Major Project
Cloud security
Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data,
applications and infrastructure from cyber attacks and cyber threats.
The
goals of cloud security and cybersecurity as a whole are the same. Operators of
cloud security must protect assets that are located within the infrastructure
of a third-party service provider, which distinguishes it apart from
traditional cybersecurity.
Why Cloud security is important?
Business-critical apps and data are moving to
trustworthy third-party cloud service providers (CSPs) as enterprise cloud
usage increases. The majority of major CSPs include standard cybersecurity
instruments with monitoring and alerting features in their service offerings,
but internal IT security staff may find that these tools don't cover all of the
bases, indicating that there are cybersecurity gaps between what the CSP offers
and what the enterprise needs. Data loss and theft are now more likely as a
result.
Cloud computing operates in three main environments:
1.
Public cloud
services: CSPs host the websites. SaaS (software as a service), PaaS (platform
as a service), and IaaS (infrastructure as a service) are a few examples.
2.
Private clouds
are hosted by or for a single organization.
3.
Hybrid clouds
include a mix of public and private clouds.
The shared responsibility model, though not
organised is a framework that specifies which security tasks are the
responsibility of the CSP and which are the customer's.
How to secure data in the cloud
The procedures needed to protect data in the
cloud differ. Considerations must be made concerning the nature and sensitivity
of the data that needs to be safeguarded, cloud architecture, the availability
of built-in and third-party solutions, and the quantity and classifications of
people who are permitted access to the data.
These are the general best practices to
secure business data in the cloud include the following:
·
Encrypt data
at rest, in use and in motion.
·
Use two factor
authentication or multifactor authentication to verify user identity before granting
access.
·
Isolate cloud data
edge backups to prevent ransomware threats.
·
Adopt cloud edge
security protection, including firewalls and antimalware.
·
Ensure data location
visibility and control to identify where data resides and to implement restrictions
on weather data can be copied to other location inside or outside the cloud.
·
Log and monitor
all aspect of data access, addition and changes.
Top cloud security challenges
·
insider threats
·
data loss
·
data breaches
·
IAM
·
key management
·
access control
·
phishing
·
malware
As for cloud security challenges specifically, administrators
have to deal with issues that include the following
·
cloud account
hijacking.
·
lack of cloud
visibility and control.
·
working with cloud
security tools that in-house administrators may be unfamiliar with.
·
tracking and
monitoring where data is located both in transit and at rest.
·
misconfigurations.
·
weak cloud
control plane.
·
challenges
understanding the shared responsibility model.
·
nefarious use of
cloud services (Froehlich,
A., Shea, S. and Cole, B. 2021).
References:
Froehlich, A., Shea, S. and Cole, B. (2021) What is cloud security?,
Security. Available at:
https://www.techtarget.com/searchsecurity/definition/cloud-security (Accessed:
03 June 2023).
(No date) Cloud security issues - IEEE conference publication.
Available at: https://ieeexplore.ieee.org/abstract/document/5283911/metrics
(Accessed: 03 June 2023).
Author links open overlay panelAshish Singh et al. (2016) Cloud
security issues and challenges: A survey, Journal of Network and
Computer Applications. Available at:
https://www.sciencedirect.com/science/article/pii/S1084804516302983 (Accessed:
03 June 2023).
Comments
Post a Comment