cloud computing unit 05
cloud computing unit 05
Cloud Security: -
Cloud security refers to protecting data stored online via cloud computing environments (instead of data
centers) from theft, deletion, and leakage. There are many protective methods that help secure the
cloud; these measures include access control, firewalls, penetration testing, obfuscation, tokenization,
virtual private networks (VPN), and not using public internet connections.
1. Understand what you’re responsible for – different cloud services require varying levels of
responsibility. For instance, while software-as-a-service (SaaS) providers ensure that applications are
protected and that data security is guaranteed, IaaS environments may not have the same controls. To
ensure security, cloud customers need to double check with their IaaS providers to understand who’s in
charge of each security control.
2. Control user access – a huge challenge for enterprises has been controlling who has access to their
cloud services. Too often, organizations accidently publicly expose their cloud storage service despite
warnings from cloud providers to avoid allowing storage drive contents to be accessible to anyone with
an internet connection.
3. Data protection – data stored on cloud infrastructures should never be unencrypted. Therefore,
maintain control of encryption keys where possible. Even though you can hand the keys over to cloud
service providers, it is still your responsibility to protect your data. By encrypting your data, you ensure
that if a security configuration fails and exposes your data to an unauthorized party, it cannot be used.
4. Secure credentials – AWS access keys can be exposed on public websites, source code repositories,
unprotected Kubernetes dashboards, and other such platforms. Therefore, you should create and
regularly rotate keys for each external service while also restricting access on the basis of IAM roles.
Never use root user accounts – these accounts should only be used for specific account and service
management tasks. Further, disable any user accounts that aren’t being used to further limit potential
paths that hackers can compromise.
5. Implement MFA – your security controls should be so rigorous that if one control fails, other
features keep the application, network, and data in the cloud safe. By tying MFA (multi-factor
authentication) to usernames and passwords, attackers have an even harder time breaking in. Use MFA
to limit access to management consoles, dashboards, and privileged accounts.
6. Increase visibility – to see issues like unauthorized access attempts, turn on security logging and
monitoring once your cloud has been set up. Major cloud providers supply some level of logging tools
that can be used for change tracking, resource management, security analysis, and compliance audits.
7. Adopt a shift–left approach – with a shift-left approach, security considerations are incorporated
early into the development process rather than at the final stage. Before an IaaS platform goes live,
enterprises need to check all the code going into the platform while also auditing and catching potential
misconfigurations before they happen. One tip – automate the auditing and correction process by
choosing security solutions that integrate with Jenkins, Kubernetes, and others. Just remember to check
that workloads are compliant before they’re put into production. Continuously monitoring your cloud
environment is key here.
Disaster recovery as a service (DRaaS) is a cloud computing service model that allows an organization
to back up its data and IT infrastructure in a third party cloud computing environment and provide all
the DR orchestration, all through a SaaS solution, to regain access and functionality to IT infrastructure
after a disaster.
Cloud services have transformed the way businesses store data and host applications while introducing
new security challenges.
1. Identity, authentication and access management – This includes the failure to use multi-factor
authentication, misconfigured access points, weak passwords, lack of scalable identity
management systems, and a lack of ongoing automated rotation of cryptographic keys,
passwords and certificates.
2. Vulnerable public APIs – From authentication and access control to encryption and activity
monitoring, application programming interfaces must be designed to protect against both
accidental and malicious attempts to access sensitive data.
3. Account takeover – Attackers may try to eavesdrop on user activities and transactions,
manipulate data, return falsified information and redirect users to illegitimate sites.
4. Malicious insiders – A current or former employee or contractor with authorized access to an
organization’s network, systems or data may intentionally misuse the access in a manner that
leads to a data breach or affects the availability of the organization’s information systems.
5. Data sharing – Many cloud services are designed to make data sharing easy across organizations,
increasing the attack surface area for hackers who now have more targets available to access
critical data.
6. Denial-of-service attacks – The disruption of cloud infrastructure can affect multiple
organizations simultaneously and allow hackers to harm businesses without gaining access to
their cloud services accounts or internal network.
Cloud Attack Lifecycle
Attackers have two avenues of attack to compromise cloud resources:
1. The first is through traditional means, which involves accessing systems inside the enterprise
network perimeter, followed by reconnaissance and privilege escalation to an administrative
account that has access to cloud resources.
2. The second involves bypassing all the above by simply compromising credentials from an
administrator account that has administrative capabilities or has cloud services provider (CSP)
administrative access.
When a main administrative account is compromised, it is far more detrimental to the security of the
cloud network. With access to an administrative account, the attacker does not need to escalate
privileges or maintain access to the enterprise network because the main administrative account can do
all that and more.
This poses the question: How can the organization properly monitor misuse of CSP administrative
privileges?
It is no longer enough to identify a suspicious login attempt to protect your cloud network. Modern day,
sophisticated hackers are able to access an account through social engineering exploits, such as phishing.
It is now essential to monitor the behavior of accounts that are already logged into and detect any
suspicious activity.