CC Unit 4 Notes
CC Unit 4 Notes
Cloud Computing
Unit 4
Engineering in One Video (EIOV) Watch video on EIOV
Topics to be covered...
Inter cloud resource management
Topologies used in inter cloud architecture
Types of resource provisioning
Resource provisioning methods
Cloud security challenges
Security governance
Virtual machine security
IAM
Security standards
Happy Ending!
Engineering in One Video (EIOV) Watch video on EIOV
Inter Cloud
Connected cloud networks, including public, private and hybrid clouds.
Goal- Improve interoperability of cloud networks.
Used to connect different cloud computing platforms.
Limitation- limited physical resources.
Inter-cloud resource management in cloud computing refers to the process of optimizing
and coordinating the allocation, utilization, and management of computing resources across
multiple cloud service providers and cloud environments.
Types: Federation and Multi cloud.
Benefits of ICRM
Flexibility and Vendor Neutrality
Redundancy and Disaster Recovery
Geographic Reach
Engineering in One Video (EIOV) Watch video on EIOV
Topologies used in
inter cloud architecture
Engineering in One Video (EIOV) Watch video on EIOV
Types of resource
provisioning
Engineering in One Video (EIOV) Watch video on EIOV
Resource provisioning
Resource provisioning, in the context of cloud computing and IT infrastructure
management, refers to the allocation, management, and deployment of computing
resources to meet the demands of applications, workloads, and services.
Effective resource provisioning ensures that the right amount of resources is allocated at
the right time to maintain optimal system performance and resource utilization.
It takes SLA into consideration for providing services to the cloud users.
Static Provisioning
Dynamic Provisioning
Hybrid Provisioning
Auto-Scaling Provisioning
Engineering in One Video (EIOV) Watch video on EIOV
Resource provisioning
methods
Engineering in One Video (EIOV) Watch video on EIOV
Cloud security
challenges
Engineering in One Video (EIOV) Watch video on EIOV
Service models:
IaaS
PaaS
SaaS
Engineering in One Video (EIOV) Watch video on EIOV
Preventive control
Deterrent control
Corrective control
Engineering in One Video (EIOV) Watch video on EIOV
Security governance
Engineering in One Video (EIOV) Watch video on EIOV
Security governance
Cloud security governance involves defining and implementing policies, procedures, and
controls to ensure the secure and compliant use of cloud services and resources within an
organization.
Challenges:
Lack of Visibility
Data Security and Privacy
Identity and Access Management
Shared Responsibility Model
Engineering in One Video (EIOV) Watch video on EIOV
Risk Assessment
Data Encryption
Virtual machine
security
Engineering in One Video (EIOV) Watch video on EIOV
IAM
Engineering in One Video (EIOV) Watch video on EIOV
IAM features:
Shared access to your AWS account
Granular permissions
Secure access to AWS resources for applications that run on Amazon EC2
Multi-factor authentication (MFA)
Identity federation
Engineering in One Video (EIOV) Watch video on EIOV
Advantages
Security
Efficiency
Compliance
User Convenience
Disadvantages
Complexity
Cost
User Resistance
Integration Challenges
Engineering in One Video (EIOV) Watch video on EIOV
IAM Architecture
Engineering in One Video (EIOV) Watch video on EIOV
Security standards
Engineering in One Video (EIOV) Watch video on EIOV
IAM Architecture
1. NIST (National Institute of Standards and Technology):
NIST is a federal organization in the US that creates metrics and standards to boost
competition in the scientific and technology industries.
The National Institute of Regulations and Technology (NIST) developed the Cybersecurity
Framework to comply with US regulations such as the Federal Information Security
Management Act.
NIST places a strong emphasis on classifying assets according to their commercial value
and adequately protecting them.
2. ISO-27017:
A development of ISO-27001 that includes provisions unique to cloud-based information
security.
Along with ISO-27001 compliance, ISO-27017 compliance should be taken into account.
This standard has not yet been introduced to the marketplace.
It attempts to offer further direction in the cloud computing information security field.
Engineering in One Video (EIOV) Watch video on EIOV
IAM Architecture
3. ISO-27018:
The protection of personally identifiable information (PII) in public clouds that serve as PII
processors is covered by this standard.
Despite the fact that this standard is especially aimed at public-cloud service providers like
AWS or Azure.
If you are a SaaS provider handling PII, you should think about complying with this
standard.
4. CIS controls:
Organizations can secure their systems with the help of Internet Security Center (CIS)
Controls, which are open-source policies based on consensus.
Each check is rigorously reviewed by a number of professionals before a conclusion is
reached.
To easily access a list of evaluations for cloud security, consult the CIS Benchmarks
customized for particular cloud service providers.
Engineering in One Video (EIOV) Watch video on EIOV
IAM Architecture
5. FISMA:
In accordance with the Federal Information Security Management Act (FISMA), all federal
agencies and their contractors are required to safeguard information systems and assets.
NIST, using NIST SP 800-53, was given authority under FISMA to define the framework
security standards (see definition below).
6. PCI DSS:
For all merchants who use credit or debit cards, the PCI DSS (Payment Card Industry Data
Security Standard) provides a set of security criteria.
For businesses that handle cardholder data, there is PCI DSS.
The PCI DSS specifies fundamental technological and operational criteria for safeguarding
cardholder data.
Cardholders are intended to be protected from identity theft and credit card fraud by the
PCI DSS standard.
Engineering in One Video (EIOV) Watch video on EIOV
Happy Ending!