Chapter 6: Securing the Cloud

Slides:



Advertisements
Similar presentations
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
By: Kathleen Walters CLOUD COMPUTING Definition Cloud computing allows multiple computers to connect to one main network. Instead of installing different.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Cloud computing Tahani aljehani.
Plan Introduction What is Cloud Computing?
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing الحوسبة السحابية. subject History of Cloud Before the cloud Cloud Conditions Definition of Cloud Computing Cloud Anatomy Type of Cloud.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Osama Shahid ( ) Vishal ( ) BSCS-5B
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Introduction to Cloud Computing
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
CLOUD COMPUTING. What is cloud computing ? History Virtualization Cloud Computing hardware Cloud Computing services Cloud Architecture Advantages & Disadvantages.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Chapter 8 – Cloud Computing
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Web Technologies Lecture 13 Introduction to cloud computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
MANAGEMENT INFORMATION SYSTEMS
Lecture 6: Cloud Computing
Network customization
Unit 3 Virtualization.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Guide to Operating Systems, 5th Edition
11. Looking Ahead.
Understanding The Cloud
Avenues International Inc.
Cloud computing-The Future Technologies
Prepared by: Assistant prof. Aslamzai
What is Cloud Computing - How cloud computing help your Business?
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Introduction to Enterprise Systems
Network Services, Cloud Computing, and Virtualization
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
CompTIA Security+ Study Guide (SY0-401)
Dr. John P. Abraham Professor, Computer Engineering UTPA
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Outline Virtualization Cloud Computing Microsoft Azure Platform
Guide to Operating Systems, 5th Edition
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
3 Cloud Computing.
Brandon Hixon Jonathan Moore
"Cloud services" - what it is.
Cloud Computing: Concepts
Network customization
Cloud Computing for Wireless Networks
Presentation transcript:

Chapter 6: Securing the Cloud Security+ Chapter 6: Securing the Cloud Modified 1/30/2016- wagnerju

Chapter 6: Securing the Cloud Explain network design elements and components. Given a scenario, select the appropriate solutions to establish host security. Implement the appropriate controls to ensure data security.

Risks and Cloud Computing Resources are made available in a web-based data center, which can be accessed anywhere.

Risks and Cloud Computing Pay-per-use computing model Customers pay for only the resources they need May revolutionize computing Unlike hosted services, does not require long-term contracts Microsoft Azure Pricing calculator https://azure.microsoft.com/en-us/pricing/calculator/

Risks and Cloud Computing Three service models of cloud computing Cloud software as a service (SaaS) Deliver Applications Cloud platform as a service (PaaS) Deliver computing platforms Cloud infrastructure as a service (IaaS) Deliver servers, storage and networking

Types of Clouds Public cloud – Third party services and infrastructure offered to all users with access provided remotely through Internet. Users give up some control and security. Major Vendors Amazon AWS Microsoft Azure Rackspace Google Types of Clouds Public cloud - Services and infrastructure offered to all users with access provided remotely through Internet Community cloud - Open only to specific organizations that have common concerns Private cloud - Created and maintained on private network Hybrid cloud - Combination of public and private clouds Cloud storage - No computational capabilities but only provides remote file storage

Types of Clouds Private cloud - Created and maintained on private network by one company for it’s sole use. Provides the most security and control but also requires the most investments in infrastructure and expertise Types of Clouds Public cloud - Services and infrastructure offered to all users with access provided remotely through Internet Community cloud - Open only to specific organizations that have common concerns Private cloud - Created and maintained on private network Hybrid cloud - Combination of public and private clouds Cloud storage - No computational capabilities but only provides remote file storage

Types of Clouds Community cloud - Open only to specific organizations that have common concerns Hybrid cloud - Combination of public and private clouds Types of Clouds Public cloud - Services and infrastructure offered to all users with access provided remotely through Internet Community cloud - Open only to specific organizations that have common concerns Private cloud - Created and maintained on private network Hybrid cloud - Combination of public and private clouds Cloud storage - No computational capabilities but only provides remote file storage

Types of Clouds Architecture choose? Types of Clouds Public cloud - Services and infrastructure offered to all users with access provided remotely through Internet Community cloud - Open only to specific organizations that have common concerns Private cloud - Created and maintained on private network Hybrid cloud - Combination of public and private clouds Cloud storage - No computational capabilities but only provides remote file storage

Types of Clouds Cloud storage No computational capabilities but only provides remote file storage. Data is stored redundant and possibly across multiple data centers for fault tolerance

Virtualization Virtualization Means of managing and presenting computer resources without regard to physical layout or location Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system” Virtual system examples: virtual private network, virtual memory, virtual machine

Traditional software stack Component isolation with virtualization What Is Virtualization? Virtualization is the isolation of one computing resource from the others Traditional software stack Applications installed to specific hardware and OS Component isolation with virtualization Virtual Applications Any application on any computer, on demand Interface bound to process Virtual Presentation Presentation layer separate from process Operating system assigned to specific hardware Virtual Machine OS can be assigned to any desktop or server Storage assigned to specific locations Virtual Storage Storage and backup over the network Network assigned to specific locations Virtual Network Localizing dispersed resources Virtualization results in more efficient resource utilization, and supports greater flexibility and simplified change management

Common Uses of Virtualization Access Virus-Infected Data Test Software, Upgrades, or New Configurations Run a guest OS on top of another OS Business Continuity Virtual Desktop / VDI Run legacy software on non-legacy hardware Run multiple operating systems on the same hardware Create a manageable upgrade path

Working with Virtualization Host (Operating System) virtualization Virtual machine simulated as software environment on host system

Virtualization models Type I model is known as “bare metal” Can boot without the operating system Type II model is known as “hosted” Requires the operating system and is dependent on it

Server virtualization Creating and managing multiple server operating systems Relies on the hypervisor software to manage virtual operating systems Can reduce costs and energy use Can help provide users uninterrupted server access Live migration enables virtual machines to be moved to a different Server with no user impact Can also be used for load balancing

Virtualization Advantages Test latest patches by downloading on a virtual machine before installing on production computer Can be used for training purposes Safe environment where malware can be executed with minimal risk to equipment and software New virtual server machines can be quickly made available (host availability) Resources like RAM or hard drive space can easily be expanded or contracted as needed (host elasticity) Reduce costs Providing uninterrupted server access to users

Virtualization Security Advantages Patch compatibility - Latest patches can be downloaded and run in virtual machine to determine impact on other software Snapshot – Image of particular state of virtual machine can be saved for later use Security control testing - Testing existing security configuration Sandboxing - Used test for potential malware Penetration testing - can be performed using simulated network environment Virtualization Security Advantages Virtualization security advantages: Patch compatibility - Latest patches can be downloaded and run in virtual machine to determine impact on other software Snapshot – Image of particular state of virtual machine can be saved for later use Security control testing - Testing existing security configuration Sandboxing - Used test for potential malware

Virtualized environment security concerns Physical firewall may not be able to inspect and filter amount of traffic coming from running multiple virtualized servers Security must be in place to accommodate live migration Some hypervisors do not have necessary security controls to keep out attackers Existing security tools do not always adapt well to multiple virtual machines External physical appliances not designed to protect multiple virtual servers Virtual machines need protection from other virtual machines running on the same host.

Security and the Cloud Multitenancy Laws and Regulations Various clients reside on the same machine. A flaw in implementation could compromise security. Laws and Regulations The consumer retains the ultimate responsibility for compliance