CSDP Unit 2
CSDP Unit 2
Topics Covered:
1. Model for Network Security
2. Cloud security challenges
3. Security models in clouds
4. Guiding Security design principles for Cloud Computing
- Secure Isolation
- Comprehensive data protection
- End-to-end access control
- Monitoring and auditing
5. CSA, NIST, and ENISA guidelines for Cloud Security
6. Data Redaction, Tokenization, Obfuscation
7. Assuring data deletion
8. Data retention, deletion, and archiving procedures for tenant data
9. Data Protection Strategies
1.1 Firewalls
A firewall acts as a barrier between trusted internal networks and untrusted external networks
(like the Internet). It monitors and filters incoming and outgoing traffic based on predefined
security rules.
• Types:
o Network-based firewalls
o Host-based firewalls
o Web Application Firewalls (WAF)
• Function:
Blocks unauthorized access, prevents DDoS attacks, and ensures secure
communication.
• Example:
AWS Security Groups act as virtual firewalls for Amazon EC2 instances. You can
define rules that allow HTTP (port 80) and block other untrusted ports to secure your
instance.
5. CSA, NIST, and ENISA Guidelines for Cloud Security – (10 Marks)
Introduction
As cloud adoption grows, international organizations have published comprehensive security
frameworks and guidelines to help organizations secure their cloud environments. Among
them, the most recognized are:
• CSA (Cloud Security Alliance)
• NIST (National Institute of Standards and Technology, USA)
• ENISA (European Union Agency for Cybersecurity)
These guidelines cover areas like risk management, compliance, identity, access control,
encryption, and incident response to ensure confidentiality, integrity, and availability of
cloud data.
Conclusion
CSA, NIST, and ENISA collectively provide global guidance on cloud security management.
Organizations should align their security strategies with these frameworks to ensure
compliance, risk mitigation, and operational resilience in their cloud environments.
Introduction
Data protection techniques are methods used to safeguard sensitive data from unauthorized
access, modification, or disclosure, especially in cloud environments. These techniques are
vital for ensuring privacy, regulatory compliance (like GDPR, HIPAA, DPDP), and
overall data security. Three commonly used methods are Data Redaction, Tokenization,
and Obfuscation.
6.2 Tokenization
Definition
Tokenization is a process where sensitive data is replaced with a non-sensitive
placeholder, called a token. The actual data is stored securely in a token vault.
Purpose
• Prevent raw sensitive data from being exposed
• Reduce PCI-DSS compliance scope in payment systems
• Enhance cloud data security without altering database schemas
Features
• Tokens have no exploitable value
• Can be mapped back to original data via a secure token vault
• Common in finance, healthcare, and customer databases
Example
In a credit card transaction, the number 1234-5678-9876-5432 is tokenized as ABCD-
12XY-ZZ88-WXYZ.
Use Case: An e-commerce company stores tokens in the database, while actual cardholder
data is kept in a secure PCI-DSS certified token vault managed by a cloud provider.
6.3 Obfuscation
Definition
Obfuscation is the process of modifying data or code to make it unintelligible to
unauthorized users while retaining its functionality or usability.
Purpose
• Prevent reverse engineering of applications
• Hide sensitive logic or algorithms in client-side code
• Mask internal structures or operations
Types
• Code Obfuscation: Changing variable names, control flows, or logic structures
• Data Obfuscation: Transforming real values to fake but realistic ones (e.g., for
testing)
Example
A JavaScript file used in a web app is obfuscated to prevent hackers from identifying
sensitive functions like validateLogin() or accessDatabase().
Use Case: A company developing a proprietary ML algorithm in Python deploys it in the
cloud but uses obfuscation to protect the core code from being copied or misused.
Comparison Table
Technique Purpose Reversible Use Case Example
Redaction Hide/remove No Masking account numbers
sensitive info in statements
Tokenization Replace with secure Yes (via token vault) Payment data protection
tokens
Obfuscation Make code/data No (intended to be hard Protecting frontend
unreadable to reverse) source code
Conclusion
Data redaction, tokenization, and obfuscation are essential techniques in the cloud for
protecting sensitive data, reducing exposure risks, and complying with global privacy laws.
Their usage depends on the context—whether for compliance, secure storage, or secure
application deployment.
8. Data Retention, Deletion, and Archiving Procedures for Tenant Data – (10 Marks)
Introduction
In cloud environments, tenant data refers to information belonging to individual users or
organizations using a shared cloud infrastructure. Managing this data securely over its entire
lifecycle—from retention to deletion and archiving—is critical for regulatory
compliance, business continuity, and security. These procedures help prevent data loss,
unauthorized access, and legal violations.
Best Practices
Stage Best Practice
Retention Apply least-necessary duration principle to limit data storage
Deletion Automate deletion via APIs and confirm via audit logs
Archiving Encrypt and label archived data clearly for retrieval and review
Conclusion
Managing tenant data through effective retention, deletion, and archiving procedures is
essential for cloud security, data hygiene, and legal compliance. Cloud providers must enable
granular control for tenants to configure data lifecycle settings and ensure secure handling of
their data from creation to destruction.
Introduction
Data protection in the cloud involves implementing strategies and technologies to ensure the
confidentiality, integrity, and availability (CIA) of data throughout its lifecycle. Cloud
environments, being multi-tenant and distributed, require robust security controls to
safeguard data in transit, at rest, and in use. These strategies reduce risks related to data
breaches, insider threats, data loss, and ensure regulatory compliance.
Summary Table
Strategy Purpose Example Tool/Service
Zero Trust Always verify access requests Microsoft Azure AD
Conditional Access
Encryption Standards Protect data confidentiality Google Cloud KMS, AWS
KMS
IAM Control who accesses what AWS IAM, Azure AD, Okta
Backup & Disaster Ensure business continuity AWS Backup, Azure Site
Recovery Recovery
Incident Response Detect and handle breaches Google Chronicle, Splunk, IBM
efficiently QRadar
Conclusion
Implementing robust data protection strategies in cloud computing is essential for securing
sensitive data, maintaining user trust, and meeting legal and industry compliance. These
strategies must be continuously monitored, tested, and adapted to evolving threats and cloud
architectures.