SlideShare a Scribd company logo
CLOUD COMPUTING
- Dharmalingam S
Note: Its only for studying and knowledge sharing purpose
CLOUD .?
Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources that can be rapidly
provisioned and released with minimal management
effort.
TRADITIONAL IT CLOUD
ARCHITECTURAL BLOCK
BASIC SERVICES
BUILDING CLOUD ENVIRONMENT
 Heterogeneous System support.
 Service Management
 Dynamic Workload and Resource
Management
 Reliabilty, Availability and Security
 Integartions with Existing data Center management
tools
 Visibility and reporting
 Cloud must be a converged infrastructure – Supports
DR, Elasticity, Avoid Single point of failure.
 There has to be fully automated orchestration of
service management and software distribution
across the converged infrastructure
CURRENT CLOUD SETUP:
CLOUD SECURITY
 Data breaches.
 Multi-Factor authentication and Encryption of data.
 Insufficient identity, Credential and Access
management
 Weak password
 Identity solution between the customers
 Cryptographic keys
 Any centralized storage mechanism containing data
secrets (e.g. passwords, private keys, confidential
customer contact database) is an extremely high-value
target for attackers
 Insecure Interfaces and APIs
 System Vulnerabilities
 Kernel, System libraries and application tools- put the
security of all services and data significant risks
 Bugs are everywhere
 Solution - Vulnerability scanning, secuirty patches or
upgrades. Secure design and architecture can lessen
the chances of attacker taking full control of every part
of an information system .
 Heartbleed, Shellshock
 Account Hijacking
 Phising, fraud, reuse of passwords.
 Organizations should look to prohibit the sharing of
account credentials among user services.
 Amazon systems were used to run Zeus Botnodes
 Malicious Insiders
 Advanced Persistent Threats
 Spearphishing, direct hacking systems, delivering
attack code through USB devices, penetration through
partner networks and use of unsecured or third-party
networks are common points of entry for APTs.
 Data Loss
 Insufficient Due Diligence
 Good Roadmap and Checklist for due diligence for evaluating
technologies
 An organization that rushes to adopt cloud technologies and
choose CSPs without performing due diligence exposes itself to a
myriad of commercial, financial, technical, legal and compliance
risks that jeopardize its success. Amazon AWS experience an
outage, due to accidental deletion of information that controls load
balancing.
 Nirvanix cloud storage specialist hosted data for IBM, DELL went
bankruptcy for the above reasons.
 Facebook faced issues after buying M&A.
 Denial of Service
 Shared Technology Vulnerabilities
PHYSICAL SECURITY
• The elements of physical security are also a key element in
ensuring that data center operations and delivery teams can
provide continuous and authenticated uptime of greater than
99.9999%
• Physical access control and monitoring, including 24/7/365
onsite security, biometric hand geometry readers inside “man
traps,” bullet-resistant walls, concrete bollards, closed-circuit
TV (CCTV) integrated video, and silent alarms.
• Environmental controls and backup power
• Policies, processes, and procedures
NETWORK SECURITY
• Denial of Service: .
DNS Hacking, Routing Table “Poisoning”, XDoS attacks
o syn cookies
o Connection limiting
o Internal bandwidth maintained
• Port Scanning
o Port scans are violation of Acceptable Use Policy(AUP)
• Man in the Middle Attack: To overcome it always use SSL
• IP Spoofing: Spoofing is the creation of TCP/IP packets using
somebody else's IP address.
o Host based firewall infrastructure
o Infrastructure will not permit an instance to send traffic with a source IP
or MAC address other than its own.
SECURITY IN THE MIDDLEWARE
It supports the Security groups, where we can define our
own security groups and assign ACLs
The firewall can be configured in groups permitting
different classes of instances to have different rules for
ex) webserver
http –port 80
https-port 443
SSH –port 22
-- IAM & Certificates based communication between
cloud components.
CREDENTIAL MANAGEMENT
• Access Credentials
o Access Keys
o X.509 certificates
o Key pairs
• Sign-In Credentials
o Email Address (User Name) and Password
o Account Identifiers
• Account Identifiers
o Account ID
o Canonical ID
EC2 SECURITY
• Host OS
o Built on bastion host
o Cryptographically strong SSH keys to access bastion host
o Access are logged and routinely audited
• Guest OS
o Virtual instances are controlled by customer
o Customers have full root access and administrative
controls
o Customers use token or key based authentication
EC2 SECURITY
Firewall:
 Set with default as deny mode
 Requires customers X.509 certificate and keys to
authorize change
API
 Calls to launch and terminate instances are signed
by X.509 certificate/secret Access keys
 API calls are encrypted in transit with SSL
SECURITY SOLUTIONS
-
WHAT WE ACHIEVED
DATA ISOLATION ( VM ISOLATION)
 All the VM’s in the hypervisor are communicating via
event channels and shared memory with in the host.
 By creating the policies in the hypervisor level we can
the allow/deny the interdomain communication.
 Implemented in XSM Framework similar to seLinux
Security Label
Object : Role : Type
DIGITAL CERTIFICATE LOGIN
 It prevents Account hijacking.
 Every user will be distributed with the Digital Certificates
which is approved by CA.
 Digital certificates have Private key, Public key, Name,
Unique serial number, etc.,
 User Certificates are verified in the LDAP for allow/deny
the user.
• Role Based Access Control
• Individual roles will be assigned to the user
• Based on the roles policies are written
• We can create groups also
Example: Normal users are not allowed to
create VMs only allowed make a request.
RBAC
LOG MANAGEMENT ENGINE
 Real time log Correlation Engine
 Able to find the Error within some seconds
 Using logstash + Elasticsearch + Kibana3 we
achieved.
 Web applications also available
 Easily we can search the logs based on the time
and text
PRIVACY
 It is less technical issue and more of policy and
legal issues. Policies have to empower people to
control the collection, use and distribution of their
personal information.
THINGS TO CONSIDER:
 Notice
 Choice
 Onward Transfer
 Security
 Data integrity
 Access
 Enforcement
PRIVACY BY DESIGN
 Data minimization
 Controllability
 Transparency
 User-friendly systems
 Data confidentiality
 Data quality
 Use limitation
END USER COMPUTING
REFERENCES:
 For Cloud Standards:
http://www.nist.gov/itl/cloud/upload/NIST_SP-500-
291_Version-2_2013_June18_FINAL.pdf
THANK YOU.. 
cooldharma06@gmail.com

More Related Content

What's hot

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 

What's hot (20)

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Is case study
Is   case studyIs   case study
Is case study
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Disaster Recovery in the Cloud
Disaster Recovery in the CloudDisaster Recovery in the Cloud
Disaster Recovery in the Cloud
 
Cloud security
Cloud security Cloud security
Cloud security
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Information security
Information securityInformation security
Information security
 

Viewers also liked

The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Presentation to the International team of NBME
Presentation to the International team of NBMEPresentation to the International team of NBME
Presentation to the International team of NBME
Edward Tang
 
Risk and Sustainability-Russ Doak rev 1
Risk and Sustainability-Russ Doak rev 1Risk and Sustainability-Russ Doak rev 1
Risk and Sustainability-Russ Doak rev 1
Russ Doak, P. Log.
 
Dossier de presse English
Dossier de presse EnglishDossier de presse English
Dossier de presse English
Marl Dulery
 

Viewers also liked (18)

Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Note names part 1 ©
Note names part 1 ©Note names part 1 ©
Note names part 1 ©
 
งานอังกฤษ
งานอังกฤษงานอังกฤษ
งานอังกฤษ
 
Prezentacja 2015
Prezentacja 2015Prezentacja 2015
Prezentacja 2015
 
When should you get your house painted
When should you get your house paintedWhen should you get your house painted
When should you get your house painted
 
Tutorial Eclipse 3
Tutorial Eclipse 3Tutorial Eclipse 3
Tutorial Eclipse 3
 
Guide cоздание сайта на office 365.
Guide cоздание сайта на office 365. Guide cоздание сайта на office 365.
Guide cоздание сайта на office 365.
 
Sales Tax Compliance within Oracle E-Business Suite / JD Edwards / PeopleSoft
Sales Tax Compliance within Oracle E-Business Suite / JD Edwards / PeopleSoftSales Tax Compliance within Oracle E-Business Suite / JD Edwards / PeopleSoft
Sales Tax Compliance within Oracle E-Business Suite / JD Edwards / PeopleSoft
 
Diary Development corporation, Biratnagar
Diary Development corporation, BiratnagarDiary Development corporation, Biratnagar
Diary Development corporation, Biratnagar
 
Presentation to the International team of NBME
Presentation to the International team of NBMEPresentation to the International team of NBME
Presentation to the International team of NBME
 
Question 7
Question 7Question 7
Question 7
 
งานอังกฤษ
งานอังกฤษงานอังกฤษ
งานอังกฤษ
 
Risk and Sustainability-Russ Doak rev 1
Risk and Sustainability-Russ Doak rev 1Risk and Sustainability-Russ Doak rev 1
Risk and Sustainability-Russ Doak rev 1
 
Dossier de presse English
Dossier de presse EnglishDossier de presse English
Dossier de presse English
 

Similar to Cloud security privacy- org

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 

Similar to Cloud security privacy- org (20)

Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Cloud security privacy- org

  • 1. CLOUD COMPUTING - Dharmalingam S Note: Its only for studying and knowledge sharing purpose
  • 2. CLOUD .? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort.
  • 6. BUILDING CLOUD ENVIRONMENT  Heterogeneous System support.  Service Management  Dynamic Workload and Resource Management
  • 7.  Reliabilty, Availability and Security  Integartions with Existing data Center management tools  Visibility and reporting  Cloud must be a converged infrastructure – Supports DR, Elasticity, Avoid Single point of failure.  There has to be fully automated orchestration of service management and software distribution across the converged infrastructure
  • 9.
  • 10. CLOUD SECURITY  Data breaches.  Multi-Factor authentication and Encryption of data.  Insufficient identity, Credential and Access management  Weak password  Identity solution between the customers  Cryptographic keys  Any centralized storage mechanism containing data secrets (e.g. passwords, private keys, confidential customer contact database) is an extremely high-value target for attackers
  • 11.  Insecure Interfaces and APIs  System Vulnerabilities  Kernel, System libraries and application tools- put the security of all services and data significant risks  Bugs are everywhere  Solution - Vulnerability scanning, secuirty patches or upgrades. Secure design and architecture can lessen the chances of attacker taking full control of every part of an information system .  Heartbleed, Shellshock
  • 12.  Account Hijacking  Phising, fraud, reuse of passwords.  Organizations should look to prohibit the sharing of account credentials among user services.  Amazon systems were used to run Zeus Botnodes  Malicious Insiders  Advanced Persistent Threats  Spearphishing, direct hacking systems, delivering attack code through USB devices, penetration through partner networks and use of unsecured or third-party networks are common points of entry for APTs.
  • 13.  Data Loss  Insufficient Due Diligence  Good Roadmap and Checklist for due diligence for evaluating technologies  An organization that rushes to adopt cloud technologies and choose CSPs without performing due diligence exposes itself to a myriad of commercial, financial, technical, legal and compliance risks that jeopardize its success. Amazon AWS experience an outage, due to accidental deletion of information that controls load balancing.  Nirvanix cloud storage specialist hosted data for IBM, DELL went bankruptcy for the above reasons.  Facebook faced issues after buying M&A.  Denial of Service  Shared Technology Vulnerabilities
  • 14. PHYSICAL SECURITY • The elements of physical security are also a key element in ensuring that data center operations and delivery teams can provide continuous and authenticated uptime of greater than 99.9999% • Physical access control and monitoring, including 24/7/365 onsite security, biometric hand geometry readers inside “man traps,” bullet-resistant walls, concrete bollards, closed-circuit TV (CCTV) integrated video, and silent alarms. • Environmental controls and backup power • Policies, processes, and procedures
  • 15. NETWORK SECURITY • Denial of Service: . DNS Hacking, Routing Table “Poisoning”, XDoS attacks o syn cookies o Connection limiting o Internal bandwidth maintained • Port Scanning o Port scans are violation of Acceptable Use Policy(AUP) • Man in the Middle Attack: To overcome it always use SSL • IP Spoofing: Spoofing is the creation of TCP/IP packets using somebody else's IP address. o Host based firewall infrastructure o Infrastructure will not permit an instance to send traffic with a source IP or MAC address other than its own.
  • 16. SECURITY IN THE MIDDLEWARE It supports the Security groups, where we can define our own security groups and assign ACLs The firewall can be configured in groups permitting different classes of instances to have different rules for ex) webserver http –port 80 https-port 443 SSH –port 22 -- IAM & Certificates based communication between cloud components.
  • 17. CREDENTIAL MANAGEMENT • Access Credentials o Access Keys o X.509 certificates o Key pairs • Sign-In Credentials o Email Address (User Name) and Password o Account Identifiers • Account Identifiers o Account ID o Canonical ID
  • 18. EC2 SECURITY • Host OS o Built on bastion host o Cryptographically strong SSH keys to access bastion host o Access are logged and routinely audited • Guest OS o Virtual instances are controlled by customer o Customers have full root access and administrative controls o Customers use token or key based authentication
  • 19. EC2 SECURITY Firewall:  Set with default as deny mode  Requires customers X.509 certificate and keys to authorize change API  Calls to launch and terminate instances are signed by X.509 certificate/secret Access keys  API calls are encrypted in transit with SSL
  • 21. DATA ISOLATION ( VM ISOLATION)  All the VM’s in the hypervisor are communicating via event channels and shared memory with in the host.  By creating the policies in the hypervisor level we can the allow/deny the interdomain communication.  Implemented in XSM Framework similar to seLinux Security Label Object : Role : Type
  • 22. DIGITAL CERTIFICATE LOGIN  It prevents Account hijacking.  Every user will be distributed with the Digital Certificates which is approved by CA.  Digital certificates have Private key, Public key, Name, Unique serial number, etc.,  User Certificates are verified in the LDAP for allow/deny the user.
  • 23. • Role Based Access Control • Individual roles will be assigned to the user • Based on the roles policies are written • We can create groups also Example: Normal users are not allowed to create VMs only allowed make a request. RBAC
  • 24. LOG MANAGEMENT ENGINE  Real time log Correlation Engine  Able to find the Error within some seconds  Using logstash + Elasticsearch + Kibana3 we achieved.  Web applications also available  Easily we can search the logs based on the time and text
  • 25. PRIVACY  It is less technical issue and more of policy and legal issues. Policies have to empower people to control the collection, use and distribution of their personal information.
  • 26. THINGS TO CONSIDER:  Notice  Choice  Onward Transfer  Security  Data integrity  Access  Enforcement
  • 27. PRIVACY BY DESIGN  Data minimization  Controllability  Transparency  User-friendly systems  Data confidentiality  Data quality  Use limitation
  • 29. REFERENCES:  For Cloud Standards: http://www.nist.gov/itl/cloud/upload/NIST_SP-500- 291_Version-2_2013_June18_FINAL.pdf

Editor's Notes

  1. 1.Support s data center existing infrastructure 2. Service offering should include resource guarantees, metering rules, resource management and billing cycles. 3, Must meet consumer workload and resource aware. Cloud computing makes all the components of data center virtualized, not just compute and memory. The environment should deliver the maximum performance. SLA also have to met.
  2. 24/7 worlkload Shared resources so have to consider the internal, external, security and mulittenancy must be integrated. Service need to be able to provide access to only authorized users and in the shared pool model the users need to be able to trust that their data and application are secure. 99.999% availability – 5.26 minutes in a year
  3. By the use of Weak password CSP should understand the security around the Cloud identity solution such as process, infra, segmentation between the customers Cryptographic keys, including TLS certificates, keys used to protect access to data and keys used to encrypt data at rest must be rotated periodically. Any centralized storage mechanism containing data secrets (e.g. passwords, private keys, confidential customer contact database) is an extremely high-value target for attackers Cryptographic keys, including TLS certificates, keys used to protect access to data and keys used to encrypt data at rest must be rotated periodically.
  4. The security and availability of general cloud services is dependent on the security of these basic APIs. Organization and 3rd parties may build on these interfaces to offer VAS to their customers. This introduce the complexity of new layered API, it also increases risks. APIs and UI are exposed to outside world – faces heavy attacks
  5. Data stored in the cloud can be lost for reasons other than malicious attacks. An accidental deletion by the cloud service provider, or worse, a physical catastrophe such as a fire or earthquake, can lead to the permanent loss of customer data unless the provider or cloud consumer takes adequate measures to back up data, following best practices in business continuity and disaster recovery Solution: geographic redundancy, data backup with in the cloud, amd premise to cloud backups. Amazon EC2 suffered loss of data loss loss of customers & Sony Hijack Denial-of-service (DoS) attacks are attacks meant to prevent users of a service from being able to access their data or their applications. By forcing the targeted cloud service to consume inordinate amounts of finite system resources such as processor power, memory, disk space or network bandwidth, the attacker—or attackers, as is the case in distributed denial-of-service (DDoS) Cloud service providers deliver their services scalably by sharing infrastructure, platforms or applications. Underlying components (e.g., CPU caches, GPUs, etc.) that comprise the infrastructure supporting cloud services deployment may not have been designed to offer strong isolation properties for a multitenant architecture (IaaS), re-deployable platforms (PaaS) or multicustomer applications (SaaS). Side channel attacks. (Inter-Vm communication) Vulnerability – “The unchecked buffer vulnerability (CVE-2015-3456) occurs in the code for QEMU’s virtual floppy disk controller. A successful buffer overflow attack exploiting this vulnerability can enable an attacker to execute his or her code in the hypervisor’s security context and escape from the guest operating system to gain control over the entire host.”
  6. Notice: have to inform that userdata is collected and about how it will be used. Choice: Enduser can allow/disallow to collect or transfer data to third parties. Onward Transfer: Transfer of data to third parties may only occur to other organizations that follow adequate data protection principles. Security: Reasonable efforts must be prevent loss of collected information. Data integrity: data must be relevant and reliable for the purpose of collected info. Access: Individuals must be able to access information held about them and correct or delete if it is inaccurate Enforcement: There must be effective means of enforcing these rules.
  7. Data minimization: data processing systems are to be designed and selected in accordance with the aim of collecting, processing or using no personal data at all or as few personal data as possible. Controllability: an IT system should provide the data subjects with effective means of control concerning their personal data. The possibilities regarding consent and objection should be supported by technological means. Transparency: both developers and operators of IT systems have to ensure that the data subjects are sufficiently informed about the means of operation of the systems. Electronic access / information should be enabled. User-friendly systems: privacy-related functions and facilities should be user friendly, i.e. they should provide sufficient help and simple interfaces to be used also by less experienced users. Data confidentiality: it is necessary to design and secure IT systems in a way that only authorized entities have access to personal data. Data quality: data controllers have to support data quality by technical means. Relevant data should be accessible if needed for lawful purposes. Use limitation: IT systems which can be used for different purposes or are run in a multi-user environment (i.e. virtually connected systems, such as data warehouses, cloud computing, digital identifiers) have to guarantee that data and processes serving different tasks or purposes can be segregated from each other in a secure way.