CC - Unit 1
CC - Unit 1
Cloud Computing
Unit 1
Cloud Reference Architectures and Security
Service Models:
1. Software as a Service (SaaS). The capability provided to the
consumer is to use the provider’s applications running on a
cloud infrastructure2 . The applications are accessible from
various client devices through either a thin client interface,
such as a web browser (e.g., web-based email), or a program
interface. The consumer does not manage or control the
underlying cloud infrastructure including network, servers,
🎀3🎀
Deployment Models:
1. Private cloud. The cloud infrastructure is provisioned for
exclusive use by a single organization comprising multiple
consumers (e.g., business units). It may be owned,
managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off
premises.
2. Community cloud. The cloud infrastructure is provisioned for
exclusive use by a specific community of consumers from
organizations that have shared concerns (e.g., mission,
🎀4🎀
1. Storage
Public cloud storage consists of storage capacity and technology
as-a-service, which helps organizations reduce or eliminate the
capital costs of building and maintaining in-house storage
capabilities. By storing the same company data on multiple
machines, cloud storage offers the redundancy needed to support
business continuity in the face of a natural disaster, an outage or
other emergencies.
5. Low code
Low code is a visual approach to software featuring a graphical
user interface with drag-and-drop features that support the
automation of the development process. Low-code platforms
democratize app development for “citizen” developers—users
with little formal coding experience. Low code helps businesses
streamline workflows and accelerate the development of websites
and mobile apps, the integration of external plugins, and cloud-
based next-gen technologies, like artificial intelligence (AI) and
machine learning (ML).
🎀6🎀
6. Analytics
With the rise of data collected from mobile phones, the Internet of
Things (IoT), and other smart devices, companies need to analyze
data more quickly than ever before. Big data analytics—the use of
advanced analytic techniques against very large, diverse big data
sets—has become crucial to business success. A public cloud
environment provides the computing and networking
infrastructure needed to support big data so companies can make
faster data-driven decisions and deliver better customer
experiences in real-time and at scale.
8. Generative AI
With its massive need for compute, storage and networking
capabilities, generative AI needs the cloud to process data in real-
time and at scale. Public cloud providers offer companies the
capability to access data and harness processing power from
multiple distributed data centers that can support generative AI
workloads.
9. Edge computing
Edge computing brings enterprise applications closer to data
sources (e.g., mobile phones, sensors, IoT, devices or local edge
servers) for faster insights, improved response times and better
🎀7🎀
2. ISO-27017
A development of ISO-27001 that includes provisions unique to
cloud-based information security. Along with ISO-27001
compliance, ISO-27017 compliance should be taken into account.
This standard has not yet been introduced to the marketplace. It
attempts to offer further direction in the cloud computing
information security field. Its purpose is to supplement the advice
provided in ISO/IEC 27002 and various other ISO27k standards,
such as ISO/IEC 27018 on the privacy implications of cloud
computing, and ISO/IEC 27031 on business continuity.
3. ISO-27018
The protection of personally identifiable information (PII) in public
clouds that serve as PII processors is covered by this standard.
Despite the fact that this standard is especially aimed at public-
cloud service providers like AWS or Azure, PII controllers (such as
a SaaS provider processing client PII in AWS) nevertheless bear
some accountability. If you are a SaaS provider handling PII, you
should think about complying with this standard.
4. CIS controls
Organizations can secure their systems with the help of Internet
Security Center (CIS) Controls, which are open-source policies
based on consensus. Each check is rigorously reviewed by a
number of professionals before a conclusion is reached.
To easily access a list of evaluations for cloud security, consult
the CIS Benchmarks customized for particular cloud service
providers. For instance, you can use the CIS-AWS controls, a set
of controls created especially for workloads using Amazon Web
Services (AWS).
5. FISMA
In accordance with the Federal Information Security Management
Act (FISMA), all federal agencies and their contractors are
🎀9🎀
8. SOC Reporting
A form of audit of the operational processes used by IT businesses
offering any service is known as a “Service and Organization
Audits 2” (SOC 2). A worldwide standard for cybersecurity risk
management systems is SOC 2 reporting. Your company’s
policies, practices, and controls are in place to meet the five trust
principles, as shown by the SOC 2 Audit Report. The SOC 2 audit
report lists security, availability, processing integrity,
confidentiality, and confidentiality as security principles. If you
offer software as a service, potential clients might request proof
that you adhere to SOC 2 standards.
9. PCI DSS
🎀10🎀
For all merchants who use credit or debit cards, the PCI DSS
(Payment Card Industry Data Security Standard) provides a set of
security criteria. For businesses that handle cardholder data,
there is PCI DSS. The PCI DSS specifies fundamental technological
and operational criteria for safeguarding cardholder data.
Cardholders are intended to be protected from identity theft and
credit card fraud by the PCI DSS standard.
10. HIPAA
The Health Insurance Portability and Accountability Act (HIPAA),
passed by the US Congress to safeguard individual health
information, also has parts specifically dealing with information
security. Businesses that handle medical data must abide by
HIPAA law. The HIPAA Security Rule (HSR) is the best choice in
terms of information security. The HIPAA HSR specifies rules for
protecting people’s electronic personal health information that a
covered entity generates, acquires, makes use of or maintains.
Threat Agents
Encryption:
The data, by default, is coded in a readable form known as
plaintext. When transmitted over a network, the risk is
unauthorized and potentially dangerous access.
🎀15🎀
Hashing:
Hashing is the conversion of a string of characters into a limited
number of short lengths or a key that reflects the original string.
Hashing is used to identify and retrieve items from the database
because it is faster to find an object using the shorter hashed key
than to find it using the original value. It is also used in many
encryption algorithms.
There are many well-known hash functions used in cryptography.
These include message-digest hash works MD2, MD4, and MD5,
which is used to incorporate digital signatures into a short form
called message-digest, and the Secure Hash Algorithm (SHA), a
standard algorithm, which makes it large (60- bit) digestion
message and similar to MD4. An effective hash function for
storing and retrieving, however, may not work for cryptographic
detection purposes or errors.
Digital Signatures:
The digital signature mechanism is a means of providing data
integrity, data authenticity through authentication, and non-
repudiation. A message is assigned a digital signature prior to
transmission, and if the message experiences any subsequent,
unauthorized modifications then it is rendered as invalid. A digital
signature provides evidence that the message received is the
same as the original message sent by the rightful sender.
Single Sign-On:
The single sign-on (SSO) mechanism enables one cloud service
consumer to be authenticated by a security broker, which
establishes a security context while the cloud service consumer
accesses cloud-based IT resources. Otherwise, with every
subsequent request, the service consumer would need to re-
authenticate itself.
The advantage to the SSO machine is how it enables independent
IT resources to generate and distribute operational authorization
and validation signals. The information originally provided by the
cloud client remains active during the user’s session, while its
🎀17🎀