Professional Documents
Culture Documents
Cloud Security SN U9
Cloud Security SN U9
CLOUD SECURITY
CLOUD SECURITY
• It refers to the set of policies, technologies, controls and services which
protect data, applications and infrastructures in cloud computing
from threats (threat attacks)
• It is also called as cloud computing security
• It can be done without the cost of maintaining facilities and hardware
Goals
• Ensure the privacy of data across networks
• Control the access of users, devices and software
• Handle the unique cybersecurity concerns of businesses using multiple
cloud service providers (CSP)
General Security Concerns
• Trusting CSP’s security model
• Indirect administrator responsibility
• Loss of physical control
• Proprietary implementations can’t be examined
Shared Responsibility Model (SRM)
• Several organizations use 3rd party CSP like Google Cloud Platform
(GCP), Microsoft Azure, Amazon Web Services (AWS)
• This SRM model outlines the security responsibilities of cloud providers
and customers based on each type of cloud service – Software as a
Service (SaaS), Platform as a Service (PaaS), Infrastructure as a
Service (IaaS)
S.N Service Provider Responsibility User Responsibility
Type
1. SaaS Application security Users and network security
2. Pass Platform security including all - Security of applications
hardware and software developed on the platform
1
| Security in Cloud 24 |
2
| Security in Cloud 24 |
3
| Security in Cloud 24 |
6
| Security in Cloud 24 |
8
| Security in Cloud 24 |
9
| Security in Cloud 24 |
10
| Security in Cloud 24 |
application firewalls,
API gateways
5. Technologies Encryption algorithms – Authentication
(AES, RSA), SSL/TSL protocols, IAM
protocols protocols, API security
tools, web application
firewalls.
3. CLOUD VM SECURITY
12
| Security in Cloud 24 |
Virtualization
• Process of creating a software-based or virtual version of a computer
with dedicated amounts of CPU, memory, disk storage that are
accessed from a physical host computer
▪ Here host computer can be your personal computer or remote
server (like a server in a CSPs data center)
Virtualization Machine
• Process of creating a virtual version of something or software based –
whether that can be compute, networking, storage, servers or apps is
called virtualization
• Virtualization is actually a process. So, machines made using
virtualization is called as virtual machines or VMs.
Importance of Hypervisor
• Generally multiple virtual machines can run simultaneously on a single
physical computer.
• These virtual machines are controlled and managed by a hypervisor
• It is a software which is used to integrate the physical hardware and
the VM’s virtual hardware.
13
| Security in Cloud 24 |
14
| Security in Cloud 24 |
15