Cloud Computing
Cloud Computing
Online Social Networks and Applications, Cloud introduction and overview, Different clouds, Risks,
Novel applications of cloud computing.
Online Social Networks are platforms that allow user to interact, share content, and engage
with others through digital means. Examples include Facebook, Twitter, Instagram, LinkedIn, and
newer platforms like TikTok. These applications have become an integral part of modern life,
connecting people and enabling seamless communication.
Cloud computing plays a significant role in hosting, managing and scaling social network
applications. By leveraging cloud-based infrastructure, social networks can offer high availability,
scalability, and security while managing large volumes of data and user interactions efficiently.
Cloud computing provides essential services such as storage, computing power, and
networking to support social networking applications. The key benefits include:
a) Scalability:
• Online social networks require a highly scalable infrastructure to accommodate
millions of users.
• Cloud platforms like AWS, Google Cloud, and Microsoft Azure provide auto-scaling
capabilities.
• Elastic load balancing helps distribute traffic efficiently.
b) High availability and reliability:
• Cloud services ensure minimal downtime through distributed data centers and
redundant servers.
• Content Delivery Networks (CDNs) cache data and serve users from the nearest
geographical location, reducing latency.
c) Big data processing and storage:
• Social media platforms generate enormous amounts of data, including text, images,
videos, and interactions.
• Cloud-based databases like Amazon DynamoDB, Google BigQuery, and Apache
Hadoop process and store this data efficiently.
d) Cost Efficiency
• Cloud computing follows a pay-as-you-go model, reducing operational costs.
• Businesses avoid large upfront investments in physical servers.
e) Security and Privacy
• Cloud providers implement strong security measures such as encryption, firewalls,
and compliance with regulations (GDPR, HIPAA).
• Identity and Access Management (IAM) tools restrict unauthorized access.
f) Artificial Intelligence and Machine learning Integration:
• AI and ML models run on cloud infrastructure to analyze user behavior, recommend
content, and detect fake accounts or spam.
• Cloud AI services, such as AWS SageMaker and Google AI, enable personalized
content recommendations.
Cloud – based services for Social Networks:
a) Infrastructure as a service(IaaS):
• Provides virtualized computing resources such as storage, networking, and virtual
machines.
• Examples: AWS EC2, Google Compute Engine, Microsoft Azure Virtual Machines.
b) Platform as a service (PaaS):
• Provides a development environment, frameworks, and tools to build and deploy
applications.
• Example: Google App Engine, AWS Elastic Beanstalk, Microsoft Azure App Service.
c) Service as a service(SaaS):
• Provides ready-to-use applications accessible via web browsers.
• Examples: Facebook, Twitter, Instagram, LinkedIn.
Challenges:
Cloud computing is a technology that allows users to access computing resources such as
servers, storage, databases, networking, software, and analytics over the internet. Instead of
maintaining physical infrastructure, organizations can use cloud services on a pay-as-you-go basis,
reducing costs and improving scalability.
Cloud computing has revolutionized the IT industry by enabling businesses and individuals to
leverage powerful computing resources without needing to invest in expensive hardware and
infrastructure. It allows for remote access to data and applications, making it an essential component
of modern technology.
Cloud computing has several key characteristics that distinguish it from traditional computing
models.
a) Public Cloud:
• Hosted and managed by third-party cloud providers (e.g., AWS, Google Cloud,
Microsoft Azure).
• Resources are shared among multiple users ( multi-tenancy).
• Cost – effective and scalable but has security concerns for sensitive data.
b) Private Cloud:
• Dedicated to a single organization and can be hosted on-premises or by a third-party
provider.
• Offers enhanced security, compliance, and control but requires higher cost.
c) Hybrid Cloud:
• Combines public and private cloud environments, allowing data and applications to
be shared between them.
• Provides flexibility, scalability, and security for critical workloads.
d) Community Cloud:
• Shared infrastructure among organizations with similar interests (e.g., government
agencies, healthcare institutions).
• Provides better security and compliance for specific industries.
a) Cost savings
b) Scalability and Flexibility
c) High availability and Reliability
d) Security and compliance
e) Remote access and Collaboration
f) Automatic updates and maintenance.
Different Clouds:
Cloud deployment models define how cloud responses are owned, managed, and accessed.
The main types include:
a) Private Cloud
• A cloud infrastructure owned and operated by third-party providers that offers
services over the internet.
• Example: Amazon Web Services, Google Cloud Platform, Microsoft Azure.
• Features:
i. Resources are shared among multiple users.
ii. Cost-effective, as there are no hardware maintenance expenses.
iii. Scalable and flexible, with on-demand resources.
iv. Security is managed by the provider but may not be sufficient for senstitive
data.
• Use cases:
i. Hosting websites and applications.
ii. Software development and testing environments.
iii. Big data analytics.
iv. Collaboration tools like Google Drive and Microsoft 365.
• Advantages:
i. Lower upfront costs.
ii. High scalability and flexibility.
iii. No need for IT infrastructure management.
• Disadvantages:
i. Limited control over data security.
ii. Potential performance issues due to shared resources.
iii. Compliance challenges for business with strict regulations.
b) Private Cloud:
• A cloud infrastructure dedicated to a single organization, either managed in-house or
by a third party.
• Examples: VMware, Private Cloud, OpenStack, Oracle Private Cloud.
• Features:
i. Greater control, security, and customization.
ii. Can be hosted on – premises or by a service provider.
iii. Suitable for business with strict compliance and security requirements.
• Use cases:
i. Bankind and financial institutions handling sensitive transactions.
ii. Government agencies managing confidential data.
iii. Large enterprises requiring custom IT solutions.
• Advantages:
i. Enhanced security and data privacy.
ii. Customization based on business needs.
iii. Greater compliance with industry regulations.
• Disadvantages:
i. High initial cost and maintenance expenses.
ii. Requires in-house IT expertise.
iii. Less scalable compared to public cloud services.
c) Hybrid Cloud:
• A combination of public and private cloud environments, allowing data and
applications to be shared between them.
• Examples: AWS Hybrid Cloud, Google Anthos, Microsoft Azure Hybrid.
• Features:
i. Offers flexibility in deploying applications across private and public cloud
environments.
ii. Allows businesses to keep critical workloads in private clouds while using
public clouds for less sensitive operations.
iii. Provides a balance between cost efficiency and security.
• Use cases:
i. Enterprises handling sensitive data but needing scalable cloud resources.
ii. Disaster recovery solutions where data backup is stored in the public cloud.
iii. E-commerce platforms that manage customer transactions privately while
hosting a website on a public cloud.
• Advantages:
i. Optimized cost management by using public and private clouds effectively.
ii. Improved business continuity with disaster recovery strategies.
iii. Greater scalability without compromising security.
• Disadvantages:
i. Complex setup and management.
ii. Requires seamless integration between private and public cloud
environments.
iii. Higher security risks if not properly managed.
d) Community Cloud:
• A cloud infrastructure shared by multiple organizations with similar requirements,
such as government agencies or research institutions.
• Examples: Government Cloud (GovCloud), Healthcare Cloud, Education Cloud.
• Features:
i. Designed for organizations with common interests, policies, and security
needs.
ii. Offers better security and compliance than public clouds.
iii. Cost is shared among the organizations.
• Use Cases:
i. Healthcare institutions sharing patient data securely.
ii. Universities collaborating on research projects.
iii. Government agencies managing shared infrastructure.
• Advantages:
i. Cost – effective as expenses are shared.
ii. Custom – built for specific industry needs.
iii. Enhanced security and compliance.
• Disadvantages:
i. Limited scalability compared to public clouds.
ii. Requires collaboration between multiple organizations.
iii. Complex governance and management.
Cloud services are categorized based on how they deliver computing resources:
New cloud technologies are evolving to meet modern business and computing needs:
a) Multi-Cloud:
• Using multiple cloud providers for different services.
• Examples: AWS + Google cloud + Microsoft Azure.
• Advantages:
i. Reduces dependency on a single provider.
ii. Improves resilience and performance.
iii. Optimizes cost by choosing the best service from different providers.
b) Serverless Computing:
• Developers write and deploy code without managing servers.
• Examples: AWS Lambda, Google Cloud Functions, Azure Functions.
• Advantages:
i. Lower operational costs.
ii. Automatic scaling
iii. Faster deployment.
c) Edge computing:
• Processing data closer to the source rather than in centralized cloud data centers.
• Examples: IoT devices, autonomous vehicles.
• Advantages:
i. Reduces latency.
ii. Improves real-time decision-making.
Risks:
Cloud computing offers numerous benefits such as scalability, cost savings, and flexibility.
However, it also presents several risks that organizations must consider when adopting cloud
services. These risks range from security threats to compliance challenges and operational issues.
Security is one of the primary concerns when using cloud services. Some key security risks
include:
a) Data Breaches:
• Risk: Sensitive data stored in the cloud can be accessed by unauthorized users due to
hacking, weak authentication, or vulnerabilities in the cloud provider’s system.
• Example: In 2019, Capital One suffered a massive cloud data breach, exposing 100
million customer records.
• Mitigation Strategies:
i. Use strong encryption for data at rest and in transit.
ii. Implement Multi-Factor Authentication
iii. Regularly audit access controls and permissions.
b) Data Loss:
• Risk: Data stored in the cloud may be accidentally deleted, corrupted, or lost due to
hardware failure, cyber-attacks, or cloud provider shutdown.
• Example: A cloud provider might experience a failure leading to permanent data
loss.
• Mitigation Strategies:
i. Maintain regular backups.
ii. Implement disaster recovery plans.
iii. Choose cloud providers that offer data replication across multiple locations.
c) Insider Threats:
• Risk: Employees, contractors, or even cloud service provider staff may misuse their
access privileges to steal or leak sensitive information.
• Examples: An employee with high-level access intentionally leaks confidential
company data.
• Mitigation Strategies:
i. Implement strict access controls and role-based permissions.
ii. Conduct regular security awareness training.
iii. Monitor and audit user activity.
d) Insecure APIs:
• Risk: Many cloud services provide APIs that can be exploited if not properly secured,
leading to data leaks and system breaches.
• Examples: A poorly configured API exposes customer information to the public.
• Mitigation strategies:
i. Use secure authentication and authorization methods for APIs.
ii. Regularly test APIs for vulnerabilities.
iii. Restrict API access using firewall rules.
e) Distributed Denial of Service (DDoS) Attacks:
• Risk: Attackers flood cloud services with traffic, making them unavailable to
legitimate users.
• Examples: AWS, Google Cloud, and other cloud services have faced DDoS attacks
affecting service availability.
• Mitigation strategies:
i. Use cloud-based DDoS protection services.
ii. Implement rate-limiting on APIs.
iii. Monitor traffic for unusual spikes.
Organizations using cloud computing must comply with various regulations and legal
requirements.
Operational Risks:
Operational challenges can affect an organization’s ability to use cloud services effectively.
a) Vendor Lock-in:
• Risk: Moving data and applications from one cloud provider to another can be
difficult due to proprietary technologies and compatibility issues.
• Examples: A company using AWS struggles to migrate to Google Cloud because of
different storage formats.
b) Downtime and Service Disruptions:
• Risk: Cloud services may become unavailable due to outages, affecting business
operations.
• Examples: In 2021, an AWS outage disrupted services like Netflix, Disney+, and
Amazon.
c) Limited Control and Visibility:
• Risk: Organizations relying on third-party cloud providers may have limited visibility
into how their data and applications are managed.
• Examples: A company using SaaS (Software as a Service) solutions cannot monitor
security settings.
Financial Risks:
Using cloud computing can lead to unexpected costs and financial burdens.
a) Unpredictable costs:
• Risk: Pay-as-you-go pricing models may lead to higher-than-expected costs if usage is
not carefully monitored.
• Examples: A company running large-scale data processing suddenly receives a
massive cloud bill.
b) Hidden Costs:
• Risk: Some cloud providers charge extra fees for data transfers, API calls, or
additional security features.
•
• Examples: Transferring data between cloud regions incurs unexpected fees.
a) Latency Issues:
• Risk: Cloud applications may experience slow response times due to network delays.
• Examples: A video streaming service experiences buffering due to high latency.
b) Integration Challenges:
• Risk: Businesses using on-premises infrastructure may struggle to integrate with
cloud applications.
• Examples: A legacy ERP system cannot connect to a cloud-based CRM platform.
Cloud computing powers the infrastructure required for smart city development.
Cloud computing plays a crucial role in the development and deployment of autonomous
vehicles.
a) Precision Farming:
• What it is: Cloud computing helps farmers optimize crop yields using real-time data.
• How it works:
i. IoT sensors monitor soil moisture, weather, and crop health.
ii. Cloud AI analyzes data to optimize irrigation and fertilization.
• Examples: John Deere’s cloud-based smart farming technology.
b) Drone – Based Crop Monitoring:
• What it is: Drones capture high-resolution images of farmland and process them
using cloud-based AI.
• How it works:
i. AI detects crop diseases and pest infestations.
ii. Farmers receive real-time alerts and recommendations.
• Examples: DJI Agriculture drones with cloud AI.
UNIT – 2
Cloud computing means storing andaccessing the data and programs on remote servers that
are hosted on the internet instead of the computer’s hard drive or local server. Cloud computing is
also referred to as Internet-based computing, it is a technology where the resource is provided as a
service through the internet to the user. The data that is stores can be files, images, documents, or
any other storable document.
Architecture of cloud computing is the combination of both service oriented architecture and
event driven architecture. Client infrastructure, application, service, runtime cloud, storage,
infrastructure, management and security all these are the components of cloud computing
architecture.
1. Frontend
2. Backend
• Scalability.
Key Characteristics:
1. Pay-as-you-go-model
2. Scalability: resources can be increased or decrease based on demand.
3. Self-service provisioning: users can request and deploy resources without human
intervention.
4. Automated resource management: cloud platforms automatically allocate resources based
on predefined rules and workload demands.
• Cost efficiency
• Flexibility
• Increased productivity
• Disaster recovery
Examples: Amazon web services (AWS) EC2, Google Cloud Compute Engine, Microsoft Azure Virtual
Machines.
Virtualization is the technology that enables the creation of multiple virtual instances (such
as Virtual Machines, Containers, and Virtual Networks) on a single physical server. This abstraction is
fundamental to cloud computing, allowing efficient resource utilization and scalability.
1. Abstracting Physical resources: enables multiple virtual instances to run on the same
hardware.
2. Enhancing resource utilization: maximizes hardware efficiency by sharing resources across
multiple users.
3. Enabling Multi-Tenancy: multiple customers can use the same physical hardware while
maintaining isolation.
4. Facilitating scalability: allows rapid scaling of computing resources without hardware
limitations.
1. Server Virtualization:
• Virtualizes physical serves into multiple virtual machines
• Example: VMWare vSphere, Microsoft Hyper-V, Kernel-based virtual machines.
2. Storage Virtualization:
• Combines multiple storage devices into a single logical storage pool.
• Example: Amazon S3, Google Cloud Storage, VMware vSAN.
3. Network Virtualization:
• Creates virtual network infrastructure that function independently of physical
networks.
• Example: AWS Virtual Private Cloud, Software-Defined Networking.
4. Desktop Virtualization:
• Allows remote access to virtual desktops running on cloud servers.
• Example: Microsoft Azure Virtual Desktop, Amazon WorkSpaces.
5. Application Virtualization:
• Enables applications to run in isolated environments independent of the operating
system.
• Example: Citrix XenApp, VMware ThinApp.
Challenges:
• Security risks
• Performance Overheads
• Vendor Lock-In
• Complexity in Management
Cloud computing provides scalable and cost-effective IT solutions, but it also introduces
security challenges. As organizations migrate to the cloud, they must address data security, privacy,
compliance, and cyber threats. This document provides a detailed overview of cloud security,
including key risks, best practices, security models, and solutions.
Cloud Security:
Cloud security refers to a set of policies, technologies, and controls designed to protect
cloud-based applications, data, and infrastructure from cyber threats. It involves securing cloud
platforms, networks, and services against unauthorized access, data breaches, and cyberattacks.
1. Data Security: Protecting data stored, transmitted, and processed in the cloud.
2. Identity and Access management: controlling access to cloud resources.
3. Network Security: Preventing unauthorized access and threats in cloud networks.
4. Application Security: Protecting cloud-based application from vulnerabilities.
5. Compliance and Regulatory Requirements: Ensuring adherence to data protection laws.
CPU Virtualization:
CPU virtualization is a key technology in cloud computing that enables multiple virtual
machines (VMs) to share the processing power of a single physical CPU. This abstraction allows cloud
providers to optimize hardware utilization, improve scalability, and support multi-tenancy.
• Efficient Resource Utilization – multiple VMs can run on the same physical machine.
• Cost savings – reduces the need for dedicated physical servers.
• Isolation and security – Virtual machines remain independent from each other.
• Scalability – Enables dynamic allocation of preprocessing power.
CPU virtualization involves creating a virtual CPU (vCPU) that acts like a physical processor
but is managed by the hypervisor. The process includes:
1. Hardware Abstraction – The hypervisor presents a virtualized CPU to het the guest OS.
2. Instruction Handling - CPU instructions from VMs are translated and executed by the host
CPU.
3. Process Scheduling – The hypervisor schedules vCPU execution time on the physical CPU.
4. Context Switching – The system switches between different VMs efficiently.
a) Full Virtualization:
• Uses a hypervisor to simulate on entire physical machine.
• VMs run unmodified guest OS.
• Example: VMware ESXi, Microsoft Hyper-V, KVM.
b) Para-Virtualization:
• Guest OS is modified to communicate with the hypervisor efficiently.
• Reduces overhead by allowing direct access to hardware.
• Example: Xen, VMware Tools
c) Hardware – Assisted Virtualization:
• Uses CPU extensions like Intel VT-x and AMD-V to improve performance.
• Reduces hypervisor overhead and enhances security.
• Example: VMware vSphere, Microsoft Hyper-V with VT-x support.
Challenges:
• Performance Overhead
• Resource Contention
• Security Risks.
Virtualization:
Virtualization is a technology that enables the creation of virtual instances of computing resources,
such as servers, storage, and networks. In cloud computing virtualization allows multiple users and
applications to share physical resources efficiently.
Importance:
Hypervisor:
A hypervisor (also called a Virtual Machine Monitor or VMM) is software that enables
virtualization by allowing multiple operating systems (OS) to run on a single physical machine. It
manages virtual machines (VMs) by allocating CPU, memory, and other resources.
Function of a Hypervisor:
1. Resource Allocation
2. Isolation
3. Security management
4. Hardware Abstraction
5. Live Migration
Types of Hypervisors:
Type 2 (Hosted Runs on top of an operating system and is suitable VMware Workstation,
Hypervisor) for testing environments. Slower than Type 1. Oracle VirtualBox, Parallels
Application:
Most cloud providers use Type 1 hypervisors due to their performance and security
advantages.
Storage virtualization is a technology that abstracts physical storage resources and presents
them as a single unified storage system. It helps in efficient data management, scalability, and high
availability in cloud environments.
Key components:
Storage virtualization can be classified into different types based on its implementation:
Block-Level Storage Aggregates multiple physical storage devices AWS EBS, SAN (Storage
Virtualization into a virtual block storage system. Area Networks)
File-Level Storage Abstracts file storage across AWS EFS, Azure Files, NFS (Network
Virtualization multiple servers. File System)
Object Storage Stores unstructured data as objects AWS S3, Azure Blob Storage, Google
Virtualization with metadata. Cloud Storage
Techonologies:
Benefits:
1. Scalability
2. High availability
3. Improved Performance
4. Cost savings
5. Disaster Recovery
The SPI Framework in cloud computing represents the three primary service models:
These service models define how cloud services are delivered to users, ranging from software
applications to complete infrastructure solutions. The SPI framework enables businesses and
individuals to choose the right level of cloud computing based on their needs.
Key characteristics:
1. On – Premises Installation
2. One – Time Licensing Fee
3. Manual Updates & Maintenance
4. Limited Accessibility
5. Higher Costs
Components:
1. Hardware : users must purchase and maintain physical servers, computers, and storage
2. Operating system: the software runs on OS, which also needs updates and maintenance.
3. Application software: purchased and installed locally, with limited flexibility.
4. Storage: Data is stored on local machines or private data centers.
5. Security: Users are responsible for securing software, networks, and data.
1. High Costs
2. Limited scalability
3. Complex maintenance
4. Accessibility Issues
5. Data loss risks.
Examples: Microsoft Office, salesforce, SAP ERP, Orcale Database, Microsoft exchange server.
Advantages:
1. Full control
2. Data privacy
3. No internet dependency
4. One-time cost
Disadvantages:
Cloud computing offers different deployment models based on how cloud resources are
managed, accessed and shared among users. These models define ownership, control, scalability,
and security considerations for businesses and organizations.
1. Public cloud
2. Private cloud
3. Hybrid cloud
4. Community cloud
1) Public Cloud:
A public cloud is a cloud computing model where resources (servers, storage, and
networking) are provided by a third-party cloud service provider (CSP) and are accessible
over the internet.
Key feature:
• Multi – Tenant Environment
• Scalability
• Cost-effective
• Managed by CSP
Examples : Amazon web services, Microsoft azure, google cloud platform IBM cloud.
Advantages:
• Low cost
• Accessibility
• Automatic updates
• High scalability
Disadvantages
• Security concerns
• Limited customization
• Performance issues
2) Private Cloud:
A private cloud is a cloud infrastructure that is exclusively used by a single organization. It
can be hosted on-premises or managed by a third-party provider.
Key features:
• Single – tenant environment
• Higher security & privacy
• Customization
• Greater control
Example: VMware vSphere, OpenStack,Microsoft Azure Stack, Oracle Cloud Private Cloud.
Advantage:
• Enhanced security
• Regaulatory compliance
• Customization
Disadvantages:
• High cost
• Requires IT Expertise
• Scalability Limitations.
3) Hybrid Cloud:
A hybrid cloud combines both public and private clouds, allowing businesses to use the best
of both environments.
Key features:
• Workload flexibility
• Data Protability
• Security & Compliance
Examples: Microsoft Azure Hybrid Cloud, AWS Outposts, Google Anthos, IBM Hybrid Cloud
Advantages:
• Flexibility
• Cost Efficiency
• Improved Security
Disadvantages:
• Complex Management
• Latency Issues
• Security Challenges
4) Community Cloud:
A community cloud is a cloud infrastructure shared by multiple organizations with common
interests such as healthcare, government, and financial institutions.
Key features:
• Multi – tenant Environment
• Compliance & Regulatory Support
• Lower Costs than Private Cloud
Advantages:
• Cost reduction
• Industry – Specific compliance
• Collaboration & Efficiency
Disadvantages:
• Limited control
• Slower innovation
Key Drivers:
• Cost savings
• Scalability
• Security
• Disaster recovery
• Remote work enablement
• Compliance
• Automation & AI
Cloud computing has revolutionized how individuals, businesses, and organizations access
and use computing resources. Instead of relying on on-premise infrastructure, users can now
leverage the cloud for storage, processing, collaboration, and application deployment.
1. Healthcare
2. Education
3. Financial Services
4. E – Commerce
5. Entertainment & Media
Governance in the Cloud:
Cloud governance refers to the policies, processes, and controls implemented to manage
cloud services efficiently while ensuring security, compliance, and cost optimization. It helps
organizations maintain visibility, control, and accountability over cloud resources.
Key Elements:
Organizations use different governance models based on business requirements and cloud adoption
strategies.
1. Centralized governance
2. Decentralized governance
3. Federated governance
Cloud computing offers scalability, cost-efficiency, and flexibility, but many enterprises still
face barriers to adoption. These challenges arise due to security concerns, compliance issues, cost
uncertainties, integration complexities, and resistance to change.
UNIT – 3
Security Issues in Cloud Computing: Infrastructure Security, Infrastructure Security: The Network
Level, the Host Level, the Application Level, Data Security and Storage, Aspects of Data Security,
Data Security Mitigation Provider Data and Its Security. Identity and Access Management: Trust
Boundaries and IAM, IAM Challenges, Relevant IAM Standards and Protocols for Cloud Services,
IAM Practices in the Cloud, Cloud Authorization Management
1. Data breaches
2. Insecure APIs
3. Misconfigurations
4. Insider threats
5. DDoS attacks
6. Compliance Issues
Infrastructure Security:
Cloud computing provides on-demand resources, scalability, and flexibility, but securing the
underlying infrastructure is critical. Cloud infrastructure security focuses on protecting compute,
storage, and network resources from cyber threats, unauthorized access, and misconfigurations.
Key Components:
1. Network security
2. Compute security
3. Storage security
4. Idenityt & access management (IAM)
5. Virtualization & Hypervisor Security
6. Compliance & regulatory Security
1. Network Security
2. Compute security
3. Storage security
4. IAM
5. Virtualization Security
6. Compliance
Key challenges:
Technologies:
1. Data encryption
2. Data loss prevention
3. Access control & Identity Management
4. Backup & Disaster Recovery
5. Threat Detection & Incident Response
Data Security Mitigation Provider Data and Its Security.( previous technologies)
Identity and Access Management (IAM): Trust Boundaries and IAM in Cloud Computing
Identity and Access Management (IAM) is a security framework that ensures only authorized users
and systems can access cloud resources. In cloud computing, IAM helps organizations define who
can access what, when, and under what conditions.
A trust boundary separates trusted and untrusted systems, networks, or identities. In cloud
computing, these boundaries help define who and what can access cloud resources.
External Outside users, third-party apps, or APIs Customers using a public cloud
(Untrusted) with limited or no access service
Hybrid (Conditional Partially trusted users or devices that Contractors accessing company
Trust) require extra verification systems via VPN
(B) Trust Boundaries in Cloud Deployment Models
1. Public Cloud: The cloud provider owns most of the trust boundary, but customers manage
user access.
2. Private Cloud: Organizations control trust boundaries with strict IAM policies.
3. Hybrid Cloud: Trust boundaries must be managed across on-premises and cloud
environments.
4. Multi-Cloud: Trust boundaries span multiple providers (AWS, Azure, Google Cloud),
requiring consistent IAM policies.
• Users should have only the minimum access needed for their job.
• Example: A developer may have access to test servers but not production databases.
• Grants access based on user attributes like job title, location, or device type.
• Example: A finance employee in the US can access budget reports, but one in Europe
cannot.
Ensures that users and systems are verified and authorized before accessing cloud resources.
• Enables users to log in with external credentials (e.g., Google, Microsoft, Okta).
Tracks who accessed what, when, and how to detect security threats.
• AWS CloudTrail, Azure Monitor, Google Cloud Logging track IAM activity.
• Tools: AWS GuardDuty, Azure Security Center, Google Security Command Center.
Azure Azure Active Directory (AAD) SAML, OAuth, Conditional Access Policies
Google Cloud IAM, Cloud Identity ABAC, Role-based IAM, Identity Federation
Challenge Solution
Managing multiple cloud identities Use federated identity management (Okta, Azure AD)
API and Service Account Security Restrict access using IAM roles & API keys rotation
IAM Challenges:
Cloud computing relies on various protocols to ensure secure, efficient, and seamless
communication between users, applications, and cloud services. These protocols help in areas such
as data transfer, authentication, networking, storage, and service management.
Data Transfer Protocols Enables secure file and data transfer FTP, SFTP, SCP, NFS, WebDAV
Service Management
Manages cloud services and APIs REST, SOAP, gRPC, SNMP
Protocols
These protocols help manage communication between cloud services, applications, and users.
• HTTP (Hypertext Transfer Protocol) is used for communication between web browsers and
cloud servers.
• HTTPS (HTTP Secure) encrypts data using TLS/SSL, ensuring secure communication.
• The fundamental protocol suite that enables cloud networking and internet
communication.
• TCP (Transmission Control Protocol) ensures reliable data transfer.
• Used by cloud providers like AWS Route 53, Azure DNS, and Google Cloud DNS.
These protocols are essential for transferring files and data between cloud environments.
• Standard protocol for uploading and downloading files between clients and cloud storage.
• Secure variants: FTPS (FTP Secure) and SFTP (Secure FTP) use encryption.
Security protocols protect cloud data, user authentication, and secure communications.
(A) Secure Sockets Layer (SSL) & Transport Layer Security (TLS)
• Used in enterprise IAM solutions like Okta, OneLogin, and Azure AD.
• Used by Google, Microsoft, and other cloud providers for federated identity management.
(E) Kerberos
These protocols enable efficient data storage and retrieval in cloud environments.
(B) Server Message Block (SMB) / Common Internet File System (CIFS)
• Supported by AWS, Google Cloud Storage, and other cloud storage services.
These protocols enable communication between cloud services, APIs, and applications.
Cloud Authorization Management is a critical security mechanism that ensures users, applications,
and systems have the right level of access to cloud resources. It determines who can access what,
under which conditions, and with what permissions.
Cloud authorization is managed using IAM (Identity and Access Management) frameworks, policies,
and role-based access controls.
There are several authorization models that cloud service providers (AWS, Azure, Google Cloud) use
to enforce access control.
• Users are assigned roles, and each role has specific permissions.
Example:
• "A Developer role can access source code repositories, but cannot modify IAM policies."
• "A Finance role can access billing data, but cannot create virtual machines."
Pros:
Simplifies access management by assigning users to predefined roles.
Ensures consistent and scalable access control.
Cons:
Not flexible for complex cloud environments with dynamic access needs.
• Access is granted based on user attributes (e.g., department, location, security clearance).
Example:
• "Users from Europe can access GDPR-protected data, but users from the US cannot."
Pros:
More granular access control than RBAC.
Dynamic policies adapt to changing user roles or environments.
Cons:
More complex to manage due to multiple attributes.
• The owner of a resource (e.g., file, database) can grant or revoke permissions.
Example:
• "The owner of a document in Google Drive can share it with other users and set
permissions."
Pros:
Flexible, allows users to control their own resources.
Cons:
Less secure – users may unintentionally expose data.
• "Only users with Top Secret clearance can access classified documents."
Pros:
Highly secure, prevents unauthorized data access.
Cons:
Rigid, difficult to implement in dynamic cloud environments.
IAM services provide authorization rules to define who can do what in the cloud.
Examples:
• AWS IAM Policies: JSON-based permissions for users, groups, and roles.
OAuth 2.0 is an open standard for token-based authorization. It allows third-party applications to
access cloud services securely.
Example:
• Google Drive uses OAuth 2.0 to allow third-party apps to access files without sharing
passwords.
• Never trust, always verify – Every access request must be authenticated and authorized,
regardless of whether it comes from inside or outside the organization.
Solutions:
Implement role reviews & automatic permission revocation.
Use Federated Identity Management (FIM) to unify authorization across multiple clouds.
Monitor IAM logs to detect suspicious access activities.
Unit – 4
Security Management in the Cloud Security Management Standards, Security Management in the
Cloud, Availability Management: SaaS, PaaS, IaaS Privacy Issues Privacy Issues, Data Life Cycle, Key
Privacy Concerns in the Cloud, Protecting Privacy, Changes to Privacy Risk Management and
Compliance in Relation to Cloud Computing, Legal and Regulatory Implications, U.S. Laws and
Regulations, International Laws and Regulations.
Cloud Security Management refers to strategies, policies, controls, and technologies used to protect
cloud resources, applications, and data from cyber threats. It ensures confidentiality, integrity, and
availability (CIA) of cloud-based systems.
• Compliance requirements (e.g., GDPR, HIPAA, ISO 27001) mandate strong security controls.
Identity & Access Management Controls who can access what in the IAM Policies, MFA,
(IAM) cloud. OAuth 2.0
IAM ensures that only authorized users and applications can access cloud resources.
Best Practices:
Role-Based Access Control (RBAC): Assign roles with limited permissions.
Multi-Factor Authentication (MFA): Require additional authentication (e.g., SMS, biometrics).
Just-In-Time (JIT) Access: Provide temporary access instead of permanent roles.
Example:
AWS IAM allows defining permissions for users, groups, and roles, preventing unauthorized access.
Encryption Standards:
AES-256: Encrypts stored data securely.
TLS 1.2 / 1.3: Secures data in transit.
Homomorphic Encryption: Allows computation on encrypted data.
Example:
Google Cloud encrypts data by default using AES-256 encryption.
Network security in cloud environments prevents unauthorized access, data breaches, and DDoS
attacks.
Security Mechanisms:
Virtual Private Cloud (VPC): Isolates cloud resources securely.
Firewalls & Intrusion Detection Systems (IDS/IPS): Block unauthorized traffic.
DDoS Protection: Cloudflare, AWS Shield, Azure DDoS Protection.
Example:
Azure Firewall prevents unauthorized access to virtual machines and databases.
Cloud applications must be protected from vulnerabilities like SQL Injection, Cross-Site Scripting
(XSS), and API abuse.
Best Practices:
Secure Software Development Lifecycle (SDLC): Use secure coding practices.
Web Application Firewalls (WAF): Protect against web attacks.
API Gateway & Rate Limiting: Prevent API abuse.
Example:
AWS API Gateway provides throttling and authentication for secure API access.
Cloud security teams must detect, analyze, and respond to threats in real time.
Example:
AWS GuardDuty detects anomalies and potential threats in cloud workloads.
Compliance Standards:
GDPR: Protects personal data in the EU.
HIPAA: Ensures healthcare data security.
ISO 27001: International cloud security standard.
Example:
Microsoft Azure offers Compliance Manager to help businesses meet legal and regulatory
requirements.
Employees with too much access abuse Least Privilege Access, IAM
Insider Threats
privileges. Reviews.
To effectively manage cloud security, organizations should implement strong security controls and
proactive monitoring.
Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualized computing
resources (e.g., virtual machines, storage, networking) on-demand. While IaaS offers scalability
and cost savings, it also raises privacy concerns related to data security, user control, and
regulatory compliance.
• Cross-border data storage: Data may be stored in different countries with varying privacy
laws.
Problem:
• When users store data in an IaaS cloud, who owns the data?
• Cloud providers may claim the right to process and analyze user data.
Solution:
Review the Service Level Agreement (SLA) to clarify data ownership rights.
Use client-side encryption to retain control over sensitive data.
• Data may be stored in different countries where privacy laws vary (e.g., GDPR in Europe,
CCPA in California).
Solution:
Choose a cloud provider that allows geographic control over data storage.
Encrypt data before uploading to prevent unauthorized access.
Problem:
Solution:
Use Virtual Private Cloud (VPC) for better isolation.
Enable resource segmentation with secure hypervisors (e.g., AWS Nitro, Azure Hyper-V).
Problem:
Solution:
Implement Multi-Factor Authentication (MFA) for cloud access.
Use Zero Trust Security Model – verify every access request.
Problem:
Solution:
Regularly audit IAM permissions and firewall settings.
Implement end-to-end encryption (AES-256 for storage, TLS for transmission).
• IaaS users must ensure compliance with privacy laws (GDPR, HIPAA, PCI-DSS).
Solution:
Choose cloud providers with certified compliance (ISO 27001, SOC 2).
Use Cloud Security Posture Management (CSPM) to monitor compliance.
1. Introduction
Cloud computing provides businesses and individuals with scalable, on-demand access to computing
resources. However, legal and regulatory challenges arise due to data privacy, security, compliance,
intellectual property (IP) rights, and cross-border data transfers. Organizations must understand
and adhere to relevant laws and industry standards to avoid legal risks.
Cloud services often store and process personal data, making compliance with privacy laws crucial.
Regulations vary by region and impose strict rules on data collection, storage, and sharing.
GDPR (General Data Protection European Requires user consent, data portability,
Regulation) Union (EU) and right to be forgotten.
HIPAA (Health Insurance Portability and Protects healthcare data and mandates
USA
Accountability Act) secure cloud storage.
Data Protection Act (DPA 2018) UK Implements GDPR principles for the UK.
Compliance Solutions:
Choose cloud providers that comply with relevant laws (e.g., AWS, Google Cloud, Azure with
GDPR compliance).
Encrypt personal data at rest and in transit.
Implement Identity and Access Management (IAM) to limit unauthorized access.
Example:
A company using Microsoft Azure for European customers must ensure GDPR compliance, including
data encryption, audit logs, and lawful processing of personal data.
• Data sovereignty means data is subject to the laws of the country where it is stored.
• Cross-border transfers of cloud data require compliance with local and international
regulations.
• GDPR (EU): Restricts personal data transfer to non-EU countries unless safeguards (e.g.,
Standard Contractual Clauses - SCCs) are in place.
• CLOUD Act (USA): Allows US authorities to access cloud data stored by US-based companies,
even outside the US.
• China’s Cybersecurity Law: Requires personal data and critical business data to be stored
within China.
Compliance Strategies:
Use Data Residency Options (e.g., AWS, Google Cloud, and Azure offer region-based storage).
Implement Privacy Shield Alternatives (e.g., Standard Contractual Clauses (SCCs) for GDPR
compliance).
Store sensitive customer data in local cloud regions when required by law.
Example:
A German company using AWS S3 storage must store customer data within Germany or the EU to
comply with GDPR.
• Cloud computing raises concerns about who owns the data stored in the cloud.
Example:
A software company using Google Cloud for AI model training must ensure that Google does not
claim ownership over its trained models and datasets.
Cloud services must meet industry-specific security standards to protect against data breaches and
cyberattacks.
PCI-DSS (Payment Card Industry Data Banking & E- Protects credit card transactions and
Security Standard) commerce payment data.
Example:
A fintech startup using AWS Lambda for payment processing must ensure PCI-DSS compliance to
protect credit card transactions.
SLAs define the rights, responsibilities, and performance guarantees of cloud service providers.
Example:
A business using IBM Cloud must ensure the SLA covers backup guarantees, incident response, and
legal compliance.
3. How Businesses Can Ensure Legal & Regulatory Compliance in the Cloud
• Identify which data is stored in the cloud and assess compliance risks.
• Select vendors with GDPR, HIPAA, SOC 2, and ISO 27001 certifications.
• Use Cloud Security Posture Management (CSPM) tools for real-time monitoring.
1. Introduction
Cloud computing in the United States is subject to multiple laws and regulations aimed at data
privacy, security, and compliance. These regulations affect businesses using cloud services for
storage, processing, and data transmission. Organizations must understand these laws to avoid legal
risks, protect sensitive data, and comply with industry requirements.
(A) The CLOUD Act (Clarifying Lawful Overseas Use of Data Act)
Purpose:
• Allows U.S. law enforcement to access data stored on cloud servers, even if the data is
located outside the U.S.
• Applies to U.S. cloud providers like AWS, Google Cloud, and Microsoft Azure.
Example:
A U.S. company using AWS in Germany may have its data accessed by U.S. law enforcement under
the CLOUD Act, raising privacy concerns in the EU.
Purpose:
• Requires encryption, access controls, and secure cloud storage for patient data.
• Applies to healthcare providers, insurers, and business associates (including cloud services
handling health data).
Example:
A hospital storing patient records in Microsoft Azure must ensure HIPAA compliance, encryption,
and access logging.
Purpose:
• Requires compliance with NIST (National Institute of Standards and Technology) security
controls.
• Introduced FedRAMP (Federal Risk and Authorization Management Program) for cloud
security assessments.
Implications for Cloud Users:
U.S. government agencies must use FedRAMP-authorized cloud services.
Contractors working with federal data must meet FISMA security standards.
Use NIST-compliant encryption, risk management, and incident response plans.
Example:
A federal agency using AWS GovCloud must ensure FISMA compliance and FedRAMP certification.
While the U.S. lacks a federal data privacy law like the EU’s GDPR, some states have introduced
their own regulations.
Purpose:
Example:
A cloud-based e-commerce platform serving California customers must provide data deletion and
access rights under CCPA.
Trend: The U.S. may introduce a federal data privacy law similar to GDPR in the future.
Purpose:
• Regulates cloud security for payment processing and credit card transactions.
• Applies to banks, e-commerce sites, and cloud services processing cardholder data.
Example:
A retail store using Stripe for cloud-based payments must ensure PCI-DSS compliance.
Purpose:
Example:
A publicly traded company using Oracle Cloud for financial reporting must meet SOX compliance.
Purpose:
Example:
A government contractor using IBM Cloud must follow NIST security guidelines.
Unit – 5
Audit and Compliance Internal Policy Compliance, Governance, Risk, and Compliance (GRC),
Regulatory/External Compliance, Cloud Security Alliance, Auditing the Cloud for Compliance,
Security-as-a- Cloud Advanced Topics Recent developments in hybrid cloud and cloud security.
1. Introduction
Audit and compliance in cloud computing ensure that organizations adhere to internal policies,
industry standards, and regulatory requirements. Effective compliance management minimizes
security risks, protects sensitive data, and ensures accountability. Internal policy compliance
involves governance frameworks, security controls, and audit mechanisms to maintain regulatory
alignment.
Cloud governance ensures proper control, security, and compliance in cloud environments.
Organizations must define internal policies based on industry standards and regulations.
Example:
A bank using AWS Cloud must implement strict IAM policies, data encryption, and continuous
auditing to comply with PCI-DSS and SOX requirements.
Audits assess whether cloud operations align with internal policies, industry regulations, and
security best practices.
Example:
A healthcare provider using Google Cloud undergoes regular HIPAA compliance audits to ensure
patient data protection.
PCI-DSS (Payment Card Industry Data Banking & E- Protects credit card transactions and
Security Standard) commerce payment data.
FedRAMP (Federal Risk and Authorization Approves cloud services for federal
U.S. Government
Management Program) use.
Example:
A fintech startup using AWS Cloud must comply with SOC 2 and PCI-DSS to process online payments
securely.
Organizations use Cloud Security Posture Management (CSPM) tools to automate compliance
monitoring.
Example:
A financial services company using Azure Cloud integrates Microsoft Defender for Cloud to
continuously monitor compliance with SOX regulations.
1. Introduction
Governance, Risk, and Compliance (GRC) in cloud computing is a strategic framework that
organizations use to ensure data security, regulatory compliance, and risk management in cloud
environments. With cloud adoption increasing, businesses must implement strong governance
policies, mitigate risks, and comply with industry regulations to protect sensitive data and avoid
legal issues.
Cloud governance defines rules, policies, and controls for managing cloud infrastructure and
services securely and efficiently.
Example:
A healthcare provider using AWS Cloud must follow HIPAA-compliant governance policies, including
data encryption, audit logging, and strict IAM controls.
Implement continuous
Compliance Violations Failure to meet regulatory standards.
compliance monitoring.
Example:
A financial institution using Azure Cloud must regularly audit IAM policies to prevent insider
threats and unauthorized access.
Compliance ensures that cloud services align with legal, regulatory, and industry standards.
FedRAMP (Federal Risk and Authorization Approves cloud services for federal
U.S. Government
Management Program) agencies.
Example:
A retail business using Google Cloud must comply with PCI-DSS to process secure online payments.
Organizations use GRC automation tools to monitor security risks and ensure compliance.
Example:
A U.S. federal agency using AWS GovCloud must use FedRAMP-approved GRC tools to comply with
FISMA regulations.
1. Introduction
The Cloud Security Alliance (CSA) is a non-profit organization dedicated to defining and promoting
best practices for secure cloud computing. CSA provides security guidelines, research, and
certification programs to help organizations secure cloud environments.
CSA plays a critical role in standardizing cloud security practices, ensuring compliance with
regulations, and providing risk assessment frameworks for cloud service providers (CSPs) and
enterprises.
The CSA STAR Program is a cloud security certification framework that verifies a cloud provider’s
security controls and compliance efforts.
STAR Level 1: Self- Cloud providers submit a self- Transparency in security and
Assessment assessment questionnaire. compliance measures.
STAR Level 2: Third-Party External auditors validate cloud Ensures compliance with ISO 27001
Certification provider security. and CSA best practices.
The Cloud Controls Matrix (CCM) is a security framework developed by CSA for cloud security
assessments. It includes 197 security controls across 17 cloud security domains.
Example:
A bank using Google Cloud follows CCM security guidelines to ensure compliance with financial
regulations.
This certification validates cloud service providers (CSPs) that meet high security standards.
Requires CSA STAR Certification and CCM compliance.
Recognized globally by governments and enterprises.
Example:
A SaaS company seeking enterprise customers can become a CSA Trusted Cloud Provider to gain
trust and credibility.
Example:
A cloud security engineer working in AWS can earn a CCSK certification to validate their expertise.
CSA publishes annual reports on the most critical cloud security threats.
CSA's "Treacherous 12" Cloud Security Threats:
1⃣ Data Breaches – Unauthorized access to sensitive cloud data.
2⃣ Misconfigurations – Poor security settings in cloud environments.
3⃣ Insider Threats – Malicious actions by employees or partners.
4⃣ Account Hijacking – Stolen cloud credentials used for unauthorized access.
5⃣ Insecure APIs – Weak or exposed cloud APIs.
6⃣ Denial-of-Service (DoS) Attacks – Cyberattacks disrupting cloud services.
7⃣ Lack of Cloud Visibility – Inability to monitor cloud workloads.
8⃣ Poor Identity & Access Management (IAM) – Weak authentication mechanisms.
9⃣ Compliance Violations – Failure to follow regulations like GDPR, HIPAA, PCI-DSS.
Malware & Ransomware Attacks – Viruses affecting cloud applications.
1⃣1⃣ Weak Cloud Governance – Lack of security policies and risk management.
1⃣2⃣ Data Loss – Accidental or malicious data deletion.
Example:
A cloud security team at a SaaS company may use CSA's Treacherous 12 list to enhance their
security strategy.
CSA emphasizes that security is a shared responsibility between cloud providers and customers.
Cloud Provider (CSP) Secures data centers, network infrastructure, and cloud platforms.
Cloud Customer Manages IAM, data encryption, compliance, and application security.
Example:
An enterprise using Microsoft Azure must configure strong IAM policies, while Azure ensures
physical security of data centers.
CSA helps organizations comply with global regulations through its frameworks.
Security-as-a- Cloud Advanced Topics Recent developments in hybrid cloud and cloud security:
1. Introduction
With the rapid adoption of cloud computing, security has become a critical concern for businesses.
Security-as-a-Service (SECaaS), hybrid cloud security models, and new advancements in cloud
security are reshaping how organizations protect their data and infrastructure.
2. Security-as-a-Service (SECaaS)
What is SECaaS?
Example: A company using Microsoft 365 SECaaS benefits from automated threat detection,
anti-malware, and access controls without deploying additional security appliances.
A hybrid cloud combines public cloud services (AWS, Azure, GCP) with on-premises or private cloud
infrastructure. Organizations use hybrid cloud to balance security, performance, and compliance.
Adopt Zero Trust Security – Restrict access using least privilege principles.
Use Multi-Cloud Security Solutions – Centralized SIEM, CASB, and IAM solutions.
Implement Data Encryption – Encrypt data in transit, at rest, and in use.
Automate Compliance Audits – Use CSPM (Cloud Security Posture Management) tools.
Monitor API Security – Prevent API abuse, unauthorized access, and injection attacks.
Example: A bank using AWS and private cloud ensures security by encrypting customer data,
enforcing IAM policies, and using a CASB for real-time monitoring.
AI-driven threat detection – Uses behavioral analytics to detect anomalies and cyber threats.
Automated security responses – AI-powered SIEM tools prevent attacks in real time.
Phishing & malware detection – AI scans emails and files for malicious content.
Example: Google Cloud’s Chronicle Security uses AI-based threat intelligence to detect
advanced persistent threats (APTs).
Never trust, always verify – Every request is authenticated before access is granted.
Microsegmentation – Isolates workloads to reduce lateral movement of threats.
Continuous monitoring – Tracks user activity and anomalies in real-time.
Example: Microsoft Azure enforces Zero Trust by requiring MFA, risk-based authentication, and
just-in-time access.
Encrypts data even during processing – Protects sensitive workloads from insider threats.
Secure Enclaves – Uses trusted execution environments (TEEs) for data security.
Enhances compliance – Ensures GDPR, HIPAA, and PCI-DSS compliance.
Example: Google Cloud Confidential VMs use Intel SGX to secure workloads against
unauthorized access.
Unified security controls – Protects workloads across AWS, Azure, GCP, and private clouds.
Cross-cloud visibility – SIEM and Extended Detection and Response (XDR) solutions.
Centralized identity management – Uses federated IAM and Single Sign-On (SSO).
Example: IBM Cloud Pak for Security provides cross-cloud threat intelligence for multi-cloud
deployments.
Example: AWS CodePipeline + Snyk scans containerized apps for vulnerabilities before
deployment.
Post-Quantum Cryptography (PQC) – Protects data against future quantum computing attacks.
End-to-End Encryption Upgrades – Organizations adopting quantum-resistant algorithms.
Example: IBM Cloud Quantum Security offers quantum-safe encryption for data protection.