0% found this document useful (0 votes)
31 views19 pages

Cloud Security Unit 1

Cloud computing involves renting computing resources over the internet, offering benefits like cost savings, scalability, and reliability through various service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid, community). Key characteristics include on-demand self-service, resource pooling, and measured service, while challenges encompass security, compliance, and integration with legacy systems. Cloud security is crucial for protecting data and ensuring compliance, with a shared responsibility model between providers and customers.

Uploaded by

DEEPAK KOLAGANI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views19 pages

Cloud Security Unit 1

Cloud computing involves renting computing resources over the internet, offering benefits like cost savings, scalability, and reliability through various service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid, community). Key characteristics include on-demand self-service, resource pooling, and measured service, while challenges encompass security, compliance, and integration with legacy systems. Cloud security is crucial for protecting data and ensuring compliance, with a shared responsibility model between providers and customers.

Uploaded by

DEEPAK KOLAGANI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Overview of Cloud Computing:

Introduction

Cloud computing is essentially renting computing resources—like servers, storage, databases,


and software—over the internet instead of owning and maintaining them yourself. This approach
offers several key advantages:

* **Service Models**: You have options like IaaS (Infrastructure as a Service), where you
control the infrastructure; PaaS (Platform as a Service), which provides a platform for
developing applications; and SaaS (Software as a Service), where you use applications over the
internet.
* **Deployment Models**: Cloud services can be deployed as public clouds (shared
infrastructure), private clouds (dedicated infrastructure), or hybrid clouds (a mix of both).
* **Benefits**: The main benefits include cost savings by reducing capital and operational
expenses, scalability to handle varying workloads, reliability through built-in redundancy,
accessibility from anywhere, and robust security measures.

Cloud computing allows organizations to be more agile, efficient, and innovative by focusing on
their core business rather than managing IT infrastructure.

Definitions and Characteristics in Cloud Computing

Definition of Cloud Computing:

Cloud Computing is the delivery of computing services—including servers, storage, databases,


networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster
innovation, flexible resources, and economies of scale. It allows users to access and store data
and applications on remote servers instead of a local computer or personal device.

Key Characteristics of Cloud Computing:

1.​ On-Demand Self-Service:​

○​ Users can automatically provision computing resources (like storage or servers)


without requiring human interaction with the service provider.​

2.​ Broad Network Access:​


○​ Services are accessible over the network (internet or intranet) and can be used
by various devices such as smartphones, tablets, laptops, etc.​

3.​ Resource Pooling:​

○​ Providers serve multiple customers using a multi-tenant model, dynamically


assigning and reassigning resources based on demand.​

4.​ Rapid Elasticity:​

○​ Resources can be quickly scaled up or down based on user needs. To the user,
resources often appear to be unlimited.​

5.​ Measured Service:​

○​ Cloud systems automatically control and optimize resource use through


metering. Users are typically billed based on consumption (pay-as-you-go).​

6.​ Scalability and Flexibility:​

○​ Businesses can scale their infrastructure as required without upfront investment


in hardware.​

7.​ Cost-Effectiveness:​

○​ Reduces the capital expense of buying hardware and software; users pay only
for what they use

Cloud Service Models Explained


Cloud computing offers various **service models** that define how resources are delivered to
users. The three main cloud service models are

**1. Infrastructure as a Service (IaaS)**

#### ✅ **Definition:**
IaaS provides virtualized **computing resources over the internet**, such as servers, storage,
and networking hardware. Users manage the operating system, applications, and data.

🧩 **Examples:**
* Amazon Web Services (AWS EC2)
* Microsoft Azure Virtual Machines

* Google Compute Engine

#### 🎯 **Key Features:**


* Full control over infrastructure

* Scalable and flexible

* Pay-as-you-go pricing

* Useful for developers, system admins, and IT teams

**2. Platform as a Service (PaaS)**

✅ **Definition:**
PaaS delivers a **platform or environment** for developers to build, test, and deploy
applications. The underlying infrastructure (servers, OS, storage) is managed by the provider.

🧩 **Examples:**
* Google App Engine

* Microsoft Azure App Services

* Heroku

#### 🎯 **Key Features:**


* Simplifies app development

* No need to manage servers or runtime environments

* Built-in tools for testing, deployment, and scaling

* Ideal for developers and software teams

**3. Software as a Service (SaaS)**

✅ **Definition:**
SaaS provides **ready-to-use software applications** over the internet. Users access these
apps via browsers without worrying about installation or maintenance.
🧩 **Examples:**
* Google Workspace (Gmail, Docs, Drive)

* Microsoft 365 (Word, Excel Online)

* Dropbox, Salesforce

🎯 **Key Features:**
* No installation required

* Subscription-based pricing

* Automatic updates and maintenance

* Best for end-users and business.

Here is your .docx file containing the Cloud Service Models Comparison Table:

👉 Download Cloud_Service_Models_Comparison.docx

Cloud deployment models


these define how cloud services are made available to users and how the infrastructure is
owned, operated, and accessed. There are four main cloud deployment models, each suited to
different business needs and use cases:

1. Public Cloud

Definition: Services offered over the internet by third-party cloud providers.

Ownership: Owned and managed by external providers like AWS, Azure, or Google Cloud.

Accessibility: Available to the general public.

Cost: Pay-as-you-go; cost-effective with no infrastructure investment.

Scalability: High; easily scales up or down based on demand.

Security: Shared infrastructure may pose risks for sensitive data.


Use Case: Ideal for startups, testing environments, and general business

2. Private Cloud

Definition: A cloud infrastructure used exclusively by one organization.

Ownership: Managed internally or by a third party but used by a single organization.

Accessibility: Restricted to the organization through a private network.

Cost: Higher due to dedicated resources and management.

Scalability: Limited to internal resources unless hybrid is adopted.

Security: Very high; suitable for sensitive and regulated data.

Use Case: Best for enterprises requiring strong data control and compliance (e.g., banks,
hospitals).

3. Hybrid Cloud

Definition: A mix of public and private cloud environments.

Ownership: Combination of internal and third-party managed infrastructure.

Accessibility: Workloads can move between public and private clouds.

Cost: Balanced; allows cost-saving by using public cloud for less critical tasks.

Scalability: Very flexible; can leverage public cloud for additional capacity.

Security: Sensitive data can remain in private cloud; less sensitive in public.

Use Case: Suitable for businesses needing both control and flexibility.

4. Community Cloud

Definition: A cloud shared by organizations with similar needs or objectives.

Ownership: Shared infrastructure managed by the organizations or a provider.

Accessibility: Limited to the community of users.

Cost: Shared among the organizations, more economical than private cloud.
Scalability: Moderate; depends on the shared resource pool.

Security: Higher than public cloud; tailored for common compliance needs.

Use Case: Used by research groups, government bodies, or healthcare consortia with shared
requirements.

What are Cloud Service Platforms?


Cloud service platforms are frameworks provided by third-party vendors that deliver computing
services—such as servers, storage, databases, networking, software, and analytics—over the
internet (the “cloud”). These platforms eliminate the need for organizations to build and manage
physical IT infrastructure, offering instead flexible, scalable, and cost-effective resources on
demand.

There are three major models of cloud service platforms:


1. Infrastructure as a Service (IaaS)

Definition: IaaS offers basic computing resources such as virtual machines, storage, and
networks over the internet.

Purpose: It allows users to rent IT infrastructure instead of buying physical servers.

User Control: Users manage applications, data, middleware, and OS; the provider manages
hardware and virtualization.

Examples: Amazon EC2 (AWS), Microsoft Azure Virtual Machines, Google Compute Engine.

Best for: Developers and system admins who need control over infrastructure and flexibility in
managing workloads.

2. Platform as a Service (PaaS)

Definition: PaaS provides a ready-to-use platform with tools and services for developing, testing,
and deploying applications.

Purpose: It simplifies the development process by managing the underlying infrastructure and
software stack.

User Control: Users manage only the applications and data; providers handle OS, runtime,
servers, and storage.

Examples: Google App Engine, Microsoft Azure App Services, Heroku.


Best for: Developers focused on coding without worrying about system maintenance or
scalability.

3. Software as a Service (SaaS)

Definition: SaaS delivers software applications over the internet on a subscription basis.

Purpose: It provides fully functional software accessible via a web browser or mobile app.

User Control: Minimal control; users configure settings and use the application, while the
provider handles everything else.

Examples: Google Workspace (Docs, Gmail), Microsoft 365, Dropbox, Salesforce.

Best for: End-users needing quick access to applications without installation or maintenance.

Challenges ahead in cloud computing, with bold and underlined headings for
clarity
---

1. Security and Privacy

Protecting data in transit and at rest remains a major challenge.

Cloud environments are vulnerable to breaches, data leaks, and insider threats.

Organizations must ensure encryption, access control, and compliance with data privacy laws.
---

2. Downtime and Reliability

Cloud services can experience outages due to technical issues, cyberattacks, or natural
disasters.

Even short downtimes can disrupt operations for businesses relying on continuous access.

Dependence on the internet makes availability crucial.


---

3. Compliance and Legal Issues


Different countries and industries have strict regulations (e.g., GDPR, HIPAA).

Cloud providers may store data in multiple jurisdictions, causing legal complications.

Businesses must ensure compliance with relevant laws and audit requirements.
---

4. Limited Control and Flexibility

Using third-party cloud providers means giving up some control over infrastructure.

Customization options may be limited, especially in SaaS or PaaS models.

Migration and integration with existing systems can be complex


---

5. Data Migration and Portability

Moving data and applications from one provider to another (vendor lock-in) is difficult.

Migration can lead to compatibility issues, data loss, or service disruption.

Standardized APIs and formats are still evolving.


---

6. Performance and Latency Issues

Cloud performance can be affected by internet speed, distance to data centers, or network
congestion.

Applications needing real-time response (e.g., gaming, trading platforms) may face latency
challenges.

Edge computing is emerging to reduce these delays.


---

7. Cost Management and Optimization

Cloud costs can escalate quickly due to on-demand pricing models.

Unused or underused resources can lead to waste.

Businesses need tools and strategies to monitor, budget, and optimize cloud spending.
---
8. Skills Gap and Expertise

There is a shortage of professionals with cloud architecture, security, and DevOps skills.

Rapid changes in cloud technologies require continuous learning and training.

Hiring and retaining skilled personnel is becoming increasingly competitive.

---

9. Integration with Legacy Systems

Many organizations still use old on-premise systems that are not cloud-ready.

Integrating these systems with modern cloud platforms can be costly and time-consuming.

This hinders full cloud adoption for some enterprises.

---

10. Environmental Impact

Large-scale data centers consume significant energy.

Sustainability concerns are growing regarding the carbon footprint of cloud infrastructure.

Cloud providers are investing in greener solutions, but the challenge remains.

Introduction to Cloud Security

Cloud security refers to the set of policies, controls, procedures, and technologies that work
together to protect cloud-based systems, data, and infrastructure. It is a critical component of
cloud computing because sensitive data, applications, and services are hosted on external
servers and accessed over the internet.

As businesses move to cloud environments, security becomes more complex due to the shared
responsibility model between the cloud service provider and the customer. Cloud security
ensures confidentiality, integrity, and availability of data and services in the cloud.

Key Goals of Cloud Security:


Data Protection: Prevent unauthorized access, leakage, or loss of data stored in the cloud.

Compliance: Meet industry-specific standards and regulations (e.g., GDPR, HIPAA, ISO).

Identity & Access Management (IAM): Ensure that only authorized users can access specific
data and systems.

Threat Detection & Prevention: Monitor and defend against malware, ransomware, and other
cyber threats.

Business Continuity: Ensure data backup, disaster recovery, and high availability of services.

Why Cloud Security Matters:


Cloud environments are often targeted by attackers due to the large volumes of sensitive data
they host.

Misconfigurations, weak passwords, and lack of visibility are common issues that lead to
breaches.

Organizations must understand and manage their responsibilities under the shared security
model—where the provider secures the infrastructure, and the customer secures their data and
access.

***Cloud Security Concepts***


Cloud security concepts form the foundation of securing cloud environments. These concepts
guide how data, applications, and infrastructure are protected in cloud computing. Since cloud
environments are accessible via the internet and shared among many users, it's essential to
implement strong security practices to maintain **confidentiality, integrity, and availability (CIA)**
of resources.

Below are the key cloud security concepts:


***1. Shared Responsibility Model***

* **Definition:** Security in the cloud is a shared responsibility between the **cloud service
provider (CSP)** and the **customer**.
* **Provider's Role:** Secures the physical infrastructure, network, and host environment.
* **Customer's Role:** Manages access controls, data protection, and application-level security.
* **Importance:** Helps define boundaries of accountability and avoids security gaps.

---

***2. Identity and Access Management (IAM)***

* **Definition:** Controls **who** can access **what** in the cloud environment.


* **Includes:** User authentication, role-based access control (RBAC), multi-factor
authentication (MFA), and least privilege access.
* **Goal:** Ensure only authorized users have access to specific data and resources.

---

***3. Data Protection***

* **Definition:** Techniques used to secure data **at rest**, **in transit**, and **in use**.
* **Methods:** Encryption, tokenization, masking, and data loss prevention (DLP) tools.
* **Goal:** Protect sensitive data from breaches, leaks, or unauthorized access.

---
***4. Network Security***

* **Definition:** Securing the network infrastructure and traffic within the cloud.
* **Tools:** Firewalls, virtual private networks (VPNs), intrusion detection/prevention systems
(IDS/IPS), and segmentation.
* **Goal:** Prevent unauthorized access and reduce attack surface.

---

***5. Threat Detection and Monitoring***

* **Definition:** Continuous monitoring for abnormal or malicious activity.


* **Includes:** Security Information and Event Management (SIEM), threat intelligence, anomaly
detection, and logging.
* **Goal:** Detect threats early and respond quickly to incidents.

---

***6. Compliance and Legal Considerations***

* **Definition:** Adhering to regulations and standards relevant to your industry and region.
* **Examples:** GDPR, HIPAA, ISO/IEC 27001, SOC 2, etc.
* **Goal:** Ensure legal data handling and avoid penalties or violations.

---

***7. Business Continuity and Disaster Recovery (BC/DR)***

* **Definition:** Planning and preparing for service disruptions or data loss.


* **Components:** Regular data backups, failover systems, and recovery planning.
* **Goal:** Ensure systems and data remain available and recoverable after failures or attacks.

---

***8. Security Automation***

* **Definition:** Using tools and scripts to automate security tasks like patching, auditing, and
threat response.
* **Benefits:** Faster response time, reduced human error, and improved efficiency.
* **Tools:** Cloud-native security tools, DevSecOps pipelines, infrastructure as code (IaC) with
embedded security.
CSA Cloud Reference Model
The CSA Cloud Reference Model is a conceptual framework developed by the Cloud Security
Alliance (CSA). It helps organizations understand the relationships between different roles and
layers in a cloud computing environment and provides guidance for securing cloud services. It
emphasizes security responsibilities, control placement, and governance across cloud services.

Core Objectives of the Model:


Clarify roles and responsibilities in cloud computing.

Identify and place security controls properly.

Support risk management and compliance efforts.

Enable secure cloud adoption and governance.

Key Components of the CSA Cloud Reference Model:

1. Cloud Actors (Roles)


These are the main stakeholders in the cloud ecosystem:

Cloud Consumer: Uses cloud services (e.g., a business or individual).

Cloud Provider: Delivers cloud services (e.g., AWS, Azure, Google Cloud).

Cloud Auditor: Conducts security assessments and compliance checks.


Cloud Broker: Manages the use, performance, and delivery of cloud services across multiple
providers.

Cloud Carrier: Provides connectivity and transport for cloud services.

2. Cloud Delivery Models

IaaS (Infrastructure as a Service): Basic building blocks like servers, storage, and networking.

PaaS (Platform as a Service): Tools and platforms for building, testing, and deploying apps.

SaaS (Software as a Service): Fully functional applications accessible over the internet.

3. Cloud Deployment Models

Public Cloud: Services available to the general public.

Private Cloud: Used exclusively by one organization.

Hybrid Cloud: Combines public and private cloud setups.

Community Cloud: Shared among organizations with common goals.

4. Security and Risk Management

The model identifies security controls that should be applied across layers and roles.

It supports a shared responsibility model, helping organizations understand what they must
secure and what the provider secures.

It aligns with CSA’s Cloud Controls Matrix (CCM) for control mapping and risk assessment.

5. Governance and Compliance

Ensures organizations meet industry standards like ISO 27001, GDPR, HIPAA, etc.

Helps define policies, procedures, and accountability structures for cloud security.

Why It’s Important


Promotes clarity and consistency in cloud security.

Serves as a blueprint for building secure cloud strategies.

Aids in vendor selection, risk analysis, and architecture planning.


NIST Cloud Computing Reference Model

The NIST (National Institute of Standards and Technology) Cloud Computing Reference Model
is a standardized framework that defines and categorizes essential components, roles, and
characteristics of cloud computing. It was introduced in NIST Special Publication 800-145 and is
widely used by governments, industries, and organizations to guide secure and effective cloud
adoption.

The model provides clarity on how cloud services are delivered, who is involved, and how
responsibilities are divided across the system.

Core Objectives of the Model:


Establish a common vocabulary and conceptual understanding of cloud computing.

Provide a foundation for cloud security, governance, and risk management.

Facilitate the design, implementation, and evaluation of cloud-based systems.

1. Five Essential Characteristics of Cloud Computing


NIST defines five characteristics that are essential to any true cloud solution:

a. On-Demand Self-Service
Users can automatically provision computing capabilities (like servers, storage, or networking)
as needed, without human interaction with the provider.

Example: Launching a virtual server in AWS or Azure console on demand.

b. Broad Network Access


Services are available over the network and can be accessed via standard devices (e.g.,
desktops, laptops, smartphones, tablets).

Ensures accessibility from anywhere with internet connectivity.

c. Resource Pooling
Cloud providers pool computing resources to serve multiple users using a multi-tenant model.

Resources are dynamically assigned and reassigned according to user demand.

Users have no control or knowledge over the exact location of the resources.

d. Rapid Elasticity
Capabilities can be elastically provisioned and scaled outward or inward based on demand.

To the user, the available resources often appear unlimited.

e. Measured Service
Cloud systems automatically control and optimize resource use by leveraging a metering
capability.

This supports usage-based billing, similar to utilities (like electricity or water).

2. Cloud Service Models


NIST describes three primary service models:

a. Infrastructure as a Service (IaaS)


Provides raw computing resources such as virtual machines, storage, and networks.

Users are responsible for installing and managing their own OS, middleware, and apps.

Example: Amazon EC2, Microsoft Azure Virtual Machines.

b. Platform as a Service (PaaS)


Offers a platform for developers to build, deploy, and manage applications without managing the
underlying infrastructure.

Includes OS, development frameworks, databases, and web servers.

Example: Google App Engine, Azure App Services, Heroku.

c. Software as a Service (SaaS)


Delivers fully functional software applications via a browser or app, usually on a subscription
basis.
The provider manages everything, including application performance, updates, and security.

Example: Google Workspace, Salesforce, Dropbox.

3. Cloud Deployment Models


NIST outlines four models describing how cloud infrastructure is deployed:

a. Public Cloud
Owned and operated by third-party providers.

Resources are available to the general public or large industry groups.

Cost-effective, but may pose data privacy concerns.

b. Private Cloud
Exclusively used by a single organization.

Can be hosted on-premises or externally.

Offers greater control and security but is more expensive.

c. Hybrid Cloud
Combines two or more cloud infrastructures (public + private).

Enables workload portability, flexibility, and scalability.

Allows sensitive data to stay private while leveraging public cloud resources when needed.

d. Community Cloud
Shared among several organizations with common security, compliance, or policy concerns.

Managed by one or more organizations or a third party.

4. Cloud Roles (Actors)


The NIST model defines five key roles involved in a cloud ecosystem:

a. Cloud Consumer
Uses cloud services (IaaS, PaaS, or SaaS) to accomplish business tasks.

Examples: A business using Salesforce (SaaS) or deploying apps on AWS (IaaS).

b. Cloud Provider
Delivers cloud services and manages infrastructure and resources.
Examples: AWS, Google Cloud, Microsoft Azure.

c. Cloud Broker
Acts as an intermediary between cloud providers and consumers.

Helps manage service usage, performance, and cost optimization.

Can offer additional value-added services like integration and customization.

d. Cloud Carrier
Provides the networking and connectivity infrastructure to deliver cloud services.

Example: Internet service providers, telecom networks.

e. Cloud Auditor
Conducts independent assessments of cloud services.

Evaluates security controls, compliance, performance, and service quality.

Importance of the NIST Cloud Model


Promotes standardization and best practices across industries.

Clarifies roles and responsibilities, helping avoid misunderstandings.

Supports compliance with government and industry regulations.

Enables structured cloud adoption strategies with defined control layers.

You might also like