More Related Content Similar to Cloud Security - Kloudlearn (20) Cloud Security - Kloudlearn1. Online course offering
Cloud Security
“Cloud is about how you do
computing, not where you do
computing.”
- Paul Maritz, CEO ofVMware
© KloudLearn www.kloudlearn.com
2. Learning
Objectives
© KloudLearn www.kloudlearn.com 2
What is Cloud Security (Definition)
Trends associated with Cloud Security
How DoYou Manage Security in the Cloud?
Why is Cloud Security Important
Cloud Security vsTraditional Security
What are the Challenges
What are end-user’s expectations from Cloud
Security
Some Do's and Don’ts When Using Cloud and its
Services
QuizTime: Let’s Have Fun
?
3. What is Cloud Security (Definition)
© KloudLearn www.kloudlearn.com 3
Cloud security involves the
procedures and technology
that secure cloud
computing environments
against both external and
insider cybersecurity
threats.
Cloud security, also known
as cloud computing
security, consists of a set of
policies, controls,
procedures and
technologies that work
together to protect
cloud-based systems, data,
and infrastructure.
Cloud computing, which is
the delivery of information
technology services over the
internet, has become a must
for businesses and
governments seeking to
accelerate innovation and
collaboration.
4. Trends associated with Cloud Security
● Increasing Partnerships between CSPs and Security Solution Providers Expected.
● Increasing Emergence of Cloud Service-specific Security Solution Providers.
● Identity Management and Encryption to Remain the Top Cloud Security Solutions Offered.
● Increasing Availability of Cloud Security Solutions for Small and Medium-sized Businesses (SMBs).
● Emergence of Strong Cloud Security Standard and Guidelines.
© KloudLearn www.kloudlearn.com 4
5. How DoYou Manage Security in the Cloud?
© KloudLearn www.kloudlearn.com 5
Source: https://phoenixnap.com/blog/what-is-cloud-security
6. How DoYou Manage Security in the Cloud? contd.
© KloudLearn www.kloudlearn.com 6
Firewalls:
It’s like mainstay of cloud architecture.
Access controls:
Protect data by allowing you to set access lists for
different assets.
Data Security:
Methods include virtual private networks, encryption,
or masking.
Data masking:
Encrypts identifiable information, such as names.
Threat intelligence:
spots security threats and ranks them in order of
importance.
Disaster recovery:
key to security since it helps you recover data that are
lost or stolen.
7. INCREASING USAGE OF CLOUD SERVICES
Why is Cloud Security Important ?
© KloudLearn www.kloudlearn.com 7
Increasing Usage of Cloud Services in Non-traditional Sectors.
Growing Adoption of Cloud Services in Government Departments.
Rise in Cloud Service-specific Attacks
Growing Usage of Cloud Services for Critical Data Storage.
Rise in Employee Mobility.
8. Cloud Security vs Traditional Security
© KloudLearn www.kloudlearn.com 8
Source: https://phoenixnap.com/blog/what-is-cloud-security
9. What are the challenges?
● CSPs believe that Security is End-users’ Issue
● CSP is responsible for some aspects of security.
● Shared Responsibility Model
● Security in the Cloud - CSP
● Security of the Cloud - Customer /You
● Lack of Awareness about Cloud Security
● Tendency of "over trust" in Cloud Providers
● Threats from Insider
● Lack of Proper Cloud Security Standards
● Complicated Interfaces and APIs
© KloudLearn www.kloudlearn.com 9
10. What are end-user’s expectations from Cloud Security
● Strong Overall Security Offered
● Suite of Security Solutions Offered
● Encryption Key Management Features Offered
● Availability of Fine Granular Control
© KloudLearn www.kloudlearn.com 10
11. Some Do's and Don’ts When Using Cloud and its Services
© KloudLearn www.kloudlearn.com 11
● Do strategize your cloud migration
● Do include automated testing
● Do consider containers
● Do get trained and train your employees
too
● Do decouple your applications from
physical resources
● Do review the costs before migration
● Do remember risk and compliance
Let’s Check Out the Do’s First Now, what can you Avoid
● Don’t forget about security
● Don’t relocate many applications into the
cloud
● Don’t be too selective
● Don’t transfer everything to the cloud
● Don’t start the project with rigid views of
the outcome
● Don’t overlook the importance of a
governance infrastructure
12. Key Takeaways
● Don't think Cloud will protect us whatever we throw on that
● Remember we're always responsible for "Security in the cloud"
● Misconfigurations are the biggest threat than anything, stick to best practices
● Make sure to follow respective Benchmarks
● A single leak of Secrets can compromise your entire Cloud Security
● Eg. are Uber Leak, Famous Twitter Hack of 2020 etc
● Understand different types of clouds and your role
● Shared Responsibility model
● CSPs are not solely responsible for securing data, we're also
● Legacy tools and architectures don’t work on cloud security issues
● Look for automation when scaling in the cloud
© KloudLearn www.kloudlearn.com 12
14. By ensuring enough resources to make
information available for all users
By preventing unauthorized changes
By regularly backing up the information
By restricting access to information
© KloudLearn www.kloudlearn.com
How can confidentiality
of information be
achieved?
14
15. Increased/shared attack surface
Configuration and vulnerability management
Identity management
Administrative access control
© KloudLearn www.kloudlearn.com
Which of the following
risks is actually
increased by
cloud-specific security
technologies?
15
16. © KloudLearn www.kloudlearn.com
Google App Engine
(often referred to as
GAE or simply App
Engine) ____.
16
Is a Platform as a Service
Is a Software as a Service
Is a Infrastructure as a Service
All of the above
18. © KloudLearn www.kloudlearn.com
Point out the wrong
statement:
18
You can use proxy and brokerage services to
separate clients from direct access to shared
cloud storage
Any distributed application has a much greater
attack surface than an application that is
closely held on a Local Area Network
Cloud computing don’t have vulnerabilities
associated with Internet applications
All of the mentioned
21. AType 1 hypervisor also controls patching of
its hosted virtual machines ensure they are
always secure.
AType 1 hypervisor is tied directly to the bare
metal and only runs with code necessary to
perform its specific mission.
AType 1 hypervisor performs hardware-level
encryption for tighter security and efficiency.
AType 1 hypervisor only hosts virtual machines
with the same operating systems as the
hypervisor.
© KloudLearn www.kloudlearn.com
Why does aType 1
hypervisor typically
offer tighter security
controls than aType 2
hypervisor?
21
22. SaaS
PaaS
IaaS
All of the above
© KloudLearn www.kloudlearn.com
Identify a cloud service
model which can be
used for developing,
testing and managing
applications?
22
23. Authentication and authorization; Control of
access
Cloud storage services; Policies
Integrity of data and Clean-up Phase; Compliance
Infrastructure; Cloud ingress
© KloudLearn www.kloudlearn.com
The main two security
aspects you receive
along with cloud is ___
and ___?
23
24. ThankYou
© KloudLearn www.kloudlearn.com 24
KloudLearn, Inc. is headquartered in SiliconValley, California. Our mission is to help
enterprises provide an engaging and impactful learning experience that improves
business performance.We provide the industry’s most modern LMS (Learning
Management System). For more information visit us at www.kloudlearn.com or reach
out to us at info@kloudlearn.com