cse
cse
AIM
The aim of this study is to assess host-level security measures in
SaaS, PaaS, and IaaS cloud models, focusing on the shared security
responsibilities between providers and customers. It evaluates how
virtualization impacts security and identifies best practices for protecting both
physical and virtual infrastructure. The goal is to enhance security strategies
across different cloud environments.
BACKGROUND
Infrastructure Security is essential for protecting an
organization's IT framework, encompassing network, host, and
application levels. It ensures that core systems are shielded
from unauthorized access, breaches, and other threats. Host -
level security, particularly in cloud environments like SaaS,
PaaS, and IaaS, requires a nuanced approach due to varying
responsibilities between providers and customers. SaaS and
PaaS models abstract the underlying host systems from users,
while IaaS shifts more responsibility for host security to the
customer. Effective security involves safeguarding physical
hardware, managing virtualization, and implementing robust
data protection measures.
THEORY
1. Defense in Depth
This security strategy involves implementing multiple layers of
protection across different levels of the IT infrastructure. By having
various security measures in place, such as network defenses , host
protections, and application security controls, organizations can create a
robust security posture that mitigates the risk of a successful attack.
3. Security by Design
This theory emphasizes incorporating security into the design phase of
systems and applications rather than as an afterthought. Secure design
principles include threat modeling, secure coding practices, and regular
security assessments to identify and address vulnerabilities early in the
development lifecycle.
4. Virtualization Security
Virtualization creates isolated virtual environments on a single physical
server. The theory behind virtualization security involves ensuring that
these virtual environments are securely isolated to prevent breaches from
one VM affecting others. It also includes managing the security of
hypervisors and virtual machines.
Generally, The Cloud Service providers do not disclose or share the details
about their host platforms, host OS or Security processes to avoid giving hackers
the potential exploit information, When they are trying to break into the cloud
services. Hence, In this context of System/Software as a service(SaaS) or
Platform as a Service(PaaS)And the Services which are provided lies under
Cloud Services Security that the host level should be non-transparent with the
customer and their responsibility of securing the host is confined to the cloud
service providers.
Both the SaaS and PaaS delivery models software platforms should abstract the
host operating system from the end user with a host abstraction layer.
Accessibility of the abstraction layer is different in each delivery models.
In SaaS, The abstraction Layer is hidden from all the users except developers
and cloud Service provider execution/Operational Staff it is only available or
provided to these only. Whereas in PaaS, users have indirect access to the
abstraction layer in the form of PaaS API (Application programming interface)
that eventually interacts with the host abstraction layer.
❖ Infrastructure as a Service(IaaS) Host Security
2. Hypervisor Security:
- Isolation: Ensuring that virtual machines (VMs) are isolated from each other
so that vulnerabilities or breaches in one VM do not affect others. This isolation
is critical to maintaining the integrity of each VM and its data.
- Patch Management: Regularly updating and patching hypervisors to
protect against vulnerabilities and exploits and for Security. Timely patching is
essential to mitigate potential security risks associated with hypervisor
vulnerabilities.
4. Network Security:
- Firewalls and Security Groups: Using virtual firewalls, security groups,
and network segmentation to control traffic between VMs and external
networks. This includes configuring rules to allow or block specific types of
traffic.
5. Data Security:
- Encryption: Encrypting data at rest (in database) and in transit(end-to-end)
to protect against unauthorized access and data breaches. Encryption ensures
that sensitive data remains confidential.
-Backup and Recovery: Implementing backup and disaster recovery
solutions to ensure data integrity and availability in case of failure or attack.
2. Operational Security:
- Security Information and Event Management (SIEM): Using SIEM tools
to collect, analyze, and respond to security events and incidents.
- Incident Response Plan: Develop a well-defined incident response plan to
handle data breaches .This plan must include roles, responsibilities,
communication procedure & strategies for recovering. Developing and
implementing incident response plans to address security breaches or other
incidents.
4. Microsoft Azure
Books
A. Cloud Security and Compliance: A Practical Guide by Ben potter and
Scott Ward
B. Mastering Cloud Computing: Foundations and Applications of Cloud
Computing by Rajkumar Buyya, Christian Vecchiola, and S. Thamarai
Selvi
Websites
I. Geeks of Geeks