Unit 4
Unit 4
SECURITY IN CLOUD
Overview of Cloud Computing, Security challenges in Cloud, Cloud Computing Security benefits,
Cloud Computing Security Architecture, Security Threats-Data breaches, DDoS attacks,
Vulnerabilities – Configuration error and Patch management, Security policies and Procedures,
Case studies on PCI DSS 3.0 Compliant Cloud Tenant, HIPAA.
Cloud Computing Security Architecture refers to the framework of policies, technologies, controls,
and best practices designed to protect cloud environments from threats and vulnerabilities. It ensures
confidentiality, integrity, and availability of data and applications in the cloud.
Key Components of Cloud Security Architecture
Identity & Access Management (IAM)
Purpose: Controls who can access cloud resources and what actions they can perform.
Role-Based Access Control (RBAC)
Multi-Factor Authentication (MFA)
Single Sign-On (SSO)
Zero Trust Security Model
Data Security & Encryption
Purpose: Protects data at all stages (at rest, in transit, and in use).
Encryption (AES-256, TLS, SSL)
Tokenization & Data Masking
Cloud Key Management Services (KMS)
Network Security
Purpose: Secures cloud network communications and prevents cyber threats.
Firewalls & Virtual Private Networks (VPN)
Intrusion Detection & Prevention Systems (IDS/IPS)
Distributed Denial of Service (DDoS) Protection
Security Monitoring & Threat Detection
Purpose: Identifies and mitigates potential security risks.
Security Information and Event Management (SIEM)
Cloud Access Security Broker (CASB)
AI-Powered Threat Detection
Compliance & Regulatory Controls
Purpose: Ensures adherence to industry standards and legal requirements.
GDPR, HIPAA, ISO 27001, PCI-DSS Compliance
Audit Logging & Monitoring
Data Residency & Sovereignty Controls
Cloud Security Posture Management (CSPM)
Purpose: Detects misconfigurations and security gaps in cloud environments.
1. Data Breaches
A data breach occurs when unauthorized individuals gain access to sensitive information stored in
the cloud. This can lead to financial losses, reputational damage, and legal consequences.
Causes of Data Breaches in the Cloud
Weak Authentication – Poor password management, lack of Multi-Factor Authentication (MFA).
Misconfigured Cloud Storage – Exposed databases or storage buckets (e.g., AWS S3, Google Cloud
Storage).
Insider Threats – Employees or cloud providers misusing access rights.
Insecure APIs – Unprotected APIs can expose sensitive data.
Prevention & Mitigation
Use Strong IAM Policies – Implement Role-Based Access Control (RBAC) and Least Privilege
Access.
Encrypt Data – Secure data at rest and in transit with AES-256 encryption.
Enable Multi-Factor Authentication (MFA) – Reduce the risk of credential theft.
Monitor & Audit Access Logs – Detect unusual activity early.
Security policies and procedures form the foundation of cloud security governance, ensuring that
organizations protect data, applications, and infrastructure while maintaining compliance with
regulations.
Cloud compliance is essential for industries handling sensitive data. Two critical regulatory
frameworks include:
1. PCI DSS 3.0 (Payment Card Industry Data Security Standard 3.0) – Ensures secure
handling of payment card data.
2. HIPAA (Health Insurance Portability and Accountability Act) – Protects healthcare data
and patient information.