MuhammadSalahuddien
17 views
14 slides
Oct 01, 2024
Slide 1 of 14
1
2
3
4
5
6
7
8
9
10
11
12
13
14
About This Presentation
Trend of cloud security global
Size: 2.83 MB
Language: en
Added: Oct 01, 2024
Slides: 14 pages
Slide Content
THE TREND OF CLOUD SECURITY M. S. MANGGALANNY
AGENDA The Threats --- The Attacks --- The Security -- The Tools ----- The Tests ----- Summary ----- 26/02/23 THE TREND OF CLOUD SECURITY 1
INTRODUCTION Cloud computing is a model that offers instant computing services without bearing expenses. Nevertheless, like any other technology, it brings its drawbacks. One of the main issues is security and privacy concerns including data leakage due to shared infrastructure of computational resources to process confidential business information - such as intellectual property, trade secrets, and customer confidential information, which may cause unauthorized actors may access it. ----- 26/02/23 THE TREND OF CLOUD SECURITY 2
COMPLEXITY 26/02/23 THE TREND OF CLOUD SECURITY 3 Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing - Yasir Ahmed Hamza, Marwan Dahar Omar. Department of Computer Science, Computer and IT Faculty, Nawroz University, Duhok, Iraq. International Journal of Computational Engineering Research, Vol, 03, Issue, 6.
(1) THE THREATS 1.1. Data Loss and Data Leakage ; -------------------- Most Cloud Data Protection features for Enterprise are offered separately as optional and extended services e.g. additional storage for snapshot retention and anti-ransomware since it was resource extensive and costly . THE TREND OF CLOUD SECURITY 4 26/02/23
(1) THE THREATS … 1.2. Abuse and Nefarious Use ; ----------------------- As Cloud computing is a multiple services ecosystem, interactions, and interdependencies, have become more prevalent. The exploitation of (PaaS) for " Hacking as a Service " can be more challenging to mitigate since it is hidden in the same infrastructure. -------------------- 26/02/23 THE TREND OF CLOUD SECURITY 5
(1) THE THREATS … 1.3. Insecure Interface and APIs ; --------------------- Exploiting insecure APIs in a multitenancy environment can increase the risk of business espionage , potentially resulting in the compromise or theft of sensitive and private data. --------------------------------------- 26/02/23 THE TREND OF CLOUD SECURITY 6
(1) THE THREATS … 1.4. Shared Technology Issues ; ---------------------- The cloud service providers use scalable infrastructure to support multiple tenants which share the underlying infrastructure. At the lowest layers, where hypervisors can be exploited from compromised virtual machines in other tenancies to gain access to all VMs in the same shared environment. -------------------------------- 26/02/23 THE TREND OF CLOUD SECURITY 7
(2) THE ATTACKS 2.1. Virtual Machine Level Attack ; ----------------------- Attacks on the same Cloud platform can affect to other tenancies. It is mandatory for any Cloud deployment to harden virtualization layers to prevent VMs to VMs attacks. 2.2. Service and Session Hijacking ; ---------------------- 2.3. Man in the Cloud and DDoS ; ------------------------ THE TREND OF CLOUD SECURITY 8 26/02/23
(3) THE SECURITY 3.1. Cloud Control Layers ; --------------------------- Employ additional control layers in Cloud management from 3 rd party solution providers, especially for multi-cloud deployment. ---------------------------------- 3.2. Shared Responsibilities ; ------------------------- Employ “ back-to-back agreements ” with your Cloud Providers to ensure full security standard compliance. - THE TREND OF CLOUD SECURITY 9 26/02/23
(4) THE TOOLS Software Defined Security; re-assure the highest Cloud Security solutions available. ------------------------- Multifactor Authentication; AAA advancement for every Cloud Layer e.g. mandatory biometrics combinations. - Inspection and Monitoring; second opinion assessment. THE TREND OF CLOUD SECURITY 10 26/02/23
(5) THE TESTS Cloud Resources Isolation; prevent VMs to VMs pivot attacks. ----------- Check Lock-in Issues; prevent trapped-in to a vulnerable product. ------- Check Governance Issues; re-assure best practices standards. ----------- Check Compliance Issues; avoid sanctions and penalties. --------------- Check Data Integrity, Retention, and Disposal; prevent leakage and losses. THE TREND OF CLOUD SECURITY 11 26/02/23
SUMMARY This discussion conveys the security concerns associated with cloud services. It was noted that cybercriminals have taken advantage of the vulnerabilities within the shared ecosystem and the lack of effective security controls, leading to misuse of the platform. Hackers can illegally access the confidential information of other tenancies residing on the same cloud infrastructure. Therefore, businesses are advised to conduct ongoing risk assessments to mitigate potential threats to their sensitive data. Furthermore, cloud security providers must improve security protection through the implementation of more advanced and sophisticated proactive security measures to address these challenges . ---------------- THE TREND OF CLOUD SECURITY 12 26/02/23
THANK YOU MULA by GALERIA – The CILANDAK Town Square TB SIMATUPANG Highway – (KAVLING) Lot 17 Jakarta Selatan, DKI Jakarta 12770 – Indonesia Phone and Facsimile +62 21-7592-0274 THE TREND OF CLOUD SECURITY 13 26/02/23