Major Project

 

Cloud security

Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyber attacks and cyber threats.

The goals of cloud security and cybersecurity as a whole are the same. Operators of cloud security must protect assets that are located within the infrastructure of a third-party service provider, which distinguishes it apart from traditional cybersecurity.

Why Cloud security is important?

Business-critical apps and data are moving to trustworthy third-party cloud service providers (CSPs) as enterprise cloud usage increases. The majority of major CSPs include standard cybersecurity instruments with monitoring and alerting features in their service offerings, but internal IT security staff may find that these tools don't cover all of the bases, indicating that there are cybersecurity gaps between what the CSP offers and what the enterprise needs. Data loss and theft are now more likely as a result.

Cloud computing operates in three main environments:

1.    Public cloud services: CSPs host the websites. SaaS (software as a service), PaaS (platform as a service), and IaaS (infrastructure as a service) are a few examples.

2.    Private clouds are hosted by or for a single organization.

3.    Hybrid clouds include a mix of public and private clouds.

The shared responsibility model, though not organised is a framework that specifies which security tasks are the responsibility of the CSP and which are the customer's.

How to secure data in the cloud

The procedures needed to protect data in the cloud differ. Considerations must be made concerning the nature and sensitivity of the data that needs to be safeguarded, cloud architecture, the availability of built-in and third-party solutions, and the quantity and classifications of people who are permitted access to the data.

These are the general best practices to secure business data in the cloud include the following:

·         Encrypt data at rest, in use and in motion.

·         Use two factor authentication or multifactor authentication to verify user identity before granting access.

·         Isolate cloud data edge backups to prevent ransomware threats.

·         Adopt cloud edge security protection, including firewalls and antimalware.

·         Ensure data location visibility and control to identify where data resides and to implement restrictions on weather data can be copied to other location inside or outside the cloud.

·         Log and monitor all aspect of data access, addition and changes.

Top cloud security challenges

·         insider threats

·         data loss

·         data breaches

·         IAM

·         key management

·         access control

·         phishing

·         malware

As for cloud security challenges specifically, administrators have to deal with issues that include the following

·         cloud account hijacking.

·         lack of cloud visibility and control.

·         working with cloud security tools that in-house administrators may be unfamiliar with.

·         tracking and monitoring where data is located both in transit and at rest.

·         misconfigurations.

·         weak cloud control plane.

·         challenges understanding the shared responsibility model.

·         nefarious use of cloud services (Froehlich, A., Shea, S. and Cole, B. 2021).

References:

Froehlich, A., Shea, S. and Cole, B. (2021) What is cloud security?, Security. Available at: https://www.techtarget.com/searchsecurity/definition/cloud-security (Accessed: 03 June 2023).

(No date) Cloud security issues - IEEE conference publication. Available at: https://ieeexplore.ieee.org/abstract/document/5283911/metrics (Accessed: 03 June 2023).

Author links open overlay panelAshish Singh et al. (2016) Cloud security issues and challenges: A survey, Journal of Network and Computer Applications. Available at: https://www.sciencedirect.com/science/article/pii/S1084804516302983 (Accessed: 03 June 2023).

Comments

Popular posts from this blog

Academic Paper Summary

Software (Example) ALTERYX

Case Study (Conclusion)