Unit 5 - CC
Unit 5 - CC
Cloud security refers to protecting data stored online via cloud computing
environments (instead of data centers) from theft, deletion, and leakage. There
are many protective methods that help secure the cloud; these measures include
access control, firewalls, penetration testing, obfuscation, tokenization, virtual
private networks (VPN), and not using public internet connections.
How Secure is the Cloud?
Human error is one of the top reasons for data breaches in the cloud.
Therefore, it is not an issue of whether or not the cloud is secure but if the
customer is using the cloud securely.
Examples of Cloud Security Compromised by Misconfiguration
Too often, misconfigured cloud-based systems lead to data breaches. For
instance, in 2019, Capital One was hacked by a malicious actor who stole the
sensitive data of more than 100 million people while not following traditional
hacker patterns.
The breach was the result of a misconfigured open-source web application
firewall (WAF), which Capital One used in its operations hosted on Amazon
Web Services. The misconfigured WAF was permitted to list all the files in any
AWS data buckets and read the contents of each file. The misconfiguration
allowed the intruder to trick the firewall into relaying requests to a key back-end
resource on AWS.
security challenges included:
1. Visibility
2. Data Privacy
3. IAM Procedures
4. Configuration Management
5. Compliance Requirements
7 Fundamentals of Cloud Security
Don’t just migrate to the cloud – prevent security threats by following these
tips: