Cloud has changed the way we use computing and can yield significant economic, collaborative and efficiency benefits. But with this increased adoption, at both the personal & business level, comes increased exposure to potential risks, threats and attacks. This talk will introduce the fundament...
Cloud has changed the way we use computing and can yield significant economic, collaborative and efficiency benefits. But with this increased adoption, at both the personal & business level, comes increased exposure to potential risks, threats and attacks. This talk will introduce the fundamentals of cloud security, how cloud service and deployment models influence security, and practices that we can all undertake for threat and risk protection.
DataLeakage
Dataisnolongerunder
your control
Loss ofconfidentiality
DataLoss
DataDamage
Acorrectcopyofthe
data is no longer
available
Compromiseofintegrity
oravailability
MalwareInjections
The attacker attempts to inject an
implementationofamaliciousservice
orvirtualmachineintothecloud.
Source:F5
DistributedDenialofService
(DDoS)
These types of attacks cause the
availabilityofdataorservicestogo
down because of an overload of
traffictotheserver.
Source:F5
InsecureApplication
Programming Interfaces(APIs)
APIsbecomeanopendoorwaytoanapplicationorcloudplatform-itiscriticalthat
they aresecured.
Source:F5
Containerization
With the wide adoption of
container-based applications,
systemsbecamemorecomplex
andsecurityrisksincreased.
Source:Devopedia
NISTCybersecurity
Framework
■Backupandrestore
■Disasterrecovery
■Improvementsand
communication
■Remediation
21
Best Practices
•Research Your Cloud Service Provider’s Security Program
•Read Your Cloud Services Provider’s Terms of Use
•Utilize NIST’s Cybersecurity Framework
•Prevent, detect and respond to cyberattacks -nist.gov/cyberframework
•Utilize NIST’s Guidelines on Security and Privacy in Public Cloud
Computing
•nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf