Unit 4
Unit 4
Unit 4
Cloud Security
Cloud Security Concepts
• Securing the Cloud: Cloud Information security
fundamentals, Cloud security services, Design principles,
Policy Implementation
• Cloud Computing Security Challenges, Cloud Computing
Security Architecture .
• Legal issues in cloud Computing.
• Data Security in Cloud: Business Continuity and Disaster
Recovery , Risk Mitigation.
• Understanding and Identification of Threats in Cloud
• SLA-Service Level Agreements, Trust Management
What is cloud security?
• Cloud security is the set of control-based security measures and
technology protection, designed to protect online stored resources
from leakage, theft, and data loss.
• Protection includes data from cloud infrastructure, applications, and
threats. Security applications uses a software the same as SaaS
(Software as a Service) model.
• Cloud security refers to protecting data stored online via cloud
computing environments (instead of data centers) from theft,
deletion, and leakage.
• There are many protective methods that help secure the cloud;
• These measures include access control, firewalls, penetration testing,
obfuscation, tokenization, virtual private networks (VPN), and not
using public internet connections.
Benefits of Cloud Security System
Cloud-based security systems benefit the business by:
• Protecting the Business from Dangers
• Protect against internal threats
• Preventing data loss
• Top threats to the system include Malware, Ransomware, and
• Break the Malware and Ransomware attacks
• Malware poses a severe threat to the businesses.
• Authentication Attacks
Dictionary Attacks
• A select resource needs to move to the cloud and analyze its sensitivity to
risk.
• Consider cloud service models such as IaaS, PaaS,and These models
require the customer to be responsible for Security at different service
levels.
• Consider the cloud type, such as public, private, community, or
• Understand the cloud service provider's system regarding data storage and
its transfer into and out of the cloud.
• The risk in cloud deployment mainly depends upon the service models and
cloud types.
Cloud Computing Security Architecture
Main Cloud Security Issues and Threats
9. Denial of Service Attacks
1. Misconfiguration 10. Data Loss/Leakage
2. Unauthorized Access 11. Data Privacy/Confidentiality
3. Insecure Interfaces/APIs 12. Accidental Exposure of
4. Hijacking of Accounts Credentials
13. Incident Response
5. Lack of Visibility
14. Legal and Regulatory
6. External Sharing of Data Compliance
7. Malicious Insiders 15. Data
8. Cyberattacks Sovereignty/Residence/Control
16. Protecting the Cloud
Service level agreements in Cloud Computing
• A Service Level Agreement (SLA) is the bond for the performance of
the negotiation between a cloud service provider and a client.
• Earlier, in cloud computing, all service level agreements were
negotiated between a customer and a service consumer.
• Particular aspects of the service, such as quality, availability,
responsibilities are agreed upon between the service provider and
the service user.
• It defines:
• The metrics used to measure the level of service provided.
• Remedies or penalties resulting from failure to meet the promised
service level expectations
Service level agreements usually specify certain
parameters, which are mentioned below:
• Availability of the Service (uptime)
• Latency or the response time
• Service components reliability
• Each party accountability
• Warranties
Types of SLA
• The selection of the types of SLA in an organization depends on many
significant aspects.
Components of SLA
• Document overview
• Strategic goals
• Description of services
• Exclusions
• Service performance
• Redressing
• Stakeholders
• Security
• Risk management and disaster recovery
• Service tracking and reporting
• Periodic review and change processes
• Termination process
Common Metrics of SLA
• Abandonment Rate: Percentage of calls abandoned while waiting to be answered.
• ASA(Average Speed to Answer): Average time t takes for a call to be answered by the
service desk.
• Resolution time: The time it takes for an issue to be resolved once logged by the service
provider.
• Error rate: The percentage of errors in a service, such as coding errors and missed
deadlines.
• TSF(Time Service Factor): Percentage of calls answered within a definite timeframe.
• FCR(First-Call Resolution): A metric that measures a contact center's ability for its agents to
resolve a customer's inquiry or problem on the first call or contact.
• TAT(Turn-Around-Time): Time is taken to complete a particular task.
• TRT(Total Resolution Time): Total time is taken to complete a particular task.
• MTTR(Mean Time To Recover): Time is taken to recover after an outage of service.
• Security: The number of undisclosed vulnerabilities, for example. If an incident occurs,
service providers should demonstrate that they've taken preventive measures.
Risk in Cloud Computing