Professional Documents
Culture Documents
Unit 16. Assignment 02 - Brief
Unit 16. Assignment 02 - Brief
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 P7 P8 M3 M4 D2 D3
Summative Feedback: Resubmission Feedback:
Page 2
ASSIGNMENT 2 BRIEF
Qualification BTEC Level 5 HND Diploma in Computing
Submission Format:
LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools.
LO4 Analyse the technical challenges for cloud applications and assess their risks
Task 1
Page 3
Base on the scenario and architecture design in the first assignment provide the implementation.
Because of the time constraint of the assignment, the implementation just provides some demo
functions of the scenario. The implementation includes two parts:
Task 2
The table of contents in your security manual (which should be 500–700 words) should be as follows:
Page 4
Learning Outcomes and Assessment Criteria
LO4 Analyse the technical challenges for cloud applications and assess their
risks
P7 Analyse the most common M4 Discuss how to overcome these D3 Critically discuss how an
problems which arise in a Cloud security issues when building a organisation should protect their
Computing platform and discuss secure cloud platform. data when they migrate to a cloud
appropriate solutions to these solution.
problems.
P8 Assess the most common security
issues in cloud environments.
Page 5
Table of Contents
P5 Configure a Cloud Computing platform with a cloud service provider’s framework................................................ 8
Top Cloud Service Providers ......................................................................................................................................... 8
Amazon Web Services............................................................................................................................................... 8
Microsoft Azure......................................................................................................................................................... 9
IBM Cloud ................................................................................................................................................................ 11
Google Cloud Platform............................................................................................................................................ 12
Oracle Cloud ............................................................................................................................................................ 14
Heroku ..................................................................................................................................................................... 15
Types of cloud service providers ................................................................................................................................ 16
Features Heroku offers to users ............................................................................................................................. 16
Why does Heroku attract users? ............................................................................................................................ 17
Create an account for Heroku .................................................................................................................................... 18
P6 Implement a cloud platform using open source tools.............................................................................................. 20
create a database ........................................................................................................................................................ 20
My website on Heroku. .............................................................................................................................................. 26
P7 Analyze the most common problems which arise in a Cloud Computing platform and discuss appropriate
solutions to these problems. .......................................................................................................................................... 27
Security issues ............................................................................................................................................................. 27
Cost management and containment .......................................................................................................................... 27
Lack of resources/expertise........................................................................................................................................ 28
Governance/Control ................................................................................................................................................... 28
Compliance .................................................................................................................................................................. 28
Managing multiple clouds .......................................................................................................................................... 29
Performance ................................................................................................................................................................ 30
Building a private cloud .............................................................................................................................................. 30
Segmented usage and adoption ................................................................................................................................. 31
Migration ..................................................................................................................................................................... 31
Conclusion ................................................................................................................................................................... 32
So, what are the challenges faced during storing data in the cloud and how to overcome them? .................... 32
P8 Assess the most common security issues in cloud environments. .......................................................................... 33
Security issues related to cloud computing ............................................................................................................... 33
Security controls for cloud computing ....................................................................................................................... 33
Prevention ............................................................................................................................................................... 33
Precautions.............................................................................................................................................................. 33
Page 6
Repair ...................................................................................................................................................................... 33
Error detection ........................................................................................................................................................ 33
Aspects of cloud security ............................................................................................................................................ 34
Security and privacy ................................................................................................................................................ 34
Policy ....................................................................................................................................................................... 34
Visibility and Control Over Access .............................................................................................................................. 35
Data Security ............................................................................................................................................................... 35
Thwart External Threats ......................................................................................................................................... 35
Prevent Insider Threats........................................................................................................................................... 36
Stop Accidental Data Breaches ............................................................................................................................... 36
Account Takeovers ...................................................................................................................................................... 36
Risky SaaS Applications .............................................................................................................................................. 36
Advanced Malware and Phishing Attacks .................................................................................................................. 37
References ....................................................................................................................................................................... 38
Page 7
P5 Configure a Cloud Computing platform with a cloud service provider’s framework.
Top Cloud Service Providers
Amazon Web Services
_Value proposition for potential buyers: Amazon Web Services has always been ahead of the cloud
computing curve. It went online with its Simple Storage Service (S3) in 2005, offered impressive and
relatively inexpensive secondary services, and now owns about 33 percent of the cloud services market, led
by its storage and other application services. It owns 45 percent of the IaaS (infrastructure as a service)
global market, with sales at about $20 billion in 2019. This is a full 2-to-1 lead over No. 2 Microsoft Azure,
which is gaining market share but is still in the low double digits (about 16 percent) neighborhood.
_AWS simply has a huge head start in the market, the widest array of services and the largest data center
presence in the world. CEO Jeff Bezos continues to plow billions of dollars into data center expansions,
storage and people to run it all. AWS is known as a public cloud solution but it also offers numerous
services to connect on-premises installations to the cloud. It serves as everything from burst capacity to
disaster recovery and much in between.
_Key values/differentiators:
+Use cases: Most IT storage and cloud computing needs can be handled by AWS. Mainstays: general
enterprise storage, servers, data backup, archiving (cold data storage).
+Scope: Largest public or hybrid cloud services provider in the world, economies of scale can be made to
work in favor of users.
+Security: Amazon has its own in-house security solutions for all types of use cases. Plenty of choices of
customers.
+Computing stack/databases: Also, a plus for customers, who can basically name their configurations and
let AWS do all the grunt work. Again, choice is a good thing here.
Page 8
_To Take Under Advisement: Uploading data to AWS storage is simple to do, but beware when you try and
retrieve it. Read all the fine print, because it may cost you more than you think.
Microsoft Azure
_Value proposition for potential buyers: Microsoft, the largest software maker in the world for more than a
generation, is one of the few vendors that can offer a fully contained hybrid cloud solution because of its
massive on-premises legacy through the Windows, .Net and MS Office franchises.
_The company has been intentional from the beginning in tying all of its assets into the same
infrastructure. Azure services are built on Windows Server, the .Net framework and Visual Studio, making
lift and shift of on-premises apps to the service relatively painless.
_Azure has been the fast-growing cloud service provider the last few years and now owns nearly 17
percent of the global market.
_Key values/differentiators:
Page 9
+Use cases: Like AWS, most IT storage and cloud computing needs can be handled by Azure, which was
designed to be a direct competitor. Mainstays include enterprise storage, servers, data backup,
deduplication services.
+Azure Storage: Can manage keys of an Azure Storage account for you. Internally, Key Vault can list (sync)
keys with an Azure Storage Account, and regenerate (rotate) the keys periodically.
+DB service: Azure Cosmos DB is a globally distributed, multi-model database service for building highly
available, large-scale applications easily. By default, Azure Cosmos DB automatically indexes all the data it
ingests, efficiently. This enables fast and consistent SQL (and JavaScript) queries on any kind of data.
+Enterprise Security: Azure Key Vault enables Microsoft Azure applications and users to store and use
several types of secret/key data:
+Cryptographic keys: Supports multiple key types and algorithms, and enables the use of Hardware
Security Modules (HSM) for high-value keys.
+Secrets: Provides secure storage of secrets, such as passwords and database connection strings.
+Certificates: Supports certificates, which are built on top of keys and secrets and add an automated
renewal feature.
Page 10
IBM Cloud
_Value proposition for potential buyers: Three years ago, IBM realized it was confusing the market with its
various branded cloud options, whose purposes weren’t completely clear to the buying public. So it made a
key decision to merge all of them—from its SoftLayer acquisition to Bluemix to Watson—into one umbrella
business simply called IBM Cloud. IBM Cloud now offers more than 180 services for both on-premises and
public cloud systems. These services include virtualized and bare metal hosting, DevOps tools, container
deployments and serverless computing, blockchain, AI/ML and HPC. Using its bare-metal server offering,
it’s possible to lift and shift on-premises workloads running on IBM platforms to the cloud with little to no
modification.
_Key values/differentiators:
+While both AWS and Microsoft Azure are aimed at all enterprise IT customers, IBM has a much longer
history in serving and maintaining systems belonging to midrange to large enterprise customers.
+IBM’s reputation: It’s fairly easy to defend buying decisions of products and services from the original IT
company (which started up during the First World War in 1916) to CFOs and boards of directors. IBM has
invested a lot of capital and people-hours into keeping its offerings current.
+Use cases: IBM Cloud is aimed mostly at large enterprises for scale-out purposes. Most commonly
requested IT storage and cloud computing needs can be handled by IBM Cloud, which operates more than
a dozen high-end data centers globally. Chief tasks include test and dev, enterprise storage, database
protection, servers, data backup and archiving.
+Full-service options: IBM has a wider range of products and services than any other cloud provider, bar
none.
+You get what you pay for: IBM is going to cost more than almost everybody else, so don’t expect anything
cut-rate.
Page 11
Google Cloud Platform
_Value proposition for potential buyers: Google Cloud Platform is designed for use by cloud developers.
Overall, GCP still has had some catching up to do with AWS and IBM over the last half-dozen years when it
comes to market share of enterprise usage, but it has slowly but surely become a player globally. GCP,
which brought in $11 billion last year and owns 8 percent of the global market, originally wanted to be a
pure cloud play but realized that it had painted itself into a corner; it now works with on-premises systems
to provide elastic infrastructure, disaster recovery, DevOps and big data. But it also has a lot of cloud-based
services, most notably its AI efforts, which are bolstered by its custom AI processor, TensorFlow. You can’t
buy a TensorFlow system; you can only run your AI and machine learning apps on them on the Google
Cloud.
Page 12
_Key values/differentiators:
+Cloud expertise: Users won’t find better or more detailed cloud-computing application and development
expertise than at Google.
+Aimed at developers: If you’re an enterprise cloud developer, and you’re continually creating and/or
maintaining high-end cloud-based services and applications, you’re likely to have more surrounding
support and tools on GCP than the three larger-market players.
+Innovation galore: Google is where Kubernetes, TensorFlow and dozens of other key cloud and storage
technologies were invented, so there’s a lot of residual intellectual property inherent in GCP.
+Use cases: If you're a retail business or a midrange cloud computing user, chances are Google Cloud and
all its attributes might be IT overkill for your use case. If you are company with an active IT and
development team that is constantly creating, maintaining and updating applications in real time (or even
in near-real time), then you would be well-served using GCP. Test and dev is a huge use cases here.
+Pricing is competitive: Google knows that in order to move up in market share, it has to be price-
competitive, and it is, offering generous “get-started” programs and corporate discounts.
Page 13
Oracle Cloud
_Value proposition for potential buyers: Oracle has been busy moving all of its tools and databases to the
cloud for the last six years. The company is often considered as being late to the cloud, but the fact is, the
company spun off NetSuite 21 years ago, which was the first full-service enterprise cloud application
management platform. This was six years before AWS launched S3. Larry Ellison’s database and enterprise
app software giant has reinvented itself to re-provision 95 percent of its ground-based software as on-
demand services, at least on its own growing cloud. It does not allow its software to run in virtualized
instances the way AWS, Azure and GCP operate, but it can be run on bare metal servers, which Oracle still
offers (as a result of the 2010 acquisition of Sun Microsystems).
_Key values/differentiators:
+Speed is of the essence: Ellison has long bragged that Oracle’s database servers—whether in a data center
or in a cloud—are the fastest in the world, and they probably are. But you get what you pay for, and
Oracle’s products are not to be found at Walmart.
+Variety of offerings: Oracle now competes in many ways with Salesforce for the cloud business application
buyer, and it steadily adds to its repertoire of features for a long list of vertical sectors. Plowing profit back
into the business is a mainstay of the Oracle approach, and it produces dividends.
+One throat to choke: Once you buy into Oracle, you’re in for the long haul, and the company will basically
run it all for you. This will entail some long-term hardware and software costs, but that’s the business
Oracle is in, and a big reason why it gets so much government and military business.
+Use cases: Similar to IBM, VMware and Google Cloud Platform, Oracle Cloud is designed for IT admins and
cloud app developers. Chief services sold include enterprise applications (far and away No. 1), enterprise
storage, server and database services. Oracle will provide service help as needed.
Page 14
Heroku
_Heroku is a Containerized Application Cloud Platform as a Service (PaaS). Developers use Heroku to
deploy, manage, and expand modern apps. Their platform is very flexible and easy to use, providing
developers with the simplest way to get their apps to market.
_Heroku is entirely managed by Heroku, allowing developers to freely focus on their core product without
distraction in maintaining servers, hardware, or infrastructure. The Heroku experience offers services,
tools, workflows, and support all designed to enhance app developer productivity.
Page 15
_Heroku is known as a place to deploy applications in dyno. (When you deploy a Heroku application, you
have to set up a virtual machine called slug, using one or more build packs. When a virtual machine is
launched from slug, it is called dyno.)
_In the case of a lot of complex work, you will need to add more blocks (scale horizontally) or increase the
block size (scale vertically). Heroku usage fee is calculated based on the number of dyno and the size of
each dyno you use.
Page 16
_Code / data rollback: Heroku build system and Postgres service allow you to restore your source code or
database to a previous state in no time.
_App metrics: You will always know what happens to your applications thanks to built-in monitoring of
traffic, response time, memory, CPU load and errors ...
_Continuous delivery: Heroku Flow uses Heroku Pipeline, Review Apps and Integrated GitHub to build a CI /
CD pipeline process including build, test, deploy, ...
_GitHub Integration: GitHub integration helps you to pull requests, push, commit, ... works with every
branch you want.
Page 17
_Support to connect to salesforce: With Heroku Connect version, Heroku can connect to salesforce,
allowing your apps to sync two-way with salesforce. From there, you will easily scale and always have an
overview of your customers.
Page 18
_This is the homepage; we have logged in successfully.
Page 19
P6 Implement a cloud platform using open source tools.
create a database
_First, I download git for the database setup.
Page 20
_Now, I access the Laravel directory and load composer to support Laravel
Page 21
_Create env file that copy information from env.example file, the env is the configuration file for database and app.
Page 22
_Now, configure information in env file and database.
Page 23
_create database php.
Page 24
_Open Heroku application.
_You can see that my website already run because I have changed DB_Connection default value from
mysql to pgsql.
Page 25
My website on Heroku.
_Link Customer page: https://mysterious-scrubland-48587.herokuapp.com/
_Main page (index.php):
Page 26
P7 Analyze the most common problems which arise in a Cloud Computing platform and discuss
appropriate solutions to these problems.
_Cloud computing is the delivery of various hardware and software services over the internet, through a
network of remote servers. These remote servers are busy storing, managing, and processing data that
enables users to expand or upgrade their existing infrastructure.
Security issues
_We already mentioned the hot debate around data security in our business intelligence trends 2019
article, and security has indeed been a primary, and valid, concern from the start of cloud computing
technology: you are unable to see the exact location where your data is stored or being processed. This
increases the cloud computing risks that can arise during the implementation or management of the cloud.
Headlines highlighting data breaches, compromised credentials, and broken authentication, hacked
interfaces and APIs, account hijacking haven’t helped alleviate concerns. All of this makes trusting sensitive
and proprietary data to a third party hard to stomach for some and, indeed, highlighting the challenges of
cloud computing. Luckily as cloud providers and users, mature security capabilities are constantly
improving. To ensure your organization’s privacy and security is intact, verify the SaaS provider has secure
user identity management, authentication, and access control mechanisms in place. Also, check which
database privacy and security laws they are subject to.
_While you are auditing a provider’s security and privacy laws, make sure to also confirm the third biggest
issue is taken care of: compliance. Your organization needs to be able to comply with regulations and
standards, no matter where your data is stored. Speaking of storage, also ensure the provider has strict
data recovery policies in place.
_The security risks of cloud computing have become a reality for every organization, be it small or large.
That’s why it is important to implement a secure BI cloud tool that can leverage proper security measures.
Page 27
Lack of resources/expertise
_One of the cloud challenges companies and enterprises are facing today is lack of resources and/or
expertise. Organizations are increasingly placing more workloads in the cloud while cloud technologies
continue to rapidly advance. Due to these factors, organizations are having a tough time keeping up with
the tools. Also, the need for expertise continues to grow. These challenges can be minimized through
additional training of IT and development staff. A strong CIO championing cloud adoption also helps. As
Cloud Engineer Drew Ferment puts it:
_“The success of cloud adoption and migrations comes down to your people — and the investments you
make in a talent transformation program. Until you focus on the #1 bottleneck to the flow of cloud
adoption, improvements made anywhere else are an illusion.”
_SME (small and medium-sized) organizations may find adding cloud specialists to their IT teams to be
prohibitively costly. Luckily, many common tasks performed by these specialists can be automated. To this
end companies are turning to DevOps tools, like Chef and Puppet, to perform tasks like monitoring usage
patterns of resources and automated backups at predefined time periods. These tools also help optimize
the cloud for cost, governance, and security.
Governance/Control
_There are many challenges facing cloud computing and governance/control is in place number 4. Proper
IT governance should ensure IT assets are implemented and used according to agreed-upon policies and
procedures; ensure that these assets are properly controlled and maintained, and ensure that these assets
are supporting your organization’s strategy and business goals.
_In today’s cloud-based world, IT does not always have full control over the provisioning, de-provisioning,
and operations of infrastructure. This has increased the difficulty for IT to provide the governance,
compliance, risks and data quality management required. To mitigate the various risks and uncertainties in
transitioning to the cloud, IT must adapt its traditional IT governance and control processes to include the
cloud. To this effect, the role of central IT teams in the cloud has been evolving over the last few years.
Along with business units, central IT is increasingly playing a role in selecting, brokering, and governing
cloud services. On top of this third-party cloud computing/management providers are progressively
providing governance support and best practices.
Compliance
_One of the risks of cloud computing is facing today is compliance. That is an issue for anyone using backup
services or cloud storage. Every time a company moves data from the internal storage to a cloud, it is faced
with being compliant with industry regulations and laws. For example, healthcare organizations in the USA
have to comply with HIPAA (Health Insurance Portability and Accountability Act of 1996), public retail
Page 28
companies have to comply with SOX (Sarbanes-Oxley Act of 2002) and PCI DSS (Payment Card Industry
Data Security Standard).
_Depending on the industry and requirements, every organization must ensure these standards are
respected and carried out.
_This is one of the many challenges facing cloud computing, and although the procedure can take a certain
amount of time, the data must be properly stored.
_Cloud customers need to look for vendors that can provide compliance and check if they are regulated by
the standards they need. Some vendors offer certified compliance, but in some cases, additional input is
needed on both sides to ensure proper compliance regulations.
Page 29
_While organizations leverage an average of almost 5 clouds, it is evident that the use of the cloud will
continue to grow. That’s why it is important to answer the main questions organizations are facing today:
what are the challenges for cloud computing and how to overcome them?
Performance
_When a business moves to the cloud it becomes dependent on the service providers. The next prominent
challenges of moving to cloud computing expand on this partnership. Nevertheless, this partnership often
provides businesses with innovative technologies they wouldn’t otherwise be able to access. On the other
hand, the performance of the organization’s BI and other cloud-based systems is also tied to the
performance of the cloud provider when it falters. When your provider is down, you are also down.
_This isn’t uncommon, over the past couple of years all the big cloud players have experienced outages.
Make sure your provider has the right processes in place and that they will alert you if there is ever an
issue.
_For the data-driven decision-making process, real-time data for organizations is imperative. Being able to
access data that is stored on the cloud in real-time is one of the imperative solutions an organization has to
consider while selecting the right partner.
_With an inherent lack of control that comes with cloud computing, companies may run into real-time
monitoring issues. Make sure your SaaS provider has real-time monitoring policies in place to help mitigate
these issues.
Migration
_One of the main cloud computing industry challenges in recent years concentrates on migration. This is a
process of moving an application to a cloud. An although moving a new application is a straightforward
process, when it comes to moving an existing application to a cloud environment, many cloud challenges
arise.
_A recent survey conducted by Velostrata showed that over 95% of companies are currently migrating
their applications to the cloud, and over half of them find it more difficult than expected – projects are over
budget and deadline.
_What are the challenges faced during storing data in the cloud? Most commonly cited were:
+Extensive troubleshooting
+Security challenges
+Slow data migrations
+Migration agents
+Cutover complexity
Page 31
+Application downtime
_In another survey, although not that recent, but a picturesque perception of the migration to the cloud; IT
professionals stated they would rather “get a root canal, dig a ditch, or do their own taxes” than address
challenges in cloud computing regarding the deployment process.
Conclusion
_Cloud computing has some amazing advantages: infinite memory, fast computing energy entry and the
capacity to readily communicate and manage data, but has several problems and most of them relate to
safety. Before it is commonly embraced, cloud devices have to conquer many barriers, but can now be
used in certain compromised and under appropriate circumstances.
_It is no secret; cloud computing is revolutionizing the IT industry. It is also shaking up the business
intelligence (BI) landscape, and well, pretty everything else it touches. As the cloud adoption exponentially
grows, businesses of all sizes are realizing the benefits. For startups and small to medium-sized businesses
(SMEs), that can’t afford costly server maintenance, but also may have to scale overnight, the benefits of
utilizing the cloud are especially great.
_While cloud computing challenges do exist, if properly addressed, these 10 issues don’t mean your IT
roadmap has to remain anchored on-premise. Business intelligence (BI) and the cloud are an ideal match,
as the first one provides the right information to the right people while the latter is an agile way to access
BI applications.
So, what are the challenges faced during storing data in the cloud and how to overcome them?
_To make the best out of it and overcome issues, you should take a strategic iterative approach to
implementation, explore hybrid cloud solutions, involve business and IT teams, invest in a CIO, and choose
the right BI SaaS partner. All this will ensure that the benefits of cloud business intelligence will far
outweigh the challenges.
_Clearly, organizations have some demanding work ahead of them, especially since the adoption of the
cloud is becoming a business standard that will grow exponentially. Cloud is not just an idea to implement
overnight, but a strategic approach, management details, and professionals’ involvement can help reduce
potential risks, costs, and flaws in the implementation process. The future of cloud lies upon introducing
industry standards, that will help in addressing regulatory, management and technological matter.
Page 32
P8 Assess the most common security issues in cloud environments.
Security issues related to cloud computing
_Security in cloud computing consists of two areas: security problems facing cloud services and customer
security issues. Confronted. In the sense that user data and services are secured, cloud providers must
promise that the technology they offer is secure. Meanwhile, consumers must ensure that adequate
security steps have been taken by suppliers to secure their information.
_The extension of the use of virtualization strategies to construct cloud computing networks poses
particular consumer security concerns. The relation between the operating system and hardware
architectures including processing, storage and networking is altered by virtualization techniques. This
introduces a new layer that needs to be configured, maintained and protected-virtualization. The issues of
concern are software for virtualization. For starters, it will crash the whole system when a security issue
arises on administrative workstations with virtualization management software.
Prevention
_This control is set up to prevent purposeful attacks on cloud computing systems. Relatively similar to a
warning sign in a fence or property, these controls do not reduce the likelihood of the system being truly
compromised.
Precautions
_Controls enhance the power of the system by managing vulnerabilities. Preventive control will protect
system vulnerabilities. If an attack occurs, preventive controls are in place to ensure minimal damage and
security breaches of the system.
Repair
_Adjustment controls are used to reduce the impact of attacks. Unlike preventive controls, repair controls
are implemented when attacks take place.
Error detection
_The find control is used to detect any possible attacks with the system. In the case of an attack, detection
control will signal preventive or corrective control to resolve the problem.
Page 33
Aspects of cloud security
_The three most popular aspects are aggregated into cloud protection aspects: security and secrecy,
enforcement, and legal or contractual concerns.
Policy
_Many regulations involve the storage and use of data, including payment of industry standard security
data card (PCI DSS), health insurance and Liability Act (HIPAA), Sarbanes Act -Oxley. Many of the above
require regular and audited reporting. Cloud providers must allow their customers to comply with these
regulations.
_Continuity of response and data recovery: Cloud providers must have ongoing business plans and on-site
data recovery to ensure service can be maintained in the event of a disaster. disaster or emergency, and
any data loss will be recovered. These plans are shared and reviewed with their customers.
Page 34
_Logging and auditing: In addition to recording and auditing, cloud providers work with their customers to
ensure that audit records and documents are properly, maintenance until the customer requests it, and
may have access to legal investigative purposes (for example, eDiscovery).
_Distinctive policy requirements: In addition to the requirements given by customers, data centers
maintained by cloud providers may also be required to comply with other separate requirements. Using a
cloud service provider (CSP) can lead to additional security issues around data authorization from
customers or data tenants that may not exist on the same system., or in similar data centers or even in the
cloud of the same provider.
_Legal and contractual issues: In addition to the security and compliance issues listed above, cloud
providers and their customers will negotiate terms around liability. (for example, how the regulation
regarding data loss incidents or compromises will be resolved), intellectual property, and the end of the
service (when data and applications end same return for customers).
Data Security
_Data loss prevention solutions, SaaS security, and malware threat protection can all increase your cloud
data security to reduce the risk of internal and external threats, and guard against data breaches.
Page 35
Prevent Insider Threats
_Develop companywide standards to define who can take action on what data sets, in what environments,
using which methods to ensure that data stays carefully controlled. Limiting internal access points, and
monitoring how that information is used, can help keep sensitive data safe.
Account Takeovers
_When impersonators take over user accounts, they roam freely in the environment, carrying out
fraudulent activities wherever and whenever they want. Common signs of an account takeover may
include successful logins from other counties or IP addresses, successful logins from multiple different
countries in a short amount of time, mass file downloads, suspicious sharing activity, phishing emails
coming from an internal account, and more.
_In traditional on-prem environments, account takeovers are relatively easy to catch. But account
takeovers are a nagging security issue in cloud computing because they are notoriously difficult to detect.
Further, the impacts of a cloud account takeover are even more difficult to find and remediate.
_Using a cloud application account takeover prevention tool is one of the best ways to detect attempts,
identify account takeovers, and quickly remediate the issue.
Page 36
Advanced Malware and Phishing Attacks
_The element of human error in malware and phishing threats is still the greatest vulnerability that
organizations are contending with. To help prevent human error teach users about the importance of
creating and using complex passwords and identifying phishing attempts, keep operating systems and anti-
virus software up to date, and get in a routine of backing up files to guard against data loss.
_Using best-in-class cloud malware threat protection technology is the optimal way to protect against
malicious attacks.
_The security concerns involved with cloud computing do not outweigh the benefits of moving your
business to the cloud. Most reputable cloud applications continue to work hard to patch security
vulnerabilities and improve data security architecture. However, security administrators feel much better
knowing that their cloud environment is being monitored and controlled by a third-party platform. This is
where Managed Methods cloud application security platform comes in.
Page 37
References
1. Heroku.com. 2020. Cloud Application Platform | Heroku. [online] Available at:
<https://www.heroku.com/> [Accessed 6 November 2020].
2. Polar-temple-90087.herokuapp.com. 2020. Homepage - Polar-Temple-90087. [online] Available at:
<https://polar-temple-90087.herokuapp.com/#> [Accessed 6 November 2020].
3. GitHub. 2020. Tai0888 - Overview. [online] Available at: <https://github.com/Tai0888> [Accessed 6
November 2020].
4. TechRadar. 2020. Best Cloud Computing Services Of 2020: For Digital Transformation. [online]
Available at: <https://www.techradar.com/best/best-cloud-computing-services> [Accessed 6
November 2020].
5. Chris Preimesberger, e., 2020. Compare Top Cloud Computing Companies For 2020. [online]
eWEEK. Available at: <https://www.eweek.com/cloud/top-cloud-computing-providers> [Accessed 6
November 2020].
6. Cloud Academy. 2020. Which Cloud Computing Platform? - Cloud Academy Blog. [online] Available
at: <https://cloudacademy.com/blog/top-3-amazon-web-services-vs-micosoftazure-vsgoogle-
compute-platform/> [Accessed 6 November 2020].
7. Technology Diver. 2020. Heroku Là Gì ? Tổng Quan Về Nền Tảng Đám Mây Heroku - Technology
Diver. [online] Available at: <https://cuongquach.com/heroku-la-gi.html> [Accessed 6 November
2020].
8. Ribbonfish. 2020. What Is Heroku? A Brief Introduction - Ribbonfish. [online] Available at:
<https://ribbonfish.co.uk/blog/heroku-brief-introduction/> [Accessed 6 November 2020].
9. ManagedMethods. 2020. Top 5 Security Issues In Cloud Computing | Managedmethods. [online]
Available at: <https://managedmethods.com/blog/security-issues-in-cloud-computing/> [Accessed
6 November 2020].
10. Rackspace Technology. 2020. What Is Cloud Backup? Cloud Data Recovery Solutions | Rackspace
Technology. [online] Available at: <https://www.rackspace.com/library/what-is-cloud-
backup#:~:text=Cloud%20backup%20is%20a%20service,failure%2C%20outage%20or%20natural%2
0disaster.> [Accessed 6 November 2020].
11. BI Blog | Data Visualization & Analytics Blog | datapine. 2020. Cloud Computing Risks, Challenges &
Problems Businesses Are Facing. [online] Available at: <https://www.datapine.com/blog/cloud-
computing-risks-and-challenges/> [Accessed 6 November 2020].
Page 38
Page 39