Unit 4
Unit 4
Security is the responsibility of all those who come into contact with the system and is only as
good as the most lax behavior or policy in the organization. Security has three interrelated
aspects: physical, logical, and behavioral. All three must work together if the quality of security
is to remain high.
• Physical Security
Physical security refers to securing the computer facility, its equipment, and software
through physical means. It can include controlling access to the computer room by means
of machinereadable badges, biometric systems, or a human sign-in/sign-out system, as
well as using closed-circuit television cameras to monitor computer areas, backing up data
frequently, and storing backups in a fireproof, waterproof area, often at a secure off-site
location.
In addition, small computer equipment should be secured so that a typical user cannot
move it, and it should be guaranteed uninterrupted power. Alarms that notify appropriate
people of fire, flood, or unauthorized human intrusion must be in working order at all
times.
Decisions about physical security should be made along with users when the analyst is
planning for computer facilities and equipment purchases. Obviously, physical security
can be much tighter if anticipated in advance of actual installation and if computer rooms
are specially equipped for security when they are constructed rather than outfitted as an
afterthought.
• Logical Security
Logical security refers to logical controls in the software itself. The logical controls
familiar to most users are passwords or authorization codes of some sort. When used, they
permit the user with the correct password to enter the system or a particular part of a
database.
Passwords, however, are treated cavalierly in many organizations. Employees have been
overheard yelling a password across crowded offices, taping passwords to their display
screens, and sharing personal passwords with authorized employees who have forgotten
their own.
Special encryption software has been developed to protect commercial transactions on the
Web, and business transactions are proliferating. Internet fraud is also up sharply,
however, with few authorities trained in catching Internet criminals and a “wild west,” or
“last frontier,” mentality clearly evidenced in those instances when authorities have been
able to apprehend Web criminals.
One way for networks to cut down on the risk of exposure to security challenges from the
outside world is to build a firewall or firewall system. A firewall constructs a barricade
between an internal organization’s network and an external (inter)network, such as the
Internet. The internal network is assumed to be trustworthy and secure, whereas the
Internet is not. Firewalls are intended to prevent communication into or out of the network
that has not been authorized and that is not wanted. A firewall system is not a perfect
remedy for organizational and Internet security; it is, however, an additional layer of
security that is now widely endorsed. There is still no fully integrated way to address
security problems with internal and external networks, but they do deserve analysts’
attention when planning any new or improved systems.
Logical and physical controls are important but clearly not enough to provide adequate
security. Behavioral changes are also necessary.
• Behavioral Security
The behavioral expectations of an organization are implicit in its policy manuals and even
on signs posted in work rooms and lunch rooms, as we saw in Chapter “Information
Gathering: Unobtrusive Methods“. The behavior that organization members internalize,
however, is also critical to the success of security efforts. (One reason firewalls are not
attack-proof is because many attacks to information systems come from within the
organization.)
Security can begin with the screening of employees who will eventually have access to
computers, data, and information, to ensure that their interests are consistent with the
organization’s interests and that they fully understand the importance of carrying through
on security procedures. Policies regarding security must be written, distributed, and
updated so that employees are fully aware of expectations and responsibilities. It is typical
that the systems analyst will first have contact with the behavioral aspects of security.
Some organizations have written rules or policies prohibiting employees from surfing the
Web during work hours, or even prohibiting Web surfing altogether, if company
equipment is involved. Other corporations use software locks to limit access to Web sites
that are judged to be objectionable in the workplace, such as game, gambling, or
pornographic sites.
Employees should clearly understand what is expected of them, what is prohibited, and
the extent of their rights and responsibilities. In the United States and European Union,
employers are legally obligated to disclose all monitoring that is being done or that is being
contemplated, and they must supply the rationale behind it. Such disclosure should include
the use of video cameras, software, and phone monitoring.
Output generated by the system must be recognized for its potential to put the organization
at risk in some circumstances. Controls for output include displays that can only be
accessed via password, the classification of information (that is, to whom it can be
distributed and when), and secure storage of printed and stored documents, no matter what
their format.
In some cases, provision for shredding documents that are classified or proprietary must
be made. Shredding or pulverization services can be contracted from an outside firm that,
for a fee, will shred magnetic media, printer cartridges, and paper. A large corporation may
shred upward of 76,000 pounds of output in a variety of media annually.
It is well known that intruders can violate the integrity of any computer system. As an
analyst, you need to take a series of precautions to protect the computer network from both
internal and external Web security threats. A number of actions and products can help you:
The other side of security is privacy. To make your Web site more secure, you must ask
the user or customer to give up some privacy.
As a Web site designer, you will recognize that the company for which you design
exercises a great deal of power over the data its customers are providing. The same tenets
of ethical and legal behavior apply to Web site design as to the design of any traditional
application that accepts personal data from customers. The Web, however, allows the data
to be collected faster and allows different data to be collected (such as the browsing habits
of the customer). In general, information technology makes it possible to store more data
in data warehouses, process that data, and distribute the data more widely.
Every company for which you design an ecommerce application should adopt a privacy
policy. Here are some guidelines:
1. Start with a corporate policy on privacy. Make sure it is prominently displayed on the
Web site so that all customers can access the policy whenever they complete a
transaction.
2. Only ask for information the application requires to complete the transaction at hand.
For example, is it necessary to the transaction to ask a person’s age or gender?
3. Make it optional for customers to fill out personal information on the Web site. Some
customers do not mind receiving targeted messages, but you should always give
customers an opportunity to maintain the confidentiality of their personal data by not
responding.
4. Use sources that allow you to obtain anonymous information about classes of
customers. There are companies that offer audience profiling technology and
technology solutions for management of advertisements, their targeting, and their
delivery. They do so by maintaining a dynamic database of consumer profiles without
linking them to individuals, thereby respecting customers’ rights to privacy.
5. Be ethical. Avoid the latest cheap trick that permits your client to gather information
about the customer in highly suspect ways. Tricks such as screen scraping (capturing
remotely what is on a customer’s screen) and email cookie grabbing are clear violations
of privacy, and may prove to be illegal as well.
All the major promises of the cloud -- improved IT efficiency, flexibility and scalability --
come with one major challenge: security.
Many organizations can't delineate where cloud service provider (CSP) responsibilities end and
their own responsibilities begin, opening them to numerous vulnerabilities. The increased
expansiveness of the cloud also increases an organization's potential attack surface. To further
complicate the matter, traditional security controls often don't fulfill cloud security needs.
To help companies understand the cloud challenges they're up against, the Cloud Security
Alliance (CSA) went directly to the professionals. A working group of practitioners, architects,
developers and C-level staff identified a list of about 25 security threats, which were then
analyzed by security professionals who ranked them and narrowed them down further to the
11 most common cloud security challenges:
1. data breaches
2. misconfigurations and inadequate change control
3. lack of cloud security architecture and strategy
4. insufficient identity, credential, access and key management
5. account hijacking
6. insider threats
7. insecure interfaces and APIs
8. weak control plane
9. metastructure and applistructure failures
10. limited cloud usage visibility
11. abuse and nefarious use of cloud services
1. Data breaches
A responsibility of both CSPs and their customers, data breaches remained the top cloud
security threat yet again this year in CSA's report. A number of data breaches have been
attributed to the cloud over the past years, one of the most notable being Capital One's cloud
misconfigurations.
A data breach can bring a company to its knees, causing irreversible damage to its reputation,
financial woes due to regulatory implications, legal liabilities, incident response costs and
decreased market value.
CSA Cloud Controls Matrix (CCM) specifications (see "CSA Cloud Controls Matrix" sidebar
for more info) include the following:
When assets are set up incorrectly, they are vulnerable to attack. For example, the Capital One
breach was traced back to a web application firewall misconfiguration that exposed Amazon
S3 buckets. In addition to insecure storage, excessive permissions and the use of default
credentials are two other major sources of vulnerabilities.
Related to this, ineffective change control can cause cloud misconfigurations. In on-demand,
real-time cloud environments, change control should be automated to support rapid change.
A responsibility of the customer, misconfigurations and change control are new to the cloud
security threat list.
defining the business value of data and the impact of its loss; and
ensuring external partners adhere to the change management, release and testing procedures
used by internal developers;
performing security awareness training with contractors, third-party users and employees.
Too many organizations jump into the cloud without the proper architecture and strategy in
place. Prior to making the leap to the cloud, customers must understand the threats they are
exposed to, how to migrate to the cloud securely -- note, it's not a lift-and-shift process -- and
the ins and outs of the shared responsibility model.
This threat is new to the list and is a responsibility of the customer. Without proper planning,
customers will be vulnerable to cyber attacks that can result in financial losses, reputational
damage, and legal and compliance issues.
• ensuring the security architecture aligns with business goals and objectives;
• developing and implementing a security architecture framework; and
A majority of cloud security threats -- and cybersecurity threats in general -- can be linked to
identity and access management (IAM) issues. According to CSA guidance, this stems from
the following:
• weak passwords
New to the top cloud security challenges list, standard IAM challenges are exacerbated by
cloud use. Conducting inventory, tracking, monitoring and managing the sheer number of
cloud accounts needed is compounded by provisioning and deprovisioning issues, zombie
accounts, excessive admin accounts and users bypassing IAM controls, as well as challenges
with defining roles and privileges.
• rotating keys, removing unused credentials and access privileges, and employing
central, programmatic key management.
• identifying key managers and creating and maintaining key management policies;
Cloud account hijacking is the disclosure, accidental leakage, exposure or other compromise
of a cloud account that is critical to the operation, administration or maintenance of a cloud
environment. These highly privileged and sensitive accounts, if breached, can cause massive
consequences.
From phishing and credential stuffing to weak or stolen credentials to improper coding,
account compromise can lead to data breaches and service disruptions.
The risks associated with employees and others working within an organization's network are
not limited to the cloud. Whether negligent or intentional, insiders -- including current and
former employees, contractors and partners -- can cause data loss, system downtime, reduced
customer confidence and data breaches.
A responsibility of the customer, insider threats involving leaked or stolen data, credential
issues, human errors and cloud misconfigurations must be addressed.
CSP UIs and APIs through which customers interact with cloud services are some of the most
exposed components of a cloud environment. The security of any cloud service starts with
how well these are safeguarded and is the responsibility of both customers and CSPs.
CSPs must ensure security is integrated, and customers must be diligent in managing,
monitoring and securely using what CSA calls the "front door" of the cloud. This threat
dropped from the third most important in the last report but is still important to address.
• segregating and restricting access to audit tools that interact with the
organization's information systems to prevent data disclosure and tampering; and
A responsibility of the customer and new to the list this year, the cloud control plane is the
collection of cloud administrative consoles and interfaces used by an organization. It also
includes data duplication, migration and storage, according to CSA. Improperly secured, a
breached control plane could cause data loss, regulatory fines and other consequences, as
well as a tarnished brand reputation that could lead to revenue loss.
• establishing and making infosec policies and procedures readily available for
review by internal personnel and external business relationships;
• establishing policies to label, handle and secure data and objects that contain data.
9. Metastructure and applistructure failures
The metastructure, defined by CSA, is "the protocols and mechanisms that provide the
interface between the infrastructure layer and other layers" -- in other words, "the glue that
ties the technologies and enables management and configuration."
Also known as the waterline, the metastructure is the line of demarcation between CSPs and
customers. Many security threats exist here -- for example, CSA cited poor API
implementation by CSPs or improper cloud app use by customers. Such security challenges
could lead to service disruption and misconfigurations with financial and data loss
consequences.
The applistructure is defined as "the applications deployed in the cloud and the underlying
application services used to build them -- for example, PaaS features like message queues, AI
analysis or notification services."
A new threat this report, it is a customer and CSP responsibility. CSA recommended the
following:
• CSPs offering visibility and exposing mitigations to counteract their tenants' lack
of transparency;
Cloud visibility has long been a concern of enterprise admins, but it is new to the CSA cloud
security challenges list this report. Limited visibility results in two key challenges, according
to CSA:
1. Unsanctioned app use, also known as shadow IT, is when employees use
applications not permitted by IT.
2. Sanctioned app misuse is when apps approved by IT are not used as intended.
This includes users authorized to use the app, as well as unauthorized individuals
accessing it with stolen credentials obtained via SQL injection or DNS attacks, for
example.
This limited visibility, CSA said, leads to lack of governance, awareness and security -- all of
which can result in cyber attacks, data loss and breaches.
New to the list this year, it is a responsibility of CSPs and customers. CSA recommended the
following:
• making all personnel aware of their compliance and security roles and
responsibilities; and
Just as the cloud can be used for good, it can also be used maliciously by threat actors.
Nefarious use of legitimate SaaS, PaaS and IaaS offerings affects individuals, cloud
customers and CSPs alike. Disguised as coming from a CSP, customers are especially
vulnerable to the misuse of cloud services via the following:
• cryptomining
• click fraud
• brute-force attacks
Compromised and abused cloud services can lead to incurred expenses -- for example, loss in
cryptocurrency or payments made by the attacker; the customer unknowingly hosting
malware; data loss; and more.
CSA recommended CSPs be diligent in detecting and mitigating such attacks with an incident
response framework. CSPs should also offer tools and controls their customers can use
to monitor cloud workloads and applications.
What can enterprise businesses do to reap the benefits of cloud technology while ensuring a
secure environment for sensitive information? Recognizing those challenges is the first step to
finding solutions that work. The next step is choosing the right tools and vendors to mitigate
those cloud security challenges.
In our technology driven world, security in the cloud is an issue that should be discussed from
the board level all the way down to new employees. The CDNetworks blog recently discussed
“what is cloud security” and explained some of its benefits. Now that we understand what cloud
security is, let’s take a look at some of the key challenges that may be faced and why you want
to prevent unauthorized access at all costs.
As more and more businesses and operations move to the cloud, cloud providers are becoming
a bigger target for malicious attacks. Distributed denial of service (DDoS) attacks are more
common than ever before. Verisign reported IT services, cloud platforms (PaaS) and SaaS was
the most frequently targeted industry during the first quarter of 2015.
Complementing cloud services with DDoS protection is no longer just good idea for the
enterprise; it’s a necessity. Websites and web-based applications are core components of 21st
century business and require state-of-the-art cybersecurity.
2: Data breaches
Known data breaches in the U.S. hit a record-high of 738 in 2014, according to the Identity
Theft Research Center, and hacking was (by far) the number one cause. That’s an incredible
statistic and only emphasizes the growing challenge to secure sensitive data.
Traditionally, IT professionals have had great control over the network infrastructure and
physical hardware (firewalls, etc.) securing proprietary data. In the cloud (in all scenarios
including private cloud, public cloud, and hybrid cloud situations), some of those security
controls are relinquished to a trusted partner meaning cloud infrastructure can increase security
risks. Choosing the right vendor, with a strong record of implementing strong security
measures, is vital to overcoming this challenge.
3: Data loss
When business critical information is moved into the cloud, it’s understandable to be concerned
with its security. Losing cloud data, either through accidental deletion and human error,
malicious tampering including the installation of malware (i.e. DDoS), or an act of nature that
brings down a cloud service provider, could be disastrous for an enterprise business. Often a
DDoS attack is only a diversion for a greater threat, such as an attempt to steal or delete data.
To face this challenge, it’s imperative to ensure there is a disaster recovery process in place, as
well as an integrated system to mitigate malicious cyberattacks. In addition, protecting every
network layer, including the application layer (layer 7), should be built-in to a cloud security
solution.
4: Insecure access control points
One of the great benefits of the cloud is it can be accessed from anywhere and from any device.
But, what if the interfaces and particularly the application programming interfaces (APIs) users
interact with aren’t secure? Hackers can find and gain access to these types of vulnerabilities
and exploit authentication via APIs if given enough time.
Portability
This is another challenge to cloud computing that applications should easily be migrated from
one cloud provider to another. There must not be vendor lock-in. However, it is not yet made
possible because each of the cloud provider uses different standard languages for their
platforms.
Interoperability
It means the application on one platform should be able to incorporate services from the other
platforms. It is made possible via web services, but developing such web services is very
complex.
Computing Performance
Data intensive applications on cloud requires high network bandwidth, which results in high
cost. Low bandwidth does not meet the desired computing performance of cloud application.
Security Planning
Before deploying a particular resource to cloud, one should need to analyze several aspects of
the resource such as:
Select resource that needs to move to the cloud and analyze its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS, and SaaS. These models require customer
to be responsible for security at different levels of service.
Consider the cloud type to be used such as public, private, community or hybrid.
Understand the cloud service provider's system about data storage and its transfer into and out
of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.
Security Boundaries
A particular service model defines the boundary between the responsibilities of service
provider and customer. Cloud Security Alliance (CSA) stack model defines the boundaries
between each service model and shows how different functional units relate to each other. The
following diagram shows the CSA stack model:
• IaaS is the most basic level of service with PaaS and SaaS next two above levels of
services.
• Moving upwards, each of the service inherits capabilities and security concerns of the
model beneath.
• IaaS provides the infrastructure, PaaS provides platform development environment,
and SaaS provides operating environment.
• IaaS has the least level of integrated functionalities and integrated security while SaaS
has the most.
• This model describes the security boundaries at which cloud service provider's
responsibilities end and the customer's responsibilities begin.
• Any security mechanism below the security boundary must be built into the system
and should be maintained by the customer.
Although each service model has security mechanism, the security needs also depend upon
where these services are located, in private, public, hybrid or community cloud.
Since all the data is transferred using Internet, data security is of major concern in the cloud.
Here are key mechanisms for protecting data.
• Access Control
• Auditing
• Authentication
• Authorization
All of the service models should incorporate security mechanism operating in all above-
mentioned areas.
Since data stored in cloud can be accessed from anywhere, we must have a mechanism to
isolate data and protect it from client’s direct access.
Brokered Cloud Storage Access is an approach for isolating storage in the cloud. In this
approach, two services are created:
• A broker with full access to storage but no access to client.
• A proxy with no access to storage but access to both client and broker.
Encryption helps to protect data from being compromised. It protects data that is being
transferred as well as data stored in the cloud. Although encryption helps to protect data from
any unauthorized access, it does not prevent data loss.
This threat arises due to relatively weak registration systems present in the cloud computing
environment. In cloud computing registration process, anyone having a valid credit card can
register and use the service. This facilitates anonymity, due to which spammer, malicious code
authors and criminals can attack the system.
Remediations:
• Organizations must use strong IDS/IPS.
• Organizations must use firewalls that can inspect incoming and outgoing traffic.
• The integration of cloud services must not be left up to individuals, groups for
implementation.
• An organization must choose their storage vendors wisely. The process must be corporate
IT or security team only. It will be especially important to involve cloud software
engineer for problem solving.
• By implementing stricter registration process and validation process.
• By credit card fraud monitoring and coordination.
• Detailed introspection of user’s network traffic.
Malicious users can exploit poorly secured cloud service deployments, free cloud service trials,
and fraudulent account sign-ups, which expose cloud computing models such as Iaas, PaaS,
and SaaS. You might experience denial of service attacks, email spam and phishing campaigns,
and brute-force computing attacks, or malicious individuals spoofing identities.
Some charts display data reported by Amazon GuardDuty, which is a threat detection service
that continuously watches for malicious activity and unauthorized behavior.
An unauthorized user may access and re-use these APIs or passwords. They may transmit
content, get authorizations and logging capabilities.
Customers use a set of software Interfaces or APIs to interact with cloud services. The
provisioning, management, orchestration and monitoring of the cloud service are generally
done using these interfaces. If the weak set of interfaces and APIs are used, this may expose
organizations to various security threats, such as anonymous access, reusable tokens or
Remediations:
• Use a good security model of software interfaces.
• Practise strong authentication methods and limit access with encrypted transmission.
• Use standard API frameworks.
To mitigate the above threats, the security model of cloud provider interfaces should be
analysed. Strong authentication and access controls should be implemented. Encryption should
be used for transmission of content and, dependency chain associated with the API should be
clearly understood.
Malicious Insiders
This threat is well known to most organizations. Malicious insiders’ impact on organization is
considerable. Given their level of access, they can infiltrate organizations and assets and do
brand damage, financial losses and productivity losses. Therefore, it is critical for customers of
cloud services as to what controls have been provided by cloud providers to detect and defend
against the malicious insider threats.
A malicious insider can access sensitive data of the system administrator or may even get
control over the cloud services at greater levels with little or no risk of detection. A malicious
insider may affect an organization through brand damage, financial impact and productivity
loss.
Remediations:
• Organizations must understand the practices performed by cloud providers, how to grant
access to employees, and set compliance policies.
• There should be security and privacy awareness programs to understand, recognize and
report any suspicious activity.
• Organizations should automate their processes and use technologies that scan frequently
for misconfigured resources and remediate unknown activity in real time.
The Malicious insider threats can be mitigated by specifying human resources requirements as
part of legal contracts, conducting a comprehensive supplier assessment, providing
transparency into overall information security and management practices, as well as
compliance reporting and determining security breach notification processes.
Shared Technology Issues
Cloud providers deliver their services by sharing applications, or infrastructure. Sometimes,
the components that make up the infrastructure for cloud technology as-a-service offering are
not designed to offer strong isolation properties for a multi-tenant cloud service. This may lead
to vulnerabilities in shared technology that can be attacked in almost all delivery models.
Remediations:
• Sensitive data should be protected via encryption.
• Data should be segmented and protected according to sensitivity levels.
• Organizations must conduct vulnerability scanning and configuration audits regularly.
Data loss or leakages have an adverse effect on the business. The brand or reputation is
completely lost and the customers’ morale and trust are eroded. This data loss or leakage may
be due to insufficient authentication, authorization and audit controls, inconsistent use of
encryption and software keys, disposal challenges, a data center reliability, and disaster
recovery.
Remediations:
• Cloud service providers should provide adequate security controls to customers as well
as specify backup and retention strategies to them.
• Use strong API access control.
• Encrypt security of data in transit.
The threats arising due to data loss or leakage can be mitigated by encrypting and protecting
integrity of data in transit, analyzing data protection at both design and runtime,implementing
strong key generation, storage and management. Contractually demanding provider to wipe
persistent media before it is released in to pool and contractually specifying provider backup
and retention strategies.
It’s clear that cloud hijacking is a real risk for businesses – with grave consequences if a hacker
manages to steal sensitive data.
There are many ways for a cloud hijacking attack to happen, including:
• Phishing attacks
• Brute force password attacks, in which a cybercriminal uses trial and error to guess an
employee’s password
• Using stolen password and login data up for grabs on the Dark Web
• Server-side request forgery (SSRF) attacks
• Manipulation of insecure web and mobile applications
• Credential-stealing malware
Underlying all of these tactics is a common thread: the fact that hackers don’t need to be
physically on-premises to access your employees’ cloud accounts. Unless you have the right
security tools at your disposal, it will be impossible for you to tell whether the person logging
in to your employee’s account is legitimate or malicious.
Because cloud hijacking can have many root causes, you need to take a multi-levelled approach
to ensure adequate protection. Here are our top tips to consider:
• Enable MFA:
Multi-factor Authentication (MFA) is an authentication tool that mandates your users
to verify themselves using two or more methods in order to access corporate resources
like cloud applications. MFA is a simple way to protect common cloud hijacking tactics
like brute force attacks. You should use MFA in conjunction with strong password
policies – such as enforcing employees to change their passwords every six weeks. As
a side note, if MFA is difficult to implement across your cloud applications, set a
company policy that encourages employees to call the cellphone of the person who has
asked for a wire transfer to ensure it’s legitimate.
Software versions, updates, security practices, vulnerability profiles, intrusion attempts, and
security design are all factors for estimating your institution’s security posture.
In some of these areas, cloud computing solutions may offer different levels of visibility
compared to their on-premise counterparts. This can contribute to making it harder to
“calculate” a risk profile. In reality, all infrastructures have some unknown risks.
Essentially, your cloud provider is responsible for making sure your infrastructure built within
its platform is inherently secure and reliable. To provide a secure cloud, the cloud vendor
manages and controls the host Operating System (OS) and the virtualization layer. They also
guarantee the physical security of the facilities.
Staying secure in a cloud is a shared responsibility. Type of cloud service model – IaaS, PaaS
and SaaS- dictates who is responsible for which security task.
SaaS moves the task of managing software and its deployment to third-party services. In a
SaaS model, the provider is primarily responsible for the infrastructure and software stack, as
the user has less control over these components.
PaaS provides its’ clients an environment in which the operating system and server software,
as well as the underlying server hardware and network infrastructure are taken care of. This
lets the user free to focus on the business side of scalability, and the application development
of their product or service.
In IaaS, cloud provider supplies and is responsible for securing basic cloud infrastructure
components, such as virtual machines, disks and networks. The provider is also responsible for
the physical security of the data centers that house its infrastructure. IaaS users, are generally
responsible for the security of the operating system and software stack required to run their
applications, as well as their data.
Users’ responsibilities generally increase as they move from SaaS to PaaS to IaaS.
The shared responsibility for cloud security has been adopted by other prominent cloud
providers as well. The division of responsibilities in Microsoft Azure’s shared responsibility
model differentiates obligations according to the customer’s level of cloud deployment. Those
three levels include Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and
Software-as-a-Service (SaaS).