Cloud Computing Security Risk: (Chapter Five)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Cloud Computing Security

Risk

[Chapter Five]
Dr. Ethar Abdul Wahhab

‫السيبان‬
‫ر‬ ‫ فرع االمن‬/ ‫ المرحلة الرابعة‬/ ‫ قسم علوم الحاسوب‬/ ‫كلية العلوم‬
Chapter Five Cloud Computing Security Risk

Cloud Computing Security Risk


5.1 introduction

In the cloud, responsibility for assuring adequate security is frequently shared


among users, providers, and any third-party firms that users rely on for security-
sensitive software or configurations. Cloud users are responsible for application-
level security. Cloud providers are responsible for physical security and some
software security such as enforcing external firewall policies.

5.2 Cloud Security Risk

1. Spoofing identity: An example of identity spoofing is illegally accessing


and then using another user’s authentication information, such as username
and password. Security controls to counter such threats are in the area of
authentication.
2. Tampering with data: Data tampering involves the malicious modification
of data. Examples include unauthorized changes made to persistent data,
such as that held in a database, and the alteration of data as it flows between
two computers over an open network, such as the Internet. Relevant security
controls are in the area of integrity.
3. Repudiation: Repudiation threats are associated with users who deny
performing an action without other parties having any way to prove
otherwise for example, a user performs an illegal operation in a system that
lacks the ability to trace the prohibited operations. Relevant security controls
are in the area of non-repudiation, which refers to the ability of a system to
counter repudiation threats. For example, a user who purchases an item

Dr. Ethar Abdul Wahhab Page 55


Chapter Five Cloud Computing Security Risk

might have to sign for the item upon receipt. The vendor can then use the
signed receipt as evidence that the user did receive the package.
4. Information disclosure: Information disclosure threats involve the
exposure of information to individuals who are not supposed to have access
to it for example, the ability of users to read a file that they were not granted
access to, or the ability of an intruder to read data in transit between two
computers. Relevant security controls are in the area of confidentiality.
5. Denial-of-service: Denial-of-service (DoS) attacks deny service to valid
Users for example, by making a Web server temporarily unavailable or
unusable. Relevant security controls are in the area of availability.
6. Elevation of privilege: In this type of threat, an unprivileged user gains
privileged access and thereby has sufficient access to compromise or destroy
the entire system. Elevation of privilege threats include those situations in
which an attacker has effectively penetrated all system defenses and become
part of the trusted system itself, a dangerous situation indeed. Relevant
security controls are in the area of authorization.
5.3 cloud computing Threats
1. Threats from external attackers: External attackers use a variety of attack
operations such as security vulnerabilities, malware attacks, and network
tapping to gain unauthorized access to cloud data. Attackers may tamper
with data or delete it for malicious reasons, resulting in data loss or make
data incorrect.
2. Threats from internal participants: When dealing with a cloud computing
service, both the CSP and the third-party auditor are not entirely trusted as
internal participants. So that the provider of the service cloud is a service

Dr. Ethar Abdul Wahhab Page 56


Chapter Five Cloud Computing Security Risk

provider honest, but vulnerable or curious or greedy, besides the third-party


auditor is honest but curious.
5.4 Cloud Security Requirements
1. Authentication: It means user identity verification of the cloud user,
user data origin and content authentication.
2. Authorization and access management: It includes the permission to
access the data needed by the entity. Customer account management is
designed to simplify the creation of accounts and allow access to
schemes and resources in that cloud.
3. Privacy: Privacy is specific to sensitive information for one or more
users that used cloud computing, which must be hidden from other users
when they use cloud computing.
4. Data integrity: The concept of data integrity is to store data correctly on
cloud computing without any change.
5. Availability: Backup, recovery systems, fault tolerance, and parallel
copy technologies can be used to provide the availability feature.
Therefore, various attacks must be prevented and at the same time, the
data integrity of the system must be ensured.
5.5 Cloud security practices

1. Select a Secure Cloud Service Provider

Whether you’re looking to store files or host a website on the cloud, selecting a
secure cloud service provider is important. Keep in mind the following
considerations:

Dr. Ethar Abdul Wahhab Page 57


Chapter Five Cloud Computing Security Risk

 Reputation: look for cloud services with high reliability and an uptime
guarantee of at least 99.9%. A good provider ensures that all files and
data remain accessible without frequent interruptions.

 Cloud security infrastructure: check for protocols like firewalls,


intrusion detection systems, encryption, access controls, and regular
security updates. These cloud security measures help safeguard data and
infrastructure from potential threats.

 Data centers: cloud platforms typically give information on their data


center locations, so you can choose the one closest to you or your target
audience to ensure low latency. Also, consider checking if the host’s
facilities comply with your region’s security and privacy regulations.

2. Understand the Risks and Responsibilities of Using a Cloud Provider

Providers offering cloud services are responsible for maintaining their network
and the physical security of their cloud infrastructure. That said, the cloud
customer must safeguard their data, too. In cloud computing, this is called
the shared responsibility model.
Data breaches are one of the biggest challenges public cloud providers face,
which can lead to identity theft and a damaged brand reputation.
To mitigate cloud security risks, check the cloud service providers’ terms of
service for the following information:

 Data ownership : understand who owns the data stored on the cloud
platform and the rights and permissions granted to the provider.
Regularly review these terms in the agreement to ensure they align with
your expectations.
Dr. Ethar Abdul Wahhab Page 58
Chapter Five Cloud Computing Security Risk

 Response to security incidents : check the provider’s procedures and


responsibilities during a security incident. Note how they handle data
breaches, their notification process, and their steps to address such
incidents.

 Service Level Agreements (SLAs) : these documents typically define


the cloud provider’s uptime guarantee, response times for security
incidents, and data recovery timelines.

 Data backup and access recovery : see what kind of backup and
recovery mechanisms the provider offers. We recommend finding a host
offering daily backups.

 Data management and security : look for encryption measures, access


controls, and security certifications demonstrating its commitment to
safeguarding sensitive data.

3. Set a Strict Identity and Access Management (IAM) System

Identity and Access Management (IAM) refers to systems and policies to


control access to a cloud environment’s resources.
A strong IAM system ensures that only authorized individuals can view or
manage specific data at a particular time and in the appropriate manner.
To establish proper access management policies, make sure to implement the
following measures:

 Strong password policies : all users should use complex and unique
passwords that are difficult to crack. Avoid reusing passwords to prevent

Dr. Ethar Abdul Wahhab Page 59


Chapter Five Cloud Computing Security Risk

hackers from gaining access to all your accounts. Renew the passwords
regularly to strengthen your cloud access control.

 Multi-factor authentication (MFA): this feature adds an extra security


layer by requiring users to provide additional verification, like a unique
code sent to their personal devices.

 Role-based cloud access control: assign specific roles and privileges to


each user based on their responsibilities and job requirements. This way,
only select individuals can access sensitive data.

 Log management and monitoring: track user activities to detect


anomalies and identify suspicious behavior. Audit the access credentials
to remove users who no longer work with you from signing in to the
cloud environment

How Does Cloud Security Work?

 Revealing what cloud computing platforms and services their users


access.

 Monitoring cloud computing activity to detect attacks and user actions


that unintentionally put the organization at risk.

 Preventing cyber-attackers and other unauthorized users from accessing


sensitive data and resources.

 Protecting users’ cloud-based accounts from takeover.

 Enforcing security and compliance policies.

Dr. Ethar Abdul Wahhab Page 60

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy