Skip to main content

Posts

Showing posts with the label Unit 5: Understanding of Cloud Security

Unit 5: Understanding of Cloud Security – Question Bank

Unit 5: Understanding of Cloud Security – Question Bank Why is security a major concern in cloud computing? How do different cloud computing service models vary in terms of built-in security? What is the concept of a security boundary in cloud computing, and how does it separate client and vendor responsibilities? With diagram explain the Security service boundary in cloud computing. Why is storing data in the cloud a particular concern for security? How can proxy and brokerage services help enhance security in cloud storage? What are some of the features that need to be considered for logging, auditing, and regulatory compliance in cloud computing systems? How can identity and related protocols be approached from a security standpoint in the cloud? What are the unique security risks associated with cloud computing, as highlighted by the Gartner Group? How can the risks in a cloud deployment be evaluated and analysed? What is the role of "golden" system image references in ma...

The security boundary

In cloud computing, understanding the security boundary is crucial for effectively discussing and implementing security measures. The specific cloud computing model being used helps define the built-in security features, identify the parties responsible for security mechanisms, and establish the boundary between the service provider's and customer's responsibilities. The most commonly used model, based on the U.S. National Institute of Standards and Technology (NIST), separates deployment models from service models and assigns a set of service attributes to each. Deployment models include community, hybrid, private, and public clouds, while service models follow the SPI (Software, Platform, Infrastructure) model, encompassing Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). NIST's model does not mandate the use of virtualization or multi-tenancy, but these factors significantly impact security in cloud computing. The Cloud ...

Securing the Cloud

In order to secure cloud computing, there are several factors and steps to consider: Identify the resources: Determine which data, services, or applications you plan to move to the cloud. This will help you assess the specific risks associated with each resource. Assess sensitivity to risk: Evaluate the sensitivity of the resources to risks such as loss of privacy, unauthorized access, data loss, and availability interruptions. Different resources may have different levels of sensitivity and require different security measures. Consider cloud types: Understand the different cloud deployment models (public, private, hybrid, shared community) and evaluate the associated risks for each resource. Consider where the data and functionality will be stored and maintained within the chosen cloud type. Understand the service model: Different cloud service models (IaaS, SaaS, PaaS) have different levels of security responsibilities. Determine which model you will be using and understand the secur...