can't be used by another AWS account in the same partition until the
bucket is deleted. After you delete a bucket, be aware that another AWS account in the
same partition can use the same bucket name for a new bucket and can therefore
potentially receive requests intended for the deleted bucket. If you want to prevent this, or
if you want to continue to use the same bucket name, don't delete the bucket. We
recommend that you empty the bucket and keep it, and instead, block any bucket requests
as needed.
• Bucket policy
https://docs.aws.amazon.com/AmazonS3/latest/us
• First delete objects and then delete Bucket erguide/Welcome.html#BasicsBucket
• https://aws.amazon.com/s3/pricing/
Hands-on Session