You are on page 1of 25

Unit - V

Cloud Security

-by Poonam Kinage


Unit - V Cloud Security
Unit - V Cloud Security

5.1 Need and importance of Cloud Security


5.2 Methods of Providing Cloud Security
5.3 Infrastructure Security:
 Methods
 Case study
5.4 Data security and Storage:
 Methods
 Case study
5.5 Identity and Access Management:
 Access Control
 Trust
 Reputation
 Risk
5.3 Infrastructure Security
 Cloud security consists of different controls, procedures, and
technologies to protect your organization’s critical systems & data
against cyber security threats & risks stemming from cloud
environments.
 In terms of securing cloud infrastructure, there are two key areas:
 the actual, physical infrastructure which is your data center
 second, network security.
 Physical Level Security :-
 To secure data center, you must ensure that you are restricting access
to the facility to only authorized persons.
 Specific steps include access control measures such as access cards,
24/7 video surveillance monitoring, & an on-site security team.
 You must also have contingencies in place to prevent data loss caused
by natural disasters, an on-site incident, loss of power, & other risks.
 Within these contingencies, a data recovery plan is necessary along
with other redundancies.
 Physical level means protection of the places where the s/w is installed.
It can be lockers, backup generators, security cameras, & others.
Infrastructure Security cont….
 Network Level Security :-
 You must combine network monitoring, filtering and access
control to isolate malicious virtual machines, mitigate
distributed-denial-of-service (DDoS) attacks, and suspicious
access/logins.
 In this respect, you must install firewalls, security gateways, and
anti-DDoS systems.
 Network-level includes traffic encryption, use of authentication,
and authorization systems. On this level, the goal is to protect the
data traveling into, out of, or across the network.
 Data Level Security :
 At the lowest level of infrastructure security, data protection must
be considered, no matter where or how it is stored. Data level
includes data protection that can be stored in different places.
 This includes data encryption and backups. .
 Data encryption technologies also help protect data by encoding it
so that only users with the correct decryption key may access it.
Infrastructure Security cont….
 Application Level Security :-
 Application or software security should be a critical element of
a security program.
 Application-level is the protection of data in apps.
 Outdated software can contain vulnerabilities that cyber
attackers can exploit to gain access to IT systems.
 Ensuring software and firmware updates are distributed and
applied across the enterprise network, known as patching, helps
close security holes as well as provide new functionality,
performance improvements, and bug fixes for enterprise
applications.
 This includes protection of databases against attacks such as
SQL injections as well as the hardening of other applications
against unauthorized use or malicious exploits.
Benefits with proper Infrastructure Security

 Protect data from being stolen or otherwise


compromised, minimizing financial risk incurred with
steep fines.

 Ensure compliance with evolving data privacy rules that


mandate consumer information be kept safe from attack.

 Minimize the risk of damage due to user carelessness.


Tools & solutions for infrastructure security
 Firewall: This is the first line of defence against all manner of
threats, preventing malicious traffic from ever accessing your
internal networks.
 Antivirus or antimalware systems: Malware is introduced into the
enterprise through a number of means. Antimalware systems scan
email messages, web traffic and hardware devices to ensure that
they are not infected.
 Penetration testing and network vulnerability analysis tools: These
types of tools are set to run periodically — or continuously —
constantly scanning the network for potential security problems.
 Intrusion/violation detection system: An intrusion detection tool
monitors the network in real time, watching for behaviour that is
out of the ordinary or that indicates an attacker has breached the
infrastructure.
Tools & solutions for infrastructure security
 Authentication software: Authentication software monitors the
behavior of users with network access. AI detects unusual activity
that may imply a user’s credentials have been compromised.
 Password auditing tools: Passwords should be regularly audited to
ensure that users are not relying on insecure or hack-able login
credentials.
 Encryption tools: Encrypted data has limited to no value to
attackers, providing an extra layer of protection to your organization
in the event of an attack.
 SIEM tools: Security information and event management (SIEM)
tools automate much of the grunt work of monitoring infrastructure
security and provide a real-time analysis of the security alerts
generated by various applications in the enterprise.
Best practices/methods for securing infrastructure
 Pay attention to password security- Ensure that your passwords
are safe. If possible, also use two-factor authorization.
 Audit user permissions frequently- Check all the users and their
access to the infrastructure frequently.
 Ensure internet-based assets use secure protocols -Use secure
protocols for assets, such as SSH or SSL
 Regularly backup the system.
 Run stress-tests regularly for the system to detect problems in
infrastructure security. Run security scans and penetration tests to
hunt down vulnerabilities.
 Remove unused services and software.
 Encrypt wherever possible- Encrypted files are largely useless to
attackers who successfully enter the system but don’t hold the keys.
 Check and Properly the firewall configuration.
 Apply patches regularly- Patches should generally be installed the
day they are released, particularly if they include a security fix.
Major security threats in Cloud Infrastructure
 Cyber threats to technology infrastructure –
 phishing attempts and
 ransomware attacks to distributed denial of service (DDoS)
exploits and
 Internet of Things (IoT) botnets.
 Physical dangers include natural disasters such as
 fires and floods,
 civil unrest,
 utility outages, and
 theft or vandalism of hardware assets.
 Any of these have the potential to cause business disruption,
damage an organization’s public reputation, and have
significant financial consequences.
Case Studies in Cloud Infrastructure Security
 Case Study example of Cloud Computing Security
 Zero Trust Strategy
 Denial-of-Service (DoS/ DDoS) attacks
 Security system misconfiguration
 Data loss due to cyber attacks
 Unsecure access control points
 Inadequate threat notifications and alerts
 Account Hijacking
 Wireless Local Area Network Attack
 Traffic Flooding
 XML Signature Wrapping Attack
 Malware Injection
 Social Engineering Attack
Case Study in Cloud Infrastructure Security
 Denial-of-Service (DoS) attacks
 Denial-of-service attack, is a type of attack on a network that is designed
to bring the network to its knees by flooding (too many requests at the
same time it with useless traffic.
 DoS attack, denial-of-service attack, is an explicit attempt to make a
computer resource unavailable by either injecting a computer virus or
flooding the network with useless traffic.
 It can cause a machine/ server or a network to crash or slowing them
down, making it no longer accessible to users. Malicious attackers can
either send information to the target that causes it to shut down or flood
it with traffic to overwhelm it and cause a crash and it can also harm a
company’s authority and customer relations.
 DOS attack aims at disrupting the authorized use of networks, systems,
or applications by sending messages which exhaust service provider’s
resources ( network bandwidth, system resources, application resources)
 DDoS attacks employ multiple (dozens to millions) compromised
computers to perform a coordinated and widely distributed DoS attack
 DOS is an attack used to deny legitimate users access to a resource such
as accessing a website, network, emails, etc. or making it extremely slow.
Case Study - Denial-of-Service (DoS) attacks
 Types Of DOS Attack –

 DoS– this type of attack


is performed by a single
host

 Distributed DoS– this


type of attack is
performed by a number
of compromised
machines that all target
the same victim. It floods
the network with data
packets
Costs of DoS attacks for victim organizations
 Denial of Service is currently the most expensive computer crime for
victim organizations:
Classification of DoS attacks
 Bandwidth consumption:
 Attacks will consume all available network bandwidth
 Resource starvation:
 Attacks will consume system resources (mainly CPU, memory,
storage space)
 Programming flaws:
 Failures of applications or OS components to handle
exceptional conditions (i.e. unexpected data is sent to a
vulnerable component).
 Routing and DNS attacks:
 manipulate routing tables.
 changing routing tables to route to attacker’s net or black hole.
 attack to DNS servers, again route to attackers or black hole.
How to know if an attack is happening?

 Not all disruptions to service are the result of a DOS. There


may be technical problems with a particular network.
 However, the following symptoms could indicate a DoS or
DDoS attack:
 Unusually slow network performance
 Unavailability of a particular web site
 Inability to access any web site or any resources
 Dramatic increase in the amount of spam received in the
account.
Denial-of-Service (DoS) Examples
 Smurf
 Attacker sends sustained ICMP (availability of host) Echo
packets (ping) to broadcast address of the amplifying network,
with source address is forged.
 Since traffic was sent to broadcast address all hosts in the
amplifying LAN will answer to the victim’s IP address.

 Ping of death- Ping (win XP)


Denial-of-Service (DoS) Examples
 Spoofed DoS attack
 A spoofed DoS attack is a process in which
one host (usually a server or router) sends a
flood of network traffic to another host .
 Sol- Default Deny (TCP three-way handshake
 If every TCP/SYN packet is allowed to reach the
company server, hackers can flood the company’s
server with these packets, and overload the
connection.
 Instead, the firewall sends back a SYN/ACK
packet to the source IP.
 Once the firewall sends out the SYN/ACK packet,
it only allows a connection from the IP address
that sent the original TCP/SYN packet.
 A hacker has to have control of that IP address to
be able to connect to the company.
 Default Deny helps prevent a technique known as
“spoofing” IP addresses.
Denial-of-Service (DoS) Examples
 Syn flood
 TCP three-way handshake:
 The client requests a connection by sending a SYN
(synchronize) message to the server.
 The server acknowledges this request by sending SYN-ACK
back to the client, which,
 Responds with an ACK, and the connection is established.
 How it work………???
 attacker sends SYN packet to victim forging non-existent IP
address
 victim replies with Syn/Ack but neither receives Ack nor RST
from non-existent IP address
 victim keeps potential connection in a queue in Syn_Recv state,
but the queue is small and takes some time to timeout and flush
the queue, e.g 75 seconds
 If a few SYN packets are sent by the attacker every 10 seconds,
the victim will never clear the queue and stops to respond.
Detecting Distributed Denial of Service Attacks
by Monitoring the Source IP addresses
 IP addresses in
DDoS attack traffic
did not appear
before. [2003]
 Monitoring the
traffic volume is
likely to create high
false positive
 Monitoring the
percentage of new
IP addresses is very
effective in detecting
the attacks
Denial-of-Service (DoS) attacks Protection
 How to Avoid/Prevent being part of the problem?
 Prevent an attack An organization can adopt the following policy to
protect itself against Denial of Service attacks.
 Attacks such as SYN flooding take advantage of bugs in the
operating system. Installing security patches can help reduce
the chances of such attacks.
 Intrusion detection systems can also be used to identify and
even stop illegal activities.
 Install a firewall -Firewalls can be used to stop simple DoS
attacks by blocking all traffic coming from an attacker by
identifying his IP
 Routers can be configured via the Access Control List to limit
access to the network and drop suspected illegal traffic.
 Install anti-virus software.
 Applying email filters may help manage unwanted traffic
Conclusion Of DoS Case Study
 Denial of Service is currently the most expensive computer crime
for victim organizations.
 Strategic firewall placement allows companies to use the Internet
during a DDoS attack, and it allows them to continue receiving the
packets they want.
 Distributed Denial of Service Attacks could be Detected by
Monitoring the Source IP.
 It is easy to generate a successful DDoS attack that bypasses these
defences.
 DDoS attacks Infrastructure attacks DDoS are significant threats to
the future growth and stability of Internet.
 Cloud security experts need in-depth knowledge of how to
implement DoS attack protection and remediation strategies.
HOME WORK
 Explain Data Security
 Explain the Infrastructure Security
 What is Cloud Security and Encryption?
 How to overcome the cloud security issues?
 What is Network Security?
 Describe content level security.
 State the goals of cloud security
 What is infrastructure security in cloud computing?
 What are the different components of Data Security in cloud?
 What are the different levels of infrastructure security?
 Explain methods that are used to provide infrastructure security.
 What do you understand by Big Data in cloud?

You might also like