SlideShare a Scribd company logo
Cloud Computing -
understanding security risk
and management
The aim of this paper is to make cloud service consumer aware about cloud
computing fundamentals, its essential services, service models and
deployment options. This also through light on security and risk
management piece of CSA trusted cloud reference architecture, cloud
control matrix and notorious nine threats and ENISAs top risks to cloud
computing. At the end it talks about certifications and attestation part.
Author –
Shamsundar
Machale (CISSP)
Fig.1 NIST Visual Model of Cloud Computing Definition
Any cloud should demonstrate the certain essential characteristics to
get full benefits of cloud. Any missing essential characteristic would
not give you 100% benefit from cloud computing.
Whatever is not your core, outsource it. Similarly maintaining capex IT
infrastructure, information is not your core so outsource it to some
specialized agency i.e. Cloud Service Provider (CSP)
Multi-tenancy is the fundamental used in resource pooling but keep in
mind that resource pooling is not limited to your server and storage, it
is extended to network connectivity, physical security, administration
of cloud services and last but not least is your facility space. CSP uses
the same infrastructure to provide services to multiple clients from
same or different geographies. This provides great benefit to Cloud
consumer (CC) by not having direct capital investment and pay per use
model of cloud. Only required amount of compute, storage etc. are
provisioned and no extra investment is done by CC. At the same time
resource pooling might become huge risk if attacker uses shared
pooled resource to steal sensitive information processed by CC. this is
possible through attacks such as guest hopping attack or side channel
attack to capture cryptographic keys.
Second essential characteristic is on-demand self-service. The CC
should be able to do the provisioning / de-provisioning of computing
What is definition of Cloud
Computing?
Cloud computing is model for
enabling continent, on-demand
network access to a shared pool
of configuration computing
resources (e.g. networks,
servers, storage, applications,
and services) that can be rapidly
provisioned and released with
minimal management efforts or
services provider interaction
The above NIST definition
defines in what way you can
deploy cloud, what service
offerings you can make available
and what are the essential
characteristics of cloud
Fig. 1 represents the visual
model of above NIST cloud
computing definition.
Let’s take a deeper look into the
definition.
resources by themselves with minimum administrative involvement from CSP. The lead time required
doing the provisioning and de-provisioning should be reduced significantly.
Rapid elasticity means CC should be able to do expansion and contraction of services as per their
requirements with immediate effect and it will be charged on pay per usages policy. There should not be
any locking CSP side while reducing the required level of resources.
As there is trend of BYOD and consumerization, people want to access applications locations and end
device independent which essentially means there should not be any restriction on your work location,
it can be work from office, home or cafe and how do you access it, is it through your desktop, laptop,
smartphone or tablet.
Lastly CC should be able to measure services offered by CSP through SLA.
Let’s take a look at service offering models; there are typically three kind of service offering models as
below
IaaS (Infrastructure as a Service) – Here you will get only infrastructure like compute and storage. This is
nothing but plain vanilla virtual machine with operating system e.g. Amazon EC2 and S3, Rackspace etc.
PaaS (Platform as a Service) – Here you expect little bit more from CP which will help in development of
applications on provided infrastructure. It includes development tools, configuration management and
deployment platforms such as Microsoft Azure, Force and Google App engine.
SaaS (Software as a Service) – this is full package of application, CC has to just use it and don’t worry
how and where it is running, who is managing the show? It is pure service such as online CRM system
(Salesforce.com), online office tools (Office 365), online content filtering and messaging etc.
As you move from IaaS to SaaS CC loses control on the services whereas CSP gains more control which is
depicted in below figure.
Fig-2
Now we will look at third tier of cloud computing definition which is nothing but deployment options. As
you seen in the above visual model there are four ways in which cloud services can be deployed.
Public Cloud – Available publicly, multiple customers can avail same services with different SLA
commitments
Private Cloud – Build specifically for single customer and available to only one customer
Community Cloud – Services can be offered to same of customers which are forming community such as
cloud services for power generation companies, cloud services for manufacturing industry etc.
Hybrid Cloud – Combination of any of the above
Below table provides more information about the deployment models
Fig.3
As mentioned above security of cloud services is joint responsibility
of CC and CSP which purely depends on the service offering.
As per CSA’s “ Trusted cloud Reference Architecture version 2.0 “,
Security and Risk Management is one of the key building block to
focus if you want to build trusted cloud
Fig.4 CSA Trusted cloud security reference arcthitecture
This block basically talks about below domains.
Governance Risk and Compliance - how are you going to manage
governance, risk, audit, vendor, policy and awareness around CSP
support staff?
InfoSec Management – capability management, risk portfolio, risk
dashboard, and residual risk management
Privilege Management Infrastructure – This purely focuses around
how effectively you manage the identities in the cloud. How secure
is your authentication service? How do you manage authorization
and accountability of identities in the cloud? How privilege identities
are handled?
Threat and Vulnerability Management - How do you keep
environment vulnerability free, up to date with latest patches and
assurance on compliance testing to CC.
What is Security for Cloud
Computing?
As per CSA, Security
controls in cloud
computing are, for the
most part, no different
than security controls in
any IT environment.
However, because of the
cloud service models
employed, the operational
models, and the
technologies used to
enable cloud services,
cloud computing may
present different risks to
an organization than
traditional IT solutions.
This means we have to
focus on defense in depth
approach for security in
cloud computing
The focus of defense in
depth approach is always a
data at center and
different type of controls
such as Administrative,
Technical and Physical are
wrapped around data.
For example physical
security has the same
importance in both
traditional data center and
cloud based datacenter.
Infrastructure Protection Services - How do you protect your applications, operating systems on
servers, databases, network and end points. What kind of technical controls are put around these? Do
you have perimeter firewall at network level, whether servers are locked down as per hardening
guidelines, do you have Anti-virus, HIPS / HIDS installed at the end points, logging and monitoring
enabled, application level firewall and web content filtering
Data Protection – how well are you managing the data lifecycle, what controls are placed to prevent the
Data loss, how are you protecting your intellectual properties and how effective is your cryptographic
service management.
Policies and Standards – Have you defined information security policies, guidelines based on different
industry standards like ISO 27001. Whether operational security baseline and standard operating
procedures defined and followed within the organization. Whether asset / data classification guidelines
are defined and practiced within team.
CSA has defined the Cloud Controls Matrix which provides fundamental security principles to guide
cloud vendors and to assist cloud customers in assessing the overall security risk of a cloud provider. The
latest version of Cloud Controls Matrix is CCM v3.0.1
As per this control matrix there are 133 controls divided into 16 domains of CSA cloud security.
Fig.5 CCMv3.0.2 Domains
Risk Management is one of the important aspect of cloud computing. There is no different strategy for
management of risk in the cloud. You have to follow the conventional approach of performing the risk
assessment based on certain framework and management of these risk either through risk mitigation by
use of certain controls, transfer, avoid or accept the risk. As per ENISA’s “ Cloud Computing Benefits,
risks and recommendations for information security Rev.B-2012 ” document cloud risks are classified
into three categories “Policy and Organizational Risks”, “Technical Risks”, and “Legal Risks”
Below figure represents the top rated risk identified by ENISA based on the probability and impact of the
risk.
Fig.6 ENISA top security risks to cloud computing
If you refer to below table which list down “ The Notorious Nine – Cloud Computing Top Threats in
2013” you will find certain risk / threats are common in both the documents such as Malicious Insider /
Cloud Provider Malicious Insider, shared technology issue / isolation failure, insecure APIs /
Management interface compromise
Fig.7 – Notorious Nine Threats to Cloud Computing
Data Breaches Data Loss
Account
Hijacking
Insecure APIs
Denial of
Service
Malicious
Insiders
Abuse of
Cloud Services
Insufficient
Due Diligence
Shared
Technology
Issues
Security Certification and Attestations – CSPcan provide the assurance to CC on current compliance level
with respect to different standards, legal and regulatory requirements through certain security
certifications and attestations.
Below figure provides the security certifications obtained by different CSPs. This is just a reference and
CC is kidnly reuquested to obtain list of current certifications during evaluation of CSP
Fig.8 – Security Certifications and Attestations
Conclusion - Cloud computing is double edged sword which provides good amount of
benefits but only if implemented properly considering all security, governance, privacy and
legal requirements. Risk assessment and due diligence would be the key for cloud
consumers to make their case as success story.
References –
“CSA Trusted cloud Reference Architecture version 2.0”
“CSA Cloud Controls Matrix, CCM v3.0.1”
“The Notorious Nine – Cloud Computing Top Threats in 2013”
ENISA’s “Cloud Computing Benefits, risks and recommendations for information security Rev.B-2012”
The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014
END OF DOCUMENT

More Related Content

What's hot

Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
Sam Bowne
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Siddiq Abu Bakkar
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
Maganathin Veeraragaloo
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
Michael Torres
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
cloud computing 5.pptx
cloud computing 5.pptxcloud computing 5.pptx
cloud computing 5.pptx
Jatin673232
 

What's hot (20)

Cloud security
Cloud security Cloud security
Cloud security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
cloud computing 5.pptx
cloud computing 5.pptxcloud computing 5.pptx
cloud computing 5.pptx
 

Viewers also liked

Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
Padma Jella
 
Cloud Computing Powerpoint
Cloud Computing PowerpointCloud Computing Powerpoint
Cloud Computing Powerpointthomaslipkin
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
Druva
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
Brian K. Dickard
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
William Mann
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (12)

Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Cloud Computing Powerpoint
Cloud Computing PowerpointCloud Computing Powerpoint
Cloud Computing Powerpoint
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Cloud computing understanding security risk and management

Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
Prateek Soni
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
Caner KAYA
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
IOSR Journals
 
Cloud_computing Notes.docx
Cloud_computing Notes.docxCloud_computing Notes.docx
Cloud_computing Notes.docx
Bhavana Sangamnerkar
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
Dr. Radhey Shyam
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 

Similar to Cloud computing understanding security risk and management (20)

Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Cloud_computing Notes.docx
Cloud_computing Notes.docxCloud_computing Notes.docx
Cloud_computing Notes.docx
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Cloud computing understanding security risk and management

  • 1. Cloud Computing - understanding security risk and management The aim of this paper is to make cloud service consumer aware about cloud computing fundamentals, its essential services, service models and deployment options. This also through light on security and risk management piece of CSA trusted cloud reference architecture, cloud control matrix and notorious nine threats and ENISAs top risks to cloud computing. At the end it talks about certifications and attestation part. Author – Shamsundar Machale (CISSP)
  • 2. Fig.1 NIST Visual Model of Cloud Computing Definition Any cloud should demonstrate the certain essential characteristics to get full benefits of cloud. Any missing essential characteristic would not give you 100% benefit from cloud computing. Whatever is not your core, outsource it. Similarly maintaining capex IT infrastructure, information is not your core so outsource it to some specialized agency i.e. Cloud Service Provider (CSP) Multi-tenancy is the fundamental used in resource pooling but keep in mind that resource pooling is not limited to your server and storage, it is extended to network connectivity, physical security, administration of cloud services and last but not least is your facility space. CSP uses the same infrastructure to provide services to multiple clients from same or different geographies. This provides great benefit to Cloud consumer (CC) by not having direct capital investment and pay per use model of cloud. Only required amount of compute, storage etc. are provisioned and no extra investment is done by CC. At the same time resource pooling might become huge risk if attacker uses shared pooled resource to steal sensitive information processed by CC. this is possible through attacks such as guest hopping attack or side channel attack to capture cryptographic keys. Second essential characteristic is on-demand self-service. The CC should be able to do the provisioning / de-provisioning of computing What is definition of Cloud Computing? Cloud computing is model for enabling continent, on-demand network access to a shared pool of configuration computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management efforts or services provider interaction The above NIST definition defines in what way you can deploy cloud, what service offerings you can make available and what are the essential characteristics of cloud Fig. 1 represents the visual model of above NIST cloud computing definition. Let’s take a deeper look into the definition.
  • 3. resources by themselves with minimum administrative involvement from CSP. The lead time required doing the provisioning and de-provisioning should be reduced significantly. Rapid elasticity means CC should be able to do expansion and contraction of services as per their requirements with immediate effect and it will be charged on pay per usages policy. There should not be any locking CSP side while reducing the required level of resources. As there is trend of BYOD and consumerization, people want to access applications locations and end device independent which essentially means there should not be any restriction on your work location, it can be work from office, home or cafe and how do you access it, is it through your desktop, laptop, smartphone or tablet. Lastly CC should be able to measure services offered by CSP through SLA. Let’s take a look at service offering models; there are typically three kind of service offering models as below IaaS (Infrastructure as a Service) – Here you will get only infrastructure like compute and storage. This is nothing but plain vanilla virtual machine with operating system e.g. Amazon EC2 and S3, Rackspace etc. PaaS (Platform as a Service) – Here you expect little bit more from CP which will help in development of applications on provided infrastructure. It includes development tools, configuration management and deployment platforms such as Microsoft Azure, Force and Google App engine. SaaS (Software as a Service) – this is full package of application, CC has to just use it and don’t worry how and where it is running, who is managing the show? It is pure service such as online CRM system (Salesforce.com), online office tools (Office 365), online content filtering and messaging etc. As you move from IaaS to SaaS CC loses control on the services whereas CSP gains more control which is depicted in below figure. Fig-2
  • 4. Now we will look at third tier of cloud computing definition which is nothing but deployment options. As you seen in the above visual model there are four ways in which cloud services can be deployed. Public Cloud – Available publicly, multiple customers can avail same services with different SLA commitments Private Cloud – Build specifically for single customer and available to only one customer Community Cloud – Services can be offered to same of customers which are forming community such as cloud services for power generation companies, cloud services for manufacturing industry etc. Hybrid Cloud – Combination of any of the above Below table provides more information about the deployment models Fig.3
  • 5. As mentioned above security of cloud services is joint responsibility of CC and CSP which purely depends on the service offering. As per CSA’s “ Trusted cloud Reference Architecture version 2.0 “, Security and Risk Management is one of the key building block to focus if you want to build trusted cloud Fig.4 CSA Trusted cloud security reference arcthitecture This block basically talks about below domains. Governance Risk and Compliance - how are you going to manage governance, risk, audit, vendor, policy and awareness around CSP support staff? InfoSec Management – capability management, risk portfolio, risk dashboard, and residual risk management Privilege Management Infrastructure – This purely focuses around how effectively you manage the identities in the cloud. How secure is your authentication service? How do you manage authorization and accountability of identities in the cloud? How privilege identities are handled? Threat and Vulnerability Management - How do you keep environment vulnerability free, up to date with latest patches and assurance on compliance testing to CC. What is Security for Cloud Computing? As per CSA, Security controls in cloud computing are, for the most part, no different than security controls in any IT environment. However, because of the cloud service models employed, the operational models, and the technologies used to enable cloud services, cloud computing may present different risks to an organization than traditional IT solutions. This means we have to focus on defense in depth approach for security in cloud computing The focus of defense in depth approach is always a data at center and different type of controls such as Administrative, Technical and Physical are wrapped around data. For example physical security has the same importance in both traditional data center and cloud based datacenter.
  • 6. Infrastructure Protection Services - How do you protect your applications, operating systems on servers, databases, network and end points. What kind of technical controls are put around these? Do you have perimeter firewall at network level, whether servers are locked down as per hardening guidelines, do you have Anti-virus, HIPS / HIDS installed at the end points, logging and monitoring enabled, application level firewall and web content filtering Data Protection – how well are you managing the data lifecycle, what controls are placed to prevent the Data loss, how are you protecting your intellectual properties and how effective is your cryptographic service management. Policies and Standards – Have you defined information security policies, guidelines based on different industry standards like ISO 27001. Whether operational security baseline and standard operating procedures defined and followed within the organization. Whether asset / data classification guidelines are defined and practiced within team. CSA has defined the Cloud Controls Matrix which provides fundamental security principles to guide cloud vendors and to assist cloud customers in assessing the overall security risk of a cloud provider. The latest version of Cloud Controls Matrix is CCM v3.0.1 As per this control matrix there are 133 controls divided into 16 domains of CSA cloud security. Fig.5 CCMv3.0.2 Domains Risk Management is one of the important aspect of cloud computing. There is no different strategy for management of risk in the cloud. You have to follow the conventional approach of performing the risk assessment based on certain framework and management of these risk either through risk mitigation by use of certain controls, transfer, avoid or accept the risk. As per ENISA’s “ Cloud Computing Benefits, risks and recommendations for information security Rev.B-2012 ” document cloud risks are classified into three categories “Policy and Organizational Risks”, “Technical Risks”, and “Legal Risks”
  • 7. Below figure represents the top rated risk identified by ENISA based on the probability and impact of the risk. Fig.6 ENISA top security risks to cloud computing If you refer to below table which list down “ The Notorious Nine – Cloud Computing Top Threats in 2013” you will find certain risk / threats are common in both the documents such as Malicious Insider / Cloud Provider Malicious Insider, shared technology issue / isolation failure, insecure APIs / Management interface compromise Fig.7 – Notorious Nine Threats to Cloud Computing Data Breaches Data Loss Account Hijacking Insecure APIs Denial of Service Malicious Insiders Abuse of Cloud Services Insufficient Due Diligence Shared Technology Issues
  • 8. Security Certification and Attestations – CSPcan provide the assurance to CC on current compliance level with respect to different standards, legal and regulatory requirements through certain security certifications and attestations. Below figure provides the security certifications obtained by different CSPs. This is just a reference and CC is kidnly reuquested to obtain list of current certifications during evaluation of CSP Fig.8 – Security Certifications and Attestations Conclusion - Cloud computing is double edged sword which provides good amount of benefits but only if implemented properly considering all security, governance, privacy and legal requirements. Risk assessment and due diligence would be the key for cloud consumers to make their case as success story.
  • 9. References – “CSA Trusted cloud Reference Architecture version 2.0” “CSA Cloud Controls Matrix, CCM v3.0.1” “The Notorious Nine – Cloud Computing Top Threats in 2013” ENISA’s “Cloud Computing Benefits, risks and recommendations for information security Rev.B-2012” The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014 END OF DOCUMENT