Podcast
Questions and Answers
Which factor necessitates a reassessment of security models in cloud computing?
Which factor necessitates a reassessment of security models in cloud computing?
- Loss of control over assets (correct)
- Greater network bandwidth
- Increased server uptime
- Enhanced user interfaces
Why is trust in service providers a critical concern for enterprise security in the cloud?
Why is trust in service providers a critical concern for enterprise security in the cloud?
- Enterprise security relies on the strongest link.
- Service providers always implement the newest standards.
- Service providers only handle non-critical data.
- Enterprise security depends on the weakest link. (correct)
What risk is increased when sharing resources in a public cloud environment?
What risk is increased when sharing resources in a public cloud environment?
- Increased data encryption.
- Improved physical security measures.
- Reduced operational costs.
- Potential government asset seizure. (correct)
What is a potential consequence of ‘sticky services’ created by cloud storage vendors?
What is a potential consequence of ‘sticky services’ created by cloud storage vendors?
What is important for customers to maintain data security in the cloud?
What is important for customers to maintain data security in the cloud?
What is one of the key challenges regarding data integrity in the cloud?
What is one of the key challenges regarding data integrity in the cloud?
How can mashup technology introduce security vulnerabilities in the cloud?
How can mashup technology introduce security vulnerabilities in the cloud?
What should SaaS providers offer to ensure security and compliance as mission-critical processes move to the cloud??
What should SaaS providers offer to ensure security and compliance as mission-critical processes move to the cloud??
What is essential for customers to negotiate in service agreements to meet compliance requirements in the cloud?
What is essential for customers to negotiate in service agreements to meet compliance requirements in the cloud?
How do frequent changes in cloud applications affect traditional SDLC models?
How do frequent changes in cloud applications affect traditional SDLC models?
Why is fail-over technology crucial for cloud security, especially for mission-critical applications?
Why is fail-over technology crucial for cloud security, especially for mission-critical applications?
How does SaaS complicate compliance regarding data?
How does SaaS complicate compliance regarding data?
Who is primarily accountable for securing data in a cloud environment under regulations like SOX and HIPAA?
Who is primarily accountable for securing data in a cloud environment under regulations like SOX and HIPAA?
How should government policies adapt to cloud computing?
How should government policies adapt to cloud computing?
What traditional security controls become less effective in virtualized environments?
What traditional security controls become less effective in virtualized environments?
What should security managers collaborate on with legal teams when outsourcing cloud services?
What should security managers collaborate on with legal teams when outsourcing cloud services?
Why do cloud-based services used by mobile users increase security risks?
Why do cloud-based services used by mobile users increase security risks?
What increases risks due to cloud efficiency relying on co-locating virtual machines?
What increases risks due to cloud efficiency relying on co-locating virtual machines?
What makes it difficult to verify security and track insecure VMs in cloud environments??
What makes it difficult to verify security and track insecure VMs in cloud environments??
Why do VMs face greater risks when moving between private and public clouds??
Why do VMs face greater risks when moving between private and public clouds??
Who is responsible for patching and maintenance in cloud-computing environments?
Who is responsible for patching and maintenance in cloud-computing environments?
What concept is required when data constantly moves between physical and virtual environments in cloud computing?
What concept is required when data constantly moves between physical and virtual environments in cloud computing?
What must VMs be to maintain trust zones in cloud computing?
What must VMs be to maintain trust zones in cloud computing?
Which of the following is a critical aspect of privileged user access when evaluating SaaS providers?
Which of the following is a critical aspect of privileged user access when evaluating SaaS providers?
What should an organization ensure regarding regulatory compliance when selecting a SaaS vendor?
What should an organization ensure regarding regulatory compliance when selecting a SaaS vendor?
What should one inquire about regarding data location when considering a cloud provider?
What should one inquire about regarding data location when considering a cloud provider?
What is an important consideration regarding data segregation when evaluating cloud services?
What is an important consideration regarding data segregation when evaluating cloud services?
What aspect of recovery should be investigated when evaluating a potential cloud provider?
What aspect of recovery should be investigated when evaluating a potential cloud provider?
What should be determined regarding long-term viability when choosing a cloud provider?
What should be determined regarding long-term viability when choosing a cloud provider?
What is the purpose of a formal security charter within an organization??
What is the purpose of a formal security charter within an organization??
What is the role of a security steering committee?
What is the role of a security steering committee?
Where does the NIST model separate cloud computing?
Where does the NIST model separate cloud computing?
What does risk management involve in the context of cloud security?
What does risk management involve in the context of cloud security?
Why should threat modeling be applied to applications and infrastructure in cloud security?
Why should threat modeling be applied to applications and infrastructure in cloud security?
What is a key feature of effective security portfolio management in cloud environments?
What is a key feature of effective security portfolio management in cloud environments?
What is the recommended approach to security awareness training?
What is the recommended approach to security awareness training?
What action should organizations take to maintain preparedness for evolving cloud security challenges?
What action should organizations take to maintain preparedness for evolving cloud security challenges?
Why should cloud security teams regularly review policies, standards, and guidelines?
Why should cloud security teams regularly review policies, standards, and guidelines?
What is the primary objective of the Investigation phase in the Secure Software Development Life Cycle (SecSDLC)?
What is the primary objective of the Investigation phase in the Secure Software Development Life Cycle (SecSDLC)?
What is the importance of centralized security information management systems in cloud security monitoring?
What is the importance of centralized security information management systems in cloud security monitoring?
Flashcards
Cloud security challenges
Cloud security challenges
Efficiency enhanced through decoupling IT infrastructure, introducing security risks, particularly for SaaS. Loss of control necessitates security model reassessment.
Sticky services
Sticky services
Services that may be incompatible between vendors, creating user lock-in and hindering flexibility.
Encryption Key Control
Encryption Key Control
Crucial in the cloud; customers should retain control over their encryption and decryption keys.
Data integrity
Data integrity
Signup and view all the flashcards
SaaS providers logging
SaaS providers logging
Signup and view all the flashcards
Cloud security focus
Cloud security focus
Signup and view all the flashcards
Traditional security controls
Traditional security controls
Signup and view all the flashcards
Outsourcing cloud security
Outsourcing cloud security
Signup and view all the flashcards
Cloud Efficiency Security
Cloud Efficiency Security
Signup and view all the flashcards
VM Security Risks
VM Security Risks
Signup and view all the flashcards
Cloud compliance
Cloud compliance
Signup and view all the flashcards
Security charter
Security charter
Signup and view all the flashcards
Security steering committee
Security steering committee
Signup and view all the flashcards
Risk assessments
Risk assessments
Signup and view all the flashcards
Security portfolio management
Security portfolio management
Signup and view all the flashcards
Security awareness
Security awareness
Signup and view all the flashcards
Security education
Security education
Signup and view all the flashcards
Security policies.
Security policies.
Signup and view all the flashcards
Secure SDLC
Secure SDLC
Signup and view all the flashcards
Security monitoring
Security monitoring
Signup and view all the flashcards
Third-party risk
Third-party risk
Signup and view all the flashcards
Sales support
Sales support
Signup and view all the flashcards
Business Continuity Plan
Business Continuity Plan
Signup and view all the flashcards
Cloud forensics
Cloud forensics
Signup and view all the flashcards
Secure Architecture Design
Secure Architecture Design
Signup and view all the flashcards
Vulnerability assessment
Vulnerability assessment
Signup and view all the flashcards
Password assurance
Password assurance
Signup and view all the flashcards
Cloud-based Logging
Cloud-based Logging
Signup and view all the flashcards
Security images
Security images
Signup and view all the flashcards
Data Privacy
Data Privacy
Signup and view all the flashcards
Data Security
Data Security
Signup and view all the flashcards
App Security
App Security
Signup and view all the flashcards
Virtual Machine Security
Virtual Machine Security
Signup and view all the flashcards
Identity Access Management
Identity Access Management
Signup and view all the flashcards
Physical Security
Physical Security
Signup and view all the flashcards
The Security Boundary
The Security Boundary
Signup and view all the flashcards
Security mapping
Security mapping
Signup and view all the flashcards
Securing data in the cloud
Securing data in the cloud
Signup and view all the flashcards
Identity Protocol Standards
Identity Protocol Standards
Signup and view all the flashcards
Study Notes
Cloud Security Challenges
- Virtualization and cloud computing increase efficiency by decoupling IT infrastructure but adds security risks, especially for SaaS providers.
- Loss of control over assets requires reassessing security models.
- Enterprise security depends on the weakest link, making trust in service providers critical.
- Public clouds involve loss of control over physical security and resource sharing, increasing the risk of government asset seizure if another company violates the law.
Cloud Storage and Data Security
- Cloud storage services may be incompatible between vendors, which complicates data migration.
- Providers create "sticky services" that lock users into their platforms, which limits flexibility and interoperability.
- Controlling encryption keys is crucial in the cloud where customers should ensure data is encrypted during transmission and when at rest.
- Maintain security by retaining control of encryption and decryption keys rather than relying on the cloud vendor, ideally using SSL.
- Data integrity ensures data remains consistent and correct during transfer, storage, or retrieval, changing only through authorized transactions.
- A standard for guaranteeing data integrity in the cloud has not been established.
- While SaaS reduces the need for software development, using internally developed code in the cloud requires a secure SDLC.
- Mashup technology can introduce security vulnerabilities, which means development tools need built-in security models and enforced data access restrictions.
Compliance and Rapid Evolution
- SaaS providers must offer real-time log data for administrators and customers as mission-critical processes move to the cloud.
- Monitoring security and compliance is challenging due to internal and inaccessible logs where customers should negotiate log access in service agreements to meet compliance requirements.
- Cloud applications evolve rapidly, requiring users to stay updated for security.
- Frequent changes challenge traditional SDLC models, where regular upgrades are essential.
Failover and Regulatory Considerations
- Failover technology is crucial for cloud security, especially for mission-critical applications.
- Focus on protecting data at the enterprise level, not just within the cloud provider's infrastructure, as data-level security remains a key challenge.
- Current compliance standards weren't designed for cloud computing, so adaptation is needed.
- SaaS complicates compliance because it obscures data location, raising privacy, segregation, and security concerns.
- Regulations often require data separation with some countries imposing strict data residency and retention rules.
Regulatory Compliance in SaaS
- Complying with regulations like SOX, GLBA, HIPAA, and PCI DSS is more challenging in a SaaS environment.
- Cloud computing does not remove compliance responsibility but data owners remain fully accountable.
- Government policies must adapt to cloud computing opportunities and risks, mainly off-shored data and privacy protection.
- Traditional security controls like VLANs and firewalls are less effective in virtualized environments, requiring heightened attention to critical data security during the transition.
Outsourcing and Mobile Users
- Outsourcing cloud services reduces control over data, raising security concerns.
- Cost and convenience drive adoption, so security managers must work with legal teams to set up SLAs to protect corporate data.
- Cloud-based services allow mobile users to access business data without going through corporate networks, increasing security risks.
- Implement stricter security controls between mobile users and cloud services to prevent distributed cyber threats.
Virtual Machine Risks
- Cloud efficiency relies on co-locating VMs from multiple organizations on shared physical resources, which increases risks because traditional data center security can't prevent attacks between VMs.
- Internet-based administrative access further heightens exposure.
- The dynamic nature of VMs complicates security consistency and auditability.
- Cloning and distribution can propagate configuration errors and vulnerabilities, making it hard to verify security and track insecure VMs.
- Intrusion detection must work at the VM level to proactively prevent attacks.
Remote Attacks and Shared Infrastructure
- Cloud environments use standard operating systems and applications, which makes them vulnerable to remote attacks.
- VMs moving between private and public clouds face greater risks, with shared environments presenting a larger attack surface.
- Cloud computing relies on shared physical infrastructure, so security integrity monitoring is required.
- Enterprises, rather than the cloud vendors, are accountable for patching and maintenance.
- Not patching and maintaining can lead to unmanageable security risks.
Compliance and Cloud Adoption
- Enterprises must ensure compliance with regulations, regardless of data location.
- In cloud computing, data constantly moves between physical and virtual environments that requires auditors and security practitioners to rethink compliance strategies.
- Many corporations adopt cloud computing for cost savings without fully acknowledging security risks.
- To maintain trust zones, VMs must be self-defending and security responsibility shifts to the cloud provider.
Software-as-a-Service Security
- Future cloud computing models will likely combine SaaS, utility computing, and Web 2.0 collaboration technologies.
SaaS Security Considerations
- Inquire about specialized user access to data and about the hiring and management practices of administrators.
- Ensure the vendor undergoes external audits and/or security certifications for regulatory compliance.
- Data Location: Check provider data location control.
- Data segregation means ensuring encryption is available at all stages.
- Ensure encryption schemes are designed and tested by experienced professionals for data segregation.
- Recovery consists of finding out what will happen to data in case of a disaster.
- Check to see if complete restoration options are available along with the time to restore.
- Investigative support is making sure the vendor can investigate any inappropriate or illegal activity
- Long-term viability means checking what happens to data if the company goes out of business, including how data is returned and in what format.
- SaaS providers need to incorporate and enhance security practices and develop new ones.
Security and Governance
- A formal security charter aligns the security team's vision with organizational strategy.
- A charter creates, team ownership, role clarity, and expectations.
- Clear roles and expectations reduces confusion, lowers morale, reduces effectiveness, and weakens overall security.
- A security steering committee guides security initiatives and aligns them with business and IT strategies while a charter that defines roles and responsibilities for security functions is one of its key deliverables.
- A formal strategy ensures security operations are sustainable.
- Lack of a formal process results in unmanaged risks, governance failures, and missed business opportunities.
- Proper security governance ensures risk management, security monitoring, and application security are addressed.
Risk Management and Assessment
- Risk management identifies assets, links data to processes, assigns ownership, and maintains a repository.
- Owners protect, and custodians implement security controls.
- A formal risk assessment aligns security resources with business continuity.
- Formal risk assessments balance business needs with security requirements.
- This failure results in security audit issues, challenges, and ineffective controls.
- Apply threat modeling to applications and infrastructure to identify and mitigate risks.
Security Portfolio & Awareness
- Effective security portfolio management completes projects efficiently and aligns with strategies.
- Without planning, projects can fail, workloads become unmanageable, and systems degrade.
- Structured methodologies and tools improve project execution.
- People are the weakest link so awareness and training is essential.
- A generic approach to security awareness is bad and training should be custom.
- Developers learn secure coding practices, while service representatives train in data privacy and security protocols.
Training, Policies, and Guidelines
- Organizations use training programs to equip teams and partners with fundamental security and risk management skills.
- Regular training and mentorship keeps the team prepared for evolving issues.
- Develop and document policies, standards, and guidelines tailored to cloud computing, SaaS, and collaborative applications.
- Update policies, standards, and guidelines to remain relevant as business and IT environments evolve as well as ensures information security, prevents data disclosure, and maintains consistency.
Secure Software Development Life Cycle (SecSDLC)
- Investigation: Define and document project processes and goals in the program security policy.
- Analysis: Analyze security policies/programs, current threats/controls, legal issues, and do risk analysis.
- Logical design: Develop a security blueprint, plan incident response and business disaster responses, and determine feasibility.
- Physical design: Select technologies to support the security blueprint, develop a solution definition, design physical security, and review/approve plans.
- Implementation: Buy/develop security solutions and present the package to management for approval.
- Maintenance: Monitor, test, modify, update, and repair to respond to changing threats.
Security Monitoring & Third-Party Risk
- Centralized security information management systems provide continuous monitoring and notifications.
- Periodic third-party security testing is essential.
- SaaS organizations face unique challenges at the application and data layers that require specialized monitoring beyond traditional security.
- Expanding security capabilities to include application/data-level monitoring, cloud privacy, and application security is crucial to detecting and preventing threats.
- Managing third-party security risks is crucial as SaaS adopts cloud computing for customer data storage and processing.
- Providers risk reputational harm, revenue loss, and legal consequences for inadequate due diligence without a third-party program.
Requests for Sales Support
- Requests for information/sales support are crucial responsibilities of the security team in a SaaS business.
- Security plays a key role in regulatory compliance, reputation, and marketability.
- A structured process and knowledge improve efficiency in responding to inquiries.
- Security team members should act as internal/external evangelists, supporting sales/marketing.
- Without security representatives, companies risk losing sales opportunities.
Business Continuity and Forensics
- Business continuity and disaster recovery planning is designed to minimize business disruptions.
- SaaS enhances BC/DR by ensuring uninterrupted communication, reducing complexity, costs, and risks.
- Cloud-based solutions have advantages over traditional BC/DR and also eliminates email downtime as well maintaining communication during outages.
- Cloud offers continuous access to email via WiFi-enabled devices, even if infrastructure or staff are unavailable.
- Forensics is retrieving/analyzing data to investigate incidents, while network forensics monitors network events.
- Cloud enhances forensics by enabling cost-effective servers, reducing evidence acquisition time, and minimizing operational disruptions.
- Cloud storage features, such as built-in cryptographic checksums, streamline investigations.
- Additionally, cloud computing provides scalable processing power speeds up forensic analysis, password testing, and data retrieval.
Security Architecture Design
- A security architecture framework includes processes, procedures, technology, personnel management, and compliance reporting.
- The architecture should define security and privacy principles aligned with business objectives and includes controls for asset classification, access, and compliance.
- Integrating with the system development life cycle ensures implementation.
- Security processes should address authentication, authorization, availability, confidentiality, integrity, accountability, and privacy.
- A well-defined security architecture provides a unified blueprint for teams, enabling design reviews and compliance.
Vulnerability and Password Assessment
- Vulnerability assessment classifies network assets to prioritize mitigation efforts, for example, patching and system upgrades.
- Measure mitigation effectiveness by setting goals for minimizing exposure and accelerating mitigation.
- Integrating vulnerability management with discovery, patch management, and upgrade processes helps close security gaps.
- Security teams and customers use cloud computing run crackers to test password strength.
- Cloud resources reduce cracking time and allow payment based on usage.
- This avoids mixing sensitive credential testing with other workloads by using dedicated computing instances.
Logging and Security Images
- Cloud-based logging enables indexing and instant search results.
- Compute instances can be scaled as needed to manage logging loads, providing a real-time security view.
- Cloud computing offers enhanced logging capabilities for those who are willing to invest in it.
- Cloud eliminates the need for time-consuming physical OS installations and third-party tools by enabling virtualization-based "Gold image" VM secure builds.
- These images allow cloning with minimal startup time, reducing security barriers.
- Offline patching of VMs enhances security by enabling testing of updates before deployment.
Data Privacy, Governance, and Security
- Organizations must conduct risk assessments and gap analyses to maintain formal data privacy processes.
- A steering committee is essential to address privacy concerns.
- Since many security teams lack privacy training, organizations should hire or train privacy experts to meet demands.
- A formal data governance framework should be developed that will define a system of decision rights and accountability for information-related processes.
- Data governance includes inventory, classification, analysis (business intelligence), protection, privacy, retention/recovery/discovery, and destruction.
- Data-level security, the responsibility of enterprises rather than cloud providers, is the challenge in cloud computing.
- Security is enforced at the data level to ensure protection regardless of location with restrictions of data movement (e.g., keeping it within the U.S.) and the enforcing of encryption.
- Security also controls user access.
Application and Virtual Machine Security
- Application security is crucial for SaaS companies because it demands collaboration between security and development.
- Security features, coding practices, training, and testing tools must be defined and implemented throughout the development process.
- While engineering teams focus on the application and infrastructure layers, security teams provide necessary requirements.
- External penetration testers help assess security through code reviews and attack simulations.
- Securing a web is ensuring SaaS providers follow OWASP guidelines, comply with PCI DSS requirements, and secure LAMP stack components.
- Weak design, coding, and testing outcomes are a result of poor collaboration.
- In cloud environments, VMs run on virtualized servers, requiring security controls similar to data centers.
- Security teams can help customers prepare for cloud migration while implementing firewalls, intrusion detection, integrity monitoring, and log inspection.
- Embedding security within VMs, can migrate data safely to the cloud.
- A bidirectional stateful firewall ensures isolation and flexibility for VMs across environments.
- Integrating security software into a single agent allows centralized management, seamless integration with existing infrastructure, and cost-effective deployment for enterprises and service providers.
Identity Access Management (IAM)
- Ensuring SaaS customers follow the principle of least privilege, Identity and Access Management is critical for organizations.
- While business and IT teams need system and application access, balance security with operational needs.
- Cloud services are transforming identity management, challenging traditional solutions where existing models may struggle with evolving trust assumptions, privacy concerns, and authentication processes.
- SaaS providers balance security and usability while adapting IAM strategies to ensure trust which a failure on that balance could hinder business and IT operations.
Change Management & Physical Security
- Although not directly a security issue, insecure changes can disruptions or data loss, security teams should collaborate with operations to review changes, establish security guidelines, and prioritize critical updates
- Clients lose direct control over physical security as moving to the cloud means datacenter is now managed by cloud providers, and security model may need adjusting.
- The high cost of securing data centers is a reason for companies to move to cloud services.
Business Continuity and Disaster Recovery
- In SaaS, service is critical, as it requires business continuity and disaster recovery.
- Virtualization helps application availability from hardware, allowing for quick migrations and reallocation.
- Code escrow strict transfer and storage control because source code for SaaS providers equals object code.
- Data Centers and physical infrastructure follow standard business continuity and disaster recovery protocols.
- BC plan includes IT and non-IT aspects, key personnel, facilities, crisis communication, and reputation management.
- The plan has analysis, solution design, implementation, testing, and maintenance.
- Disaster recovery is a subset of BC planning to restore applications, data, hardware, networks, and infrastructure after disruptions and includes policies and procedures to ensure technology recovery.
YouTube Overview
- YouTube is a platform for watching/sharing videos worldwide via web, mobile devices, blogs, and email.
- YouTube was founded in February 2005, launched in December 2005, then acquired by Google in November 2006.
- YouTube is partnered with content providers like CBS, BBC, Universal Music Group, Sony Music, Warner Music, and the NBA.
YouTube APIs and Widgets
- YouTube offers APIs and tools for integrating video content and functionality into websites, applications, and devices.
- Different APIs cater to basic functionality (widgets), controlling playback (player APIs), and server-side or device integration (data API).
- Simple JavaScript components known as widgets come available for embedding YouTube functionality.
- Video Bar: Displays video thumbnails that open in a floating player.
- Video Search Control allows YouTube videos to be searched directly on a website.
YouTube Player & Data APIs
- Player APIs has the functionality to control the YouTube video player via JavaScript or ActionScript.
- Embedded Player is a Standard YouTube player with configurable settings.
- Chromeless Player is a bare player with full customization capabilities.
- The YouTube Custom Player allows embedding a customizable YouTube player with content managed directly from a user’s YouTube account without requiring site modifications..
- YouTube enable their functionalities into applications or websites through the Data API.
- The Data API allows video searches, uploads, playlist management, and user authentication for content modifications for server-side programming.
- The Data API includes support to integration into web or desktop applications, while it provides access to video and user data, allowing for personalized experiences and user actions.
- The API uses XML and HTTP protocols Google provides client libraries and guides for programming languages.
Zimbra, Facebook, Zoho, and DimDim
- Zimbra was acquired by Yahoo! in 2007 for $350 million, in which it is a web-based email and collaboration platform that is compatible with Linux, Mac OS X, and virtualized environments, and it synchronizes with mobile devices and desktop clients.
- Zimbra Desktop is a free, open-source email and calendar client supporting multiple email providers. It features email storage, a conversation view, message tagging, an advanced search, and integrated document management.
- Zimbra Collaboration Suite integrates email, contacts, calendars, VoIP, and document authoring in an Ajax-based web client. Security features anti-spam, antivirus scanning, and email archiving.
- Created by Mark Zuckerberg and his Harvard roommates, Facebook is a social network that allows users to create profiles, connect with friends, and join networks. It uses a MySQL-based platform and open-source caching systems.
- Facebook: Has over 175 million active users processing 50 billion page views per month, and handles photo sharing.
- AdventNet, Inc, Zoho is an office productivity suite with Zoho Mail, that offers extensive storage, offline access, spam filtering, and mobile support and includes instant messaging.
- Zoho CloudSQL enables developers to interact with Zoho's business data using SQL for integration between applications.
- DimDim is a free web conferencing tool supporting rich media communication, integrating with CRM and LMS software available with free web that supports up to 20 users.
Cloud Security and Responsibilities
- Cloud computing presents security challenges due to shared resources and outsourced operations, but security levels vary across service models with IaaS having the least security and SaaS having the most.
- Organizations must assess security needs and align them with the provider's controls addressing any gaps where data security is crucial, requiring encryption and possible use of proxy services
- Plan logging, auditing, and compliance that is needed to be included Service-Level Agreements and covering identity management, security protocols, and the concept of presence in identity.
Securing the Cloud and Defining the Security Boundary
- The internet was built for resilience and not security, which is why cloud computing is inherently vulnerable, with key concerns being auditing, data integrity, privacy, and regulatory compliance,
- Cloud Security Risks: Identify resources for migration, assess their sensitivity, analyze risks based on cloud type, consider security responsibilities for different models, and evaluate provider security measures.
- Security measures using "golden" system images for recovery, forensic analysis, and system snapshots and vendors like AWS, offer security resources and certifications for risk management.
- Defining the cloud deployment model is required to understand cloud security, with the NIST model separating models and service models.
- The Cloud Security Alliance (CSA) examines security concerns and multi-tenancy with the CSA Cloud Reference Model organizing security responsibilities with Iaas having the least built-in and SaaS including applications, management, and user interface security.
- The security boundary marks the end of the cloud provider's responsibility and the beginning of the customer's as well as the levels of security that must addressed in SLAs.
Security Mapping, Data Protection, and Identity
- Security mapping cloud computing is when aligning security features, and compliance occurs in the chosen cloud model, and by ensuring coverage for applications, data, and the hardware.
- Complying with standards like PCI-DSS and HIPAA and assigning responsibilities is assigned is required because on-premises security cannot be fully replicated.
- Securing cloud data is a concern because all WAN traffic is vulnerable for both stored and account credentials.
- Key security mechanisms include access control, auditing, authentication, and authorization across cloud service models, and protects brokered cloud access that isolates date from direct client interaction with proxy.
- Managing identity is essential in cloud computing for compliance but also involves provisioning management, supporting identity federation, and applying access policies.
- Automating complex identity management as well as mapping identities to locations is necessary for automation and service customization.
Identity Protocol Standards and Windows Azure
- Interoperability in cloud computing is enabled by identity protocols: OpenID, SAML, and OAuth which helps enable identity management.
- The Windows Azure platform is a claims-based identity system using open authentication and access protocols.
- Active Directory Federation Services, Windows Azure AppFabric Access Control, and Windows Identity Foundation facilitate secure authentication, federated access, and authorization.
- This ensures seamless identity management.
Presence
- Refers to tracking a user’s location across location-based apps using GPS and network data to provide services such as Apple’s AroundMe.
- Standards like Extensible Messaging and Presence Protocol (XMPP) and Jabber XCP enable real-time presence tracking, which is critical for collaboration and cloud-based applications.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.