Cloud Security: A Comprehensive Guide To Secure Cloud Computing

1y ago
3 Views
2 Downloads
4.45 MB
378 Pages
Last View : 5m ago
Last Download : 3m ago
Upload by : Callan Shouse
Transcription

Cloud SecurityA Comprehensive Guide to SecureCloud ComputingRonald L. KrutzRussell Dean Vinesffirs.indd v6/24/2010 2:47:19 PM

About the AuthorsRonald L. Krutz is a senior information system security consultant.He has over 30 years of experience in distributed computing systems,computer architectures, real-time systems, information assurancemethodologies, and information security training. He holds B.S.,M.S., and Ph.D. degrees in Electrical and Computer Engineeringand is the author of best selling texts in the area of information system security.He co-authored the CISSP Prep Guide for John Wiley and Sons and isco-author of the Wiley Advanced CISSP Prep Guide, the CISSP Prep Guide, GoldEdition, the Security Certification Guide, the CISM Prep Guide, the CISSP Prep Guide,2nd Edition: Mastering CISSP and ISSEP, the Network Security Bible, the CISSP andCAP Prep Guide, Platinum Edition: Mastering CISSP and CAP, the Certified EthicalHacker (CEH) Prep Guide, and the Certified Secure Software Lifecycle Prep Guide.He is also the author of Securing SCADA Systems and of three textbooks in theareas of microcomputer system design, computer interfacing, and computerarchitecture. Dr. Krutz has seven patents in the area of digital systems and haspublished over 40 technical papers.Dr. Krutz also serves as consulting Editor for John Wiley and Sons InformationSecurity Certification Series, is a Distinguished Visiting Lecturer in the Universityof New Haven Henry C. Lee College of Criminal Justice and Forensic Sciences,and is an Adjunct Professor in Midway College, Kentucky.Dr. Krutz is a Registered Professional Engineer in Pennsylvania.ixffirs.indd ix6/24/2010 2:47:19 PM

xAbout the AuthorsRussell Dean Vines has been in the information systems industryfor over 20 years, and has a unique ability to disseminate complexsecurity issues to a wider audience, from CEOs to home Internetsurfers.He is also the author or co-author of 10 previous books, including theCISSP Prep Guide, which reached #25 on Amazon’s best-sellerslist. He co-authored the Advanced CISSP Prep Guide, the CISSP Prep Guide, GoldEdition, the Security Certification Guide, the CISM Prep Guide, the CISSP PrepGuide, 2nd Edition: Mastering CISSP and ISSEP, the CISSP and CAP Prep Guide,Platinum Edition: Mastering CISSP and CAP, and the Certified Ethical Hacker (CEH)Prep Guide. He is also the author of Wireless Security Essentials, and ComposingDigital Music for Dummies.In addition to being a Certified Information Systems Security Professional(CISSP), Mr. Vines is a Certified Information Systems Manager (CISM), aCertified Ethical Hacker (CEH), certified in CompTIA’s Security program,and is a Payment Card Industry (PCI) Qualified Security Assessor (QSA). Russalso has vendor security certifications from RSA, Websense, McAfee, Citrix,VMware, Microsoft, and Novell, and has been trained in the NSA’s InformationAssurance Methodology (IAM).Mr. Vines is a frequent contributor to Web and trade publications; discusses Information Security Threats and Countermeasures as a member ofSearchSecurityChannel.com’s Ask the Experts panel, frequently speaks at industryevents such as Comdex and Networld Interop, and teaches CISSP, CEH, andWebsense classes.ffirs.indd x6/24/2010 2:47:19 PM

CreditsExecutive EditorCarol LongProject EditorEd ConnorTechnical EditorDavid ChapaProduction EditorDaniel ScribnerEditorial DirectorRobyn B. SieskyEditorial ManagerMary Beth WakefieldMarketing ManagerDavid MayhewProduction ManagerTim TateVice President and ExecutivePublisherBarry PruettAssociate PublisherJim MinatelProject Coordinator,CoverLynsey StanfordProofreaderNancy BellIndexerRobert SwansonCover DesignerRyan SneedCover Image istockphoto.com/GodfriedEdelmanVice President and ExecutiveGroup PublisherRichard Swadleyxiffirs.indd xi6/24/2010 2:47:20 PM

AcknowledgmentsI want to thank my wife, Hilda, for her support and encouragement during thewriting of this text.— Ronald L. KrutzI’d like to give a big shout-out to the gang at Gotham Technology Group, inparticular Ken Phelan, Joe Jessen, and Nancy Rand, for their assistance duringthis project. I’d also like to thank doctors Paul M. Pellicci and Lawrence Levinfor the rare gift of health. But my greatest thanks is reserved for my wife, Elzy,for her continuous and unwavering support throughout my life.— Russell Dean VinesBoth authors would like to express their gratitude to Carol Long and Ed Connorof John Wiley and Sons for their support and assistance in developing this text.xiiffirs.indd xii6/24/2010 2:47:20 PM

ContentsForewordxxiIntroductionChapter 1xxiiiCloud Computing FundamentalsWhat Cloud Computing Isn’tAlternative ViewsEssential CharacteristicsOn-Demand Self-ServiceBroadNetwork AccessLocation-Independent Resource PoolingRapid ElasticityMeasured ServiceArchitectural InfluencesHigh-Performance ComputingUtility and Enterprise Grid ComputingAutonomic ComputingService ConsolidationHorizontal ScalingWeb ServicesHigh-Scalability ical Influences18Universal ConnectivityCommoditizationExcess CapacityOpen-Source SoftwareVirtualization1819202122Operational InfluencesConsolidation2323xiiiffirs.indd xiii6/24/2010 8:00:45 AM

xivContentsOutsourcingOutsourcing Legal IssuesBusiness Process Outsourcing (BPO) IssuesIT Service ManagementAutomationChapter 2Summary31Cloud Computing ArchitectureCloud Delivery Models3334The SPI FrameworkSPI EvolutionThe SPI Framework vs. the Traditional IT ModelCloud Software as a Service (SaaS)Benefits of the SaaS ModelCloud Platform as a Service (PaaS)Cloud Infrastructure as a Service (IaaS)Cloud Deployment ModelsPublic CloudsCommunity CloudsPrivate CloudsHybrid CloudsAlternative Deployment ModelsThe Linthicum ModelThe Jericho Cloud Cube ModelExpected BenefitsFlexibility and ResiliencyReduced CostsCentralization of Data StorageReduced Time to DeploymentScalabilityChapter 59Cloud Computing Software Security FundamentalsCloud Information Security Objectives6162Confidentiality, Integrity, and oud Security abilityRelevant Cloud Security Design PrinciplesLeast PrivilegeSeparation of Dutiesffirs.indd xiv26262830316363646464646465666667676/24/2010 8:00:45 AM

ContentsDefense in DepthFail SafeEconomy of MechanismComplete MediationOpen DesignLeast Common MechanismPsychological AcceptabilityWeakest LinkLeveraging Existing ComponentsSecure Cloud Software RequirementsSecure Development PracticesHandling DataCode PracticesLanguage OptionsInput Validation and Content InjectionPhysical Security of the SystemApproaches to Cloud Software Requirements EngineeringA Resource Perspective on Cloud Software SecurityRequirementsGoal-Oriented Software Security RequirementsMonitoring Internal and External RequirementsCloud Security Policy Implementationand DecompositionImplementation IssuesDecomposing Critical Security Issues into Secure CloudSoftware RequirementsNIST 33 Security PrinciplesSecure Cloud Software TestingTesting for Security Quality AssuranceConformance TestingFunctional TestingPerformance TestingSecurity TestingCloud Penetration TestingLegal and Ethical ImplicationsThe Three Pre-Test PhasesPenetration Testing Tools and TechniquesRegression 879818586878990929499100103105111Cloud Computing and Business Continuity Planning/DisasterRecovery113DefinitionsGeneral Principles and PracticesDisaster Recovery PlanningBusiness Continuity PlanningUsing the Cloud for BCP/DRPffirs.indd xv1131141141171196/24/2010 8:00:45 AM

xviContentsRedundancy Provided by the CloudSecure Remote AccessIntegration into Normal Business ProcessesChapter 4Summary120Cloud Computing Risk IssuesThe CIA er Important ConceptsPrivacy and Compliance RisksThe Payment Card Industry Data SecurityStandard (PCI DSS)Information Privacy and Privacy LawsThreats to Infrastructure, Data, and Access ControlCommon Threats and VulnerabilitiesLogon AbuseInappropriate System UseEavesdroppingNetwork IntrusionDenial-of-Service (DoS) AttacksSession Hijacking AttacksFragmentation AttacksCloud Access Control IssuesDatabase Integrity IssuesCloud Service Provider RisksBack-DoorSpoofingMan-in-the-MiddleReplayTCP HijackingSocial EngineeringDumpster DivingPassword GuessingTrojan Horses and MalwareChapter 45146147148148148148149149149150150Summary151Cloud Computing Security ChallengesSecurity Policy Implementation153154Policy TypesSenior Management Statement of PolicyRegulatory PoliciesAdvisory PoliciesInformative PoliciesComputer Security Incident Response Team (CSIRT)ffirs.indd xvi1191201201541551551551551566/24/2010 8:00:45 AM

ContentsChapter 6Virtualization Security Management157Virtual ThreatsHypervisor RisksIncreased Denial of Service RiskVM Security RecommendationsBest Practice Security TechniquesVM-Specific Security TechniquesHardening the Virtual MachineSecuring VM Remote Access158163164165165169169172Summary173Cloud Computing Security ArchitectureArchitectural Considerations177178General IssuesComplianceSecurity ManagementInformation ClassificationEmployee TerminationSecurity Awareness, Training, and EducationTrusted Cloud ComputingTrusted Computing CharacteristicsSecure Execution Environments and CommunicationsSecure Execution EnvironmentSecure CommunicationsMicroarchitecturesIdentity Management and Access ControlIdentity ManagementPasswordsTokensMemory CardsSmart CardsBiometricsImplementing Identity ManagementAccess ControlControlsModels for Controlling AccessSingle Sign-On (SSO)Autonomic SecurityAutonomic SystemsAutonomic ProtectionAutonomic Self-HealingChapter 7ffirs.indd oud Computing Life Cycle IssuesStandards217218Jericho Forumxvii2186/24/2010 8:00:46 AM

xviiiContentsThe Distributed Management Task Force (DMTF)The DMTF Open Virtualization Format (OVF)The DMTF Open Cloud Standards IncubatorThe International Organization for Standardization (ISO)ISO 27001ISO 27002ISO 27003ISO 27004ISO 27005ISO 27006International Organization for Standardization/International Electrotechnical Commission ISO/IEC 29361, ISO/IEC 29362, and ISO/IEC 29363 StandardsDistributed Application Platforms and ServicesThe European Telecommunications StandardsInstitute (ETSI)The Organization for the Advancement of StructuredInformation Standards (OASIS)Storage Networking Industry Association (SNIA)Open Grid Forum (OGF)The Open Web Application Security Project (OWASP)OWASP Top Ten ProjectOWASP Development GuideOWASP Code Review GuideOWASP Testing GuideIncident ResponseNIST Special Publication 800-61PreparationDetection and AnalysisContainment, Eradication, and RecoveryPost-Incident ActivityNIST Incident-Handling SummaryInternet Engineering Task Force Incident-Handling GuidelinesLayered Security and IDSIntrusion DetectionIDS IssuesComputer Security and Incident Response TeamsCERT/CCFedCIRCForum of Incident Response and Security TeamsSecurity Incident Notification ProcessAutomated Notice and Recovery Mechanismsffirs.indd 0241242242243243244Encryption and Key Management246VM ArchitectureKey Protection CountermeasuresHardware Protection2462472486/24/2010 8:00:46 AM

ContentsSoftware-Based ProtectionData DeduplicationHashingRetirementVM Life CycleOverwritingDegaussingDestructionRecord RetentionData RemanenceDue Care and Due DiligenceDocumentation ControlChapter 8252252253254254255255255256256Useful Next Steps and ApproachesGetting Answers259259Getting HelpCloud Security AllianceCloud Computing Google GroupsCloud Computing Interoperability ForumOpen Cloud ConsortiumGetting StartedTop Ten List1. Assess Your Data’s Sensitivity2. Analyze the Risks vs. Benefits of Cloud Computing3. Define Business Objectives4. Understand the Underlying Structure of Your Network5. Implement Traditional Best Practice Security Solutions6. Employ Virtualization Best Practices7. Prevent Data Loss with Backups8. Monitor and Audit9. Seek Out Advice10. Employ DeceptionParting Wordsffirs.indd xix249250251SummaryWhat Services Should Be Moved to the Cloud?What Questions Should You Ask Your Cloud Provider?When Should You Use a Public, Private, or Hybrid 3274274275275276277277Glossary of Terms and Acronyms279References345Index3496/24/2010 8:00:46 AM

ffirs.indd xx6/24/2010 8:00:46 AM

ForewordWhenever we come upon something new, we try to understand it. A good wayof understanding new things is to look for something from our experience thatcan serve as a metaphor. Sometimes this process works well, sometimes not.Computer security has long labored under the metaphor of physical security.It stands to reason that we would assume that millennia of experience withkeeping physical assets safe would serve us in keeping digital assets safe as well.Much of our thinking in computer security has therefore been concernedwith putting important things someplace “safe” and then controlling access toit. I distinctly recall a conversation with a security analyst at the beginning ofthe PC network era. When asked how to ensure the security of data on a PC,he said, “Simple. Put the data on the PC. Put the PC in a safe. Put the safe at thebottom of the ocean.”We have been challenged over the years with coming up with safe places thatallowed access. We have been challenged with even figuring out what “safe”might mean in a world where risks could come from anywhere, including insideour own organizations.In today’s world, the physical security metaphor continues to deteriorate. We’veall seen a movie or TV show where some critical piece of data becomes key tothe plot. The location of the next terrorist attack is kept on a single USB that issubject to theft, deterioration, or any other number of physical ills designed toincrease the drama. That is simply not the nature of data. Data is viral. Wheredid this data come from? It was never on a hard drive? No one ever emailedanybody about the attack? Can’t somebody plug the damn key in and make aYouTube video about it so that everyone can see it?As we move to this new era of cloud computing, the last vestiges of ourphysical world metaphors are swept way. We need to understand data accessxxiffirs.indd xxi6/24/2010 8:00:46 AM

xxiiForewordand validation in a new way — perhaps in the way they should have beenunderstood all along. Data security needs to be understood as something new,requiring new and innovative solutions.Security professionals are perhaps rightfully overwhelmed by this challenge.Despite increased spending, the average firm finds itself less secure than it wasfive years ago. Advancements in security tools and techniques have not keptpace with risks and attack vectors. How can the security community respond tothese ever-increasing threats when the additional requirements of virtualizationand agility drive data assets up into a nebulous “cloud”?One thing we do know for sure: Security will not drive or control this change.Any business requirement for lower costs and increased agility of cloud computing will eventually rule the day. Security professionals have attempted toslow the growth of several technology initiatives over the years in an attemptto control the risks. E-mail, instant messaging, and web browsing are somethat come to mind immediately. We know from past experience, however, thatimplementing appropriate controls generally works far better than attemptingto simply stop these initiatives.As security professionals, it is incumbent on us to generate innovations inour concepts of data security and integrity. We need tools and processes thatrecognize the ephemeral nature of data and the reality that physical locationalcontrols simply will not work going forward. With a little hard work, we canachieve security models that minimize risk and enable this new method ofcomputing. We don’t need to give up on security; we simply need to abandonsome of our metaphors.This book serves as a guide for doing just that. As security professionals, wemay not want to embrace the cloud, but we’re certainly going to have to learnto live with it.Ken PhelanCTO Gotham Technology Groupffirs.indd xxii6/24/2010 8:00:46 AM

IntroductionCloud computing provides the capability to use computing and storage resourceson a metered basis and reduce the investments in an organization’s computinginfrastructure. The spawning and deletion of virtual machines running onphysical hardware and being controlled by hypervisors is a cost-efficient andflexible computing paradigm.In addition, the integration and widespread availability of large amounts of“sanitized’ information such as health care records can be of tremendous benefitto researchers and practitioners.However, as with any technology, the full potential of the cloud cannot beachieved without understanding its capabilities, vulnerabilities, advantages, andtrade-offs. This text provides insight into these areas and describes methods ofachieving the maximum benefit from cloud computation with minimal risk.Overview of the Book and TechnologyWith all its benefits, cloud computing also brings with it concerns about thesecurity and privacy of information extant on the cloud as a result of its size,structure, and geographical dispersion. Such concerns involve the followingissues: Leakage and unauthorized access of data among virtual machines running on the same server Failure of a cloud provider to properly handle and protect sensitiveinformationxxiiiffirs.indd xxiii6/24/2010 8:00:46 AM

xxivIntroduction Release of critical and sensitive data to law enforcement or governmentagencies without the approval and/or knowledge of the client Ability to meet compliance and regulatory requirements System crashes and failures that make the cloud service unavailable forextended periods of time Hackers breaking into client applications hosted on the cloud and acquiring and distributing sensitive information The robustness of the security protections instituted by the cloud provider The degree of interoperability available so that a client can easily moveapplications among different cloud providers and avoid “lock-in”Cloud users should also be concerned about the continued availability oftheir data over long periods of time and whether or not a cloud provider mightsurreptitiously exploit sensitive data for its own gain.One mitigation method that can be used to protect cloud data is encryption.Encrypting data can protect it from disclosure by the cloud provider or fromhackers, but it makes it difficult to search or perform calculations on that data.This book clarifies all these issues and provides comprehensive guidance onhow to navigate the field of cloud computing to achieve the maximum returnon cloud investments without compromising information security.How This Book Is OrganizedThe text explores the principal characteristics of cloud computing, including scalability, flexibility, virtualization, automation, measured service, and ubiquitousnetwork access, while showing their relationships to secure cloud computing.The book chapters proceed from tracing the evolution of the cloud paradigm todeveloping architectural characteristics, security fundamentals, cloud computingrisks and threats, and useful steps in implementing secure cloud computing.Chapter 1 defi nes cloud computing and provides alternative views of itsapplication and significance in the general world of computing. Following thisintroduction, the chapter presents the essential characteristics of cloud computing and traces the historical architectural, technical, and operational influencesthat converged to establish what is understand as cloud computing today.Chapter 2 looks at the primary elements of the cloud computing architectureusing various cloud-based computing architecture models. In this chapter we’llexamine cloud delivery models (the SaaS, PaaS, and IaaS elements of the SPIframework), cloud deployment models (such as private, community, public, andhybrid clouds), and look at some alternative cloud architecture models, such asthe Jericho Cloud Cube.ffirs.indd xxiv6/24/2010 8:00:46 AM

IntroductionxxvChapter 3 explores the fundamental concepts of cloud computing softwaresecurity, covering cloud security services, cloud security principles, securesoftware requirements, and testing concepts. It concludes by addressing cloudbusiness continuity planning, disaster recovery, redundancy, and secure remoteaccess.Chapter 4 examines cloud computing risks and threats in more detail. We’llexamine cloud computing risk to privacy assurance and compliance regulations,how cloud computing presents a unique risk to “traditional” concepts of data,identity, and access management (IAM) risks, and how those risks and threatsmay be unique to cloud service providers (CSPs).Chapter 5 helps identify management challenges and opportunities. Securitymanagement must be able to determine what detective and preventative controlsexist to clearly define the security posture of the organization, especially as itrelates to the virtualization perimeter. We’ll look at security policy and computerintrusion detection and response implementation techniques, and dive deeplyinto virtualization security management issues.Chapter 6 addresses the important cloud computing security architecturalissues, including trusted cloud computing, secure execution environments, andmicroarchitectures. It also expands on the critical cloud security principles ofidentity management and access control and develops the concepts of autonomicsystems and autonomic protection mechanisms.Chapter 7 presents cloud life cycle issues, together with significant standardsefforts, incident response approaches, encryption topics, and considerationsinvolving retirement of cloud virtual machines and applications.Chapter 8 recaps the important cloud computing security concepts, and offersguidance on which services should be moved to the cloud and those that shouldnot. It also reviews questions that a potential user should ask a cloud provider,and lists organizations that provide support and information exchange oncloud applications, standards, and interoperability. Chapter 8 concludes withadvice on getting started in cloud computation and a “top ten” list of importantrelated considerations.Who Should Read This BookCloud Security: A Comprehensive Guide to Secure Cloud Computing is designed to bea valuable source of information for those who are contemplating using cloudcomputing as well as professionals with prior cloud computing experience andknowledge. It provides a background of the development of cloud computingand details critical approaches to cloud computing security that affect the typesof applications that are best suited to the cloud.ffirs.indd xxv6/24/2010 8:00:46 AM

xxviIntroductionWe think that Cloud Security: A Comprehensive Guide to Secure Cloud Computingwould be a useful reference for all of the following: Professionals working in the fields of information technology or information system security Information security audit professionals Information system IT professionals Computing or information systems management Senior management, seeking to understand the various elements of security as related to cloud computing Students attending information system security certification programs orstudying computer securitySummaryWe hope Cloud Security: A Comprehensive Guide to Secure Cloud Computing is auseful and readable reference for everyone concerned about the risk of cloudcomputing and involved with the protection of data.Issues such as data ownership, privacy protections, data mobility, quality ofservice and service levels, bandwidth costs, data protection, and support haveto be tackled in order to achieve the maximum benefit from cloud computationwith minimal risk.As you try to find your way through a maze of security minefields, this bookis mandatory reading if you are involved in any aspect of cloud computing.ffirs.indd xxvi6/24/2010 8:00:46 AM

CHAPTER1Cloud Computing FundamentalsOut of intense complexities intense simplicities emerge.—Winston ChurchillCloud computing evokes different perceptions in different people. To some,it refers to accessing software and storing data in the “cloud” representationof the Internet or a network and using associated services. To others, it is seenas nothing new, but just a modernization of the time-sharing model that waswidely employed in the 1960s before the advent of relatively lower-cost computing platforms. These developments eventually evolved to the client/servermodel and to the personal computer, which placed large amounts of computingpower at people’s desktops and spelled the demise of time-sharing systems.In 1961, John McCarthy, a professor at MIT, presented the idea of computingas a utility much like electricity.1 Another pioneer, who later developed thebasis for the ARPANET, the Department of Defense’s Advanced ResearchProjects Agency Network, and precursor to the Internet, was J.C.R. Licklider.In the 1960s, Licklider promulgated ideas at both ARPA and Bolt, Beranek andNewman (BBN), the high-technology research and development company,that envisioned networked computers at a time when punched card, batchcomputing was dominant. He stated, “If such a network as I envisage nebulously could be brought into operation, we could have at least four largecomputers, perhaps six or eight small computers, and a great assortmentof disc files and magnetic tape units—not to mention remote consoles andteletype stations—all churning away.”21c01.indd 16/24/2010 7:36:20 AM

2Chapter 1 Cloud Computing FundamentalsThe conjunction of the concepts of utility computing and a ubiquitous worldwide network provided the basis for the future evolution of cloud computing.What Is Cloud Computing?In an October, 2009 presentation titled “Effectively and Securely Using the CloudComputing Paradigm,”3 by Peter Mell and Tim Grance of the National Instituteof Standards and Technology (NIST) Information Technology Laboratory, cloudcomputing is defined as follows:Cloud computing is a model for enabling convenient, on-demand network accessto a shared pool of configurable and reliable computing resources (e.g., networks,servers, storage, applications, services) that can be rapidly provisioned and releasedwith minimal consumer management effort or service provider interaction.This cloud model is composed of five essential characteristics, three service models, and four deployment models. The five essential characteristics are as follows: On-demand self-service Ubiquitous network access Resource pooling Location independence Rapid elasticity Measured serviceThe service models are as follows: Cloud Software as a Service (SaaS)—Use provider’s applications over anetwork. Cloud Platform as a Service (PaaS)—Deploy customer-created applicationsto a cloud. Cloud Infrastructure as a Service (IaaS)—Rent processing, storage,network capacity, and other fundamental computing resources.The deployment models, which can be either internally or externally implemented, are summarized in the NIST presentation as follows: Private cloud—Enterprise owned or leased Community cloud—Shared infrastructure for specific community Public cloud—Sold to the public, mega-scale infrastructure Hybrid cloud—Composition of two or more cloudsThese characteristics and models are covered in detail in Chapter 2.c01.indd 26/24/2010 7:36:21 AM

Chapter 1 Cloud Computing Fundamentals3In 2009, the Open Cloud Manifesto was developed by a group of organizations including IBM, Intel, and Google to propose practices for use inthe provision of cloud computing services. In the “Open Cloud Manifesto”(www.opencloudmanifesto.org), cloud computing is defi ned with a set ofcharacteristics and value propositions. The characteristics outlined in themanifesto are as follows: The ability to scale and provision computing power dynamically in acost-efficient way. The ability of the consumer (end user, organization, or IT staff) to makethe most of that power without having to manage the underlying complexity of the technology. The cloud architecture itself can be private (hosted within an organization’s firewall) or public (hosted on the Internet).The value propositions listed in the manifesto are as follows:c01.indd 3 Scalability on demand—All organizations have to deal with changesin their environment. The ability of cloud computing solutions to scaleup and down is a major benefit. If an organization has periods of timeduring which their computing resource needs are much higher or lowerthan normal, cloud technologies (both private and public) can deal withthose changes. Streamlining the data center—An organization of any size will havea substantial investment in its data center. That includes buying andmaintaining the hardware and software, providing the facilities in whichthe hardware is housed, and hiring the personnel who keep the datacenter running. An organization can streamline its data center by takingadvantage of cloud technologies internally or by offloading workloadinto the public. Improving business processes—The cloud provides an infrastructurefor improving business processes. An organization and its suppliers andpartners can share data and applications in the cloud, enabling everyoneinvolved to focus on the business process instead of the infrastructurethat hosts it. Minimizing startup costs—For companies that are just startingout, organizations in emerging markets, or even advanced technologygroups in larger organizations, cloud computing greatly reduces startupcosts. The new organization starts with an infrast

Certifi ed Ethical Hacker (CEH), certifi ed in CompTIA's Security program, and is a Payment Card Industry (PCI) Qualifi ed Security Assessor (QSA). Russ . frequently speaks at industry events such as Comdex and Networld Interop, and teaches CISSP, CEH, and . Cloud Service Provider Risks 147 Back-Door 148 Spoofing 148 Man-in-the-Middle .

Related Documents:

UNIT 5: Securing the Cloud: Cloud Information security fundamentals, Cloud security services, Design principles, Policy Implementation, Cloud Computing Security Challenges, Cloud Computing Security Architecture . Legal issues in cloud Computing. Data Security in Cloud: Business Continuity and Disaster

sites cloud mobile cloud social network iot cloud developer cloud java cloud node.js cloud app builder cloud cloud ng cloud cs oud database cloudinfrastructureexadata cloud database backup cloud block storage object storage compute nosql

He is authorized (ISC)2 Certified Cloud Security Professional (CCSP) and Certificate of Cloud Security Knowledge (CCSK) trainer. Regarding to cloud assessment, Rafael has conducted corresponding security assessment and audit, including public and private cloud security review, cloud appli

Acquiring this cloud security certification is a proof to the world that you have gained deep knowledge and hands-on experience on cloud security architecture, design, operations and . Plan Disaster Recovery (DR) and Business Continuity (BC) 4. Cloud Application Security Processes involving cloud software assurance and validation; and the use of

3 Cloud Computing Attacks a. Side channel attacks b. Service Hijacking c. DNS attacks d. Sql injection attacks e. Wrapping attacks f. Network sniffing g. Session ridding h. DOS / DDOS attacks 4 Securing Cloud computing a. Cloud security control layers b. Responsibilites in Cloud Security c. OWASP top 10 Cloud Security 5 Cloud Security Tools a.

Cloud security concerns - While adoption of cloud computing continues to surge, security concerns are showing no signs of abating. Reversing a multi-year downward trend, nine out of ten cybersecurity professionals confirm they are concerned about cloud security, up 11 percentage points from last year's cloud security survey. The top three cloud

THE WHITE BOOK OF Cloud Security Contents Preface 4 Acknowledgments 5 1: Is Cloud Computing Secure? 6 2: Cloud Security Simplified 14 3: Questions of Confidentiality 20 4: Ensuring Integrity 26 5: The Risk of Service Disruption 32 6: Putting It All Together 36 7: Data is King 40 8: The Cloud-Friendly Security Team 44 9: The Cloud Security Checklist 48 10: The Final Word on Cloud Security 54

Security in the cloud is a shared responsibility between the customer and the cloud provider like AWS, Azure, or Google. It requires users to secure everything in the cloud, while the cloud provider ensures the security of the cloud itself. In other words, cloud providers are responsible for securing the underlying