0% found this document useful (0 votes)
290 views

CC Unit 4 Notes

Uploaded by

ayush
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
290 views

CC Unit 4 Notes

Uploaded by

ayush
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Engineering in One Video (EIOV) Watch video on EIOV

Cloud Computing
Unit 4
Engineering in One Video (EIOV) Watch video on EIOV

Topics to be covered...
Inter cloud resource management
Topologies used in inter cloud architecture
Types of resource provisioning
Resource provisioning methods
Cloud security challenges
Security governance
Virtual machine security
IAM
Security standards
Happy Ending!
Engineering in One Video (EIOV) Watch video on EIOV

Inter cloud resource


management
Engineering in One Video (EIOV) Watch video on EIOV

Inter Cloud
Connected cloud networks, including public, private and hybrid clouds.
Goal- Improve interoperability of cloud networks.
Used to connect different cloud computing platforms.
Limitation- limited physical resources.
Inter-cloud resource management in cloud computing refers to the process of optimizing
and coordinating the allocation, utilization, and management of computing resources across
multiple cloud service providers and cloud environments.
Types: Federation and Multi cloud.
Benefits of ICRM
Flexibility and Vendor Neutrality
Redundancy and Disaster Recovery
Geographic Reach
Engineering in One Video (EIOV) Watch video on EIOV

Topologies used in
inter cloud architecture
Engineering in One Video (EIOV) Watch video on EIOV

Topologies used in inter cloud architecture


Peer to peer inter cloud federation
Communicate with each other
Negotiate directly without mediators
RESERVOIR

Centralized inter cloud federation


Use a central entity to perform resource sharing
Central entity acts as a storehouse

Multi cloud service


Clients access multiple clouds through a service

Multi cloud libraries


Clients develop their own brokers by using a unified cloud API as a library.
Example of MCL- Java library J-clouds, Apache Lib-Clouds.
Engineering in One Video (EIOV) Watch video on EIOV

Providers vs Vendors vs Users


Engineering in One Video (EIOV) Watch video on EIOV

Types of resource
provisioning
Engineering in One Video (EIOV) Watch video on EIOV

Resource provisioning
Resource provisioning, in the context of cloud computing and IT infrastructure
management, refers to the allocation, management, and deployment of computing
resources to meet the demands of applications, workloads, and services.

Effective resource provisioning ensures that the right amount of resources is allocated at
the right time to maintain optimal system performance and resource utilization.

It takes SLA into consideration for providing services to the cloud users.

Computing resources: virtual machines, storage, and networking


Engineering in One Video (EIOV) Watch video on EIOV

Types of resource provisioning


Manual Resource Provisioning

Static Provisioning

Dynamic Provisioning

Hybrid Provisioning

Auto-Scaling Provisioning
Engineering in One Video (EIOV) Watch video on EIOV

Resource provisioning
methods
Engineering in One Video (EIOV) Watch video on EIOV

Resource provisioning methods


Demand -driven resource provisioning:
Adds or removes computing instances based on the current utilization level of the
allocated resources.
When a Resource has surpassed a threshold for certain amount of time, The scheme
increases that resource based on demand.
When a resource is below a threshold for a certain amount of time, that resource could
be decreased accordingly.
Amazon implements such an auto-scale features in its EC2 to platform.

Event-driven resource provisioning:


Ads or removes machine instances based on a specific time event.
The scheme works better for predicted events.
This is scheme anticipated speed traffic before it happens.
The method results in a minimal laws of QoS if the event is predicted correctly.
Otherwise, wasted resources are even greater due to events that do not follow a fixed
pattern.
Engineering in One Video (EIOV) Watch video on EIOV

Resource provisioning methods


Popularity-driven resource provisioning:
In this method, the Internet searches for popularity of certain applications and creates
the instances by popularity demand.
The scheme anticipates increased traffic with popularity.
The scheme has a minimal loss of QoS if the predicted popularity is correct, resources
may be wasted if traffic does not occur as expected.
Engineering in One Video (EIOV) Watch video on EIOV

Cloud security
challenges
Engineering in One Video (EIOV) Watch video on EIOV

Classification security challenges


Deployment models:
Public cloud
Private cloud
Hybrid cloud

Service models:
IaaS
PaaS
SaaS
Engineering in One Video (EIOV) Watch video on EIOV

SC related to deployment models


Public Cloud Security Challenges:
Data Privacy and Compliance
Shared Resources
Loss of Control

Private Cloud Security Challenges:


Cost and Complexity
Data Center Security
Security Policy Management

Hybrid Cloud Security Challenges:


Data and Application Integration
Data Movement and Transfer
Management Complexity
Engineering in One Video (EIOV) Watch video on EIOV

SC related to service models


Infrastructure as a Service (IaaS):
Virtual Machine Security
Network Security
Data Encryption

Platform as a Service (PaaS):


Data Access and Control
Vendor Lock-In
Application Security

Software as a Service (SaaS):


Data Privacy and Compliance
Data Migration
Service Integration
Service Availability
Engineering in One Video (EIOV) Watch video on EIOV

Cloud security controls


Detective control

Preventive control

Deterrent control

Corrective control
Engineering in One Video (EIOV) Watch video on EIOV

Security governance
Engineering in One Video (EIOV) Watch video on EIOV

Security governance
Cloud security governance involves defining and implementing policies, procedures, and
controls to ensure the secure and compliant use of cloud services and resources within an
organization.

Challenges:
Lack of Visibility
Data Security and Privacy
Identity and Access Management
Shared Responsibility Model
Engineering in One Video (EIOV) Watch video on EIOV

Security governance objective


Define Security Policies

Risk Assessment

Data Encryption

Security Auditing and Monitoring

Security Awareness and Training

Regular Security Assessments

Vendor Agreements and Contracts


Engineering in One Video (EIOV) Watch video on EIOV

Virtual machine
security
Engineering in One Video (EIOV) Watch video on EIOV

Virtual machine security


Virtual machine (VM) security in cloud computing is a critical aspect of ensuring the
confidentiality, integrity, and availability of workloads and data running on cloud-based
VMs.
VMs are foundational building blocks in cloud infrastructure and are used for running
applications, services, and processing workloads.

VM Isolation and Segmentation:


Secure Hypervisor
VM Hardening
Patch Management
Network Security
Encryption
Identity and Access Management (IAM)
Multifactor Authentication (MFA)
Logging and Monitoring
Engineering in One Video (EIOV) Watch video on EIOV

Types of Virtual machine


System Virtual Machine:
Gives us complete system platform and execution of the complete virtual OS.
Just like virtual box, system virtual machine is providing an environment for an OS to be
installed completely.
We can see in below image that our hardware of Real Machine is being distributed
between two simulated operating systems by Virtual machine monitor.
And then some programs, processes are going on in that distributed hardware of
simulated machines separately.
Engineering in One Video (EIOV) Watch video on EIOV

Types of Virtual machine


Process Virtual Machine:
While process virtual machines, unlike system virtual machine, does not provide us with
the facility to install the virtual operating system completely.
Rather it creates virtual environment of that OS while using some app or program and
this environment will be destroyed as soon as we exit from that app.
Like in below image, there are some apps running on main OS as well some virtual
machines are created to run other apps.
Example – Wine software in Linux helps
to run Windows applications.
Engineering in One Video (EIOV) Watch video on EIOV

IAM
Engineering in One Video (EIOV) Watch video on EIOV

Identity and Access Management (IAM)


AWS Identity and Access Management (IAM) is a web service that helps you securely
control access to AWS resources.
With IAM, you can centrally manage permissions that control which AWS resources users
can access.
You use IAM to control who is authenticated (signed in) and authorized (has permissions) to
use resources.

IAM features:
Shared access to your AWS account
Granular permissions
Secure access to AWS resources for applications that run on Amazon EC2
Multi-factor authentication (MFA)
Identity federation
Engineering in One Video (EIOV) Watch video on EIOV

Advantages
Security
Efficiency
Compliance
User Convenience

Disadvantages
Complexity
Cost
User Resistance
Integration Challenges
Engineering in One Video (EIOV) Watch video on EIOV

IAM Architecture
Engineering in One Video (EIOV) Watch video on EIOV

Security standards
Engineering in One Video (EIOV) Watch video on EIOV

IAM Architecture
1. NIST (National Institute of Standards and Technology):
NIST is a federal organization in the US that creates metrics and standards to boost
competition in the scientific and technology industries.
The National Institute of Regulations and Technology (NIST) developed the Cybersecurity
Framework to comply with US regulations such as the Federal Information Security
Management Act.
NIST places a strong emphasis on classifying assets according to their commercial value
and adequately protecting them.

2. ISO-27017:
A development of ISO-27001 that includes provisions unique to cloud-based information
security.
Along with ISO-27001 compliance, ISO-27017 compliance should be taken into account.
This standard has not yet been introduced to the marketplace.
It attempts to offer further direction in the cloud computing information security field.
Engineering in One Video (EIOV) Watch video on EIOV

IAM Architecture
3. ISO-27018:
The protection of personally identifiable information (PII) in public clouds that serve as PII
processors is covered by this standard.
Despite the fact that this standard is especially aimed at public-cloud service providers like
AWS or Azure.
If you are a SaaS provider handling PII, you should think about complying with this
standard.

4. CIS controls:
Organizations can secure their systems with the help of Internet Security Center (CIS)
Controls, which are open-source policies based on consensus.
Each check is rigorously reviewed by a number of professionals before a conclusion is
reached.
To easily access a list of evaluations for cloud security, consult the CIS Benchmarks
customized for particular cloud service providers.
Engineering in One Video (EIOV) Watch video on EIOV

IAM Architecture
5. FISMA:
In accordance with the Federal Information Security Management Act (FISMA), all federal
agencies and their contractors are required to safeguard information systems and assets.
NIST, using NIST SP 800-53, was given authority under FISMA to define the framework
security standards (see definition below).

6. PCI DSS:
For all merchants who use credit or debit cards, the PCI DSS (Payment Card Industry Data
Security Standard) provides a set of security criteria.
For businesses that handle cardholder data, there is PCI DSS.
The PCI DSS specifies fundamental technological and operational criteria for safeguarding
cardholder data.
Cardholders are intended to be protected from identity theft and credit card fraud by the
PCI DSS standard.
Engineering in One Video (EIOV) Watch video on EIOV

Happy Ending!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy