Lesson 15 Flashcards
Cloud Deployment Models
Public (multi-tenant)
•Cloud service providers (CSPs)
•Shared between subscribers
•Multi-cloud
Hosted private
•Private instance operated by a CSP but dedicated to a single customer
Private
•Wholly owned and operated by the organization
•On-premises vs. off-premises
Community
Hybrid
On premise vs off-premises
(referring to Private)
This type of cloud could be on-premise or offsite relative to the other business
units. An onsite link can obviously deliver better performance and is less likely to
be subject to outages (loss of an Internet link, for instance). On the other hand, a
dedicated offsite facility may provide better shared access for multiple users in
different locations.
Public cloud
Public (multi-tenant)
•Cloud service providers (CSPs)
•Shared between subscribers
•Multi-cloud
Multi-cloud architectur
Multi-cloud architectures are where an organization
uses services from multiple CSPs.
Hosted private
Hosted private
•Private instance operated by a CSP but dedicated to a single customer
Hosted Private—hosted by a third-party for the exclusive use of the organization.
This is more secure and can guarantee a better level of performance but is
correspondingly more expensive.
Private
- Wholly owned and operated by the organization
- On-premises vs. off-premises
banking or government
Community
this is where several organizations share the costs of either a hosted
private or fully private cloud. This is usually done in order to pool resources for a
common concern, like standardization and security policies.
hybrid
There will also be cloud computing solutions that implement some sort of hybrid
public/private/community/hosted/onsite/offsite solution. For example, a travel
organization may run a sales website for most of the year using a private cloud
but break out the solution to a public cloud at times when much higher utilization
is forecast.
Cloud Service Models
Anything as a service (XaaS)
Infrastructure as a Service (IaaS)
•Unconfigured compute, storage, and network resources
- provisioning IT resources such as
servers, load balancers, and storage area network (SAN) components quickly. Rather
than purchase these components and the Internet links they require, you rent
Software as a Service (SaaS)
•Fully developed applications
Platform as a Service (PaaS)
•Pre-configured OS and database/middleware instances
-A typical PaaS solution would provide servers and storage network infrastructure
(as per IaaS) but also provide a multi-tier web application/database platform on top.
InfInfrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
•Unconfigured compute, storage, and network resources
- provisioning IT resources such as
servers, load balancers, and storage area network (SAN) components quickly. Rather
than purchase these components and the Internet links they require, you rent
Software as a Service (SaaS)
Software as a Service (SaaS)
•Fully developed applications
Platform as a Service (PaaS)
•Pre-configured OS and database/middleware instances
-A typical PaaS solution would provide servers and storage network infrastructure
(as per IaaS) but also provide a multi-tier web application/database platform on top.
Security
in the cloud
is the things you must take responsibility for
Security of the cloud
is the
things the CSP manages.
Cloud responsiblity matix
securityh in the cloud and security of the cloud is determined by the type. refer to table in the guide (or slides)
Security as a service
Consultants
•Third-party expertise and perspective
Managed Security Services Provider (MSSP)
•Turnkey security solutions (expensice and requires a lot of trust in the MSSP
Security as a Service (SECaaS)
•Cloud-deployed security assessment and analysis
•Cyber threat intelligence and machine learning analytics
Virtualization
means that multiple operating systems can be installed and run
simultaneously on a single computer
Virtual Platform
requires at least three
components:
• Host hardware—the platform that will host the virtual environment. Optionally,
there may be multiple hosts networked together.
• Hypervisor/Virtual Machine Monitor (VMM)—manages the virtual machine
environment and facilitates interaction with the computer hardware and network.
• Guest operating systems, Virtual Machines (VM), or instances—operating systems
installed under the virtual environment.
Host hardware
• Host hardware—the platform that will host the virtual environment. Optionally,
there may be multiple hosts networked together.
• Hypervisor/Virtual Machine Monitor (VMM)
• Hypervisor/Virtual Machine Monitor (VMM)—manages the virtual machine
environment and facilitates interaction with the computer hardware and network.
Guest operating systems, Virtual Machines (VM
• Guest operating systems, Virtual Machines (VM), or instances—operating systems
installed under the virtual environment.
Type II hypervisors (host-based)
In a guest OS (or
host-based) system, the hypervisor application (known as a Type II hypervisor) is itself
installed onto a host operating system.
Examples of host-based hypervisors include
VMware Workstation, Oracle Virtual Box, and Parallels Workstation. The hypervisor
software must support the host OS.
Type I hypervisors (bare metal)
A bare metal virtual platform means that the hypervisor (Type I hypervisor) is installed
directly onto the computer and manages access to the host hardware without going
through a host OS. Examples include VMware ESXi Server, Microsoft’s Hyper-V, and
Citrix’s XEN Server. The hardware needs only support the base system requirements
for the hypervisor plus resources for the type and number of guest OSes that will
be installed.
Type
Virtual Desktop Infrastructure and Thin Clients
- Virtual Desktop Infrastructure (VDI)
- Storing images of clients (OS + applications) on a central server
- Virtual Desktop Environment (VDE) images are loaded by thin clients
- Allows for low-power client devices
- Centralizes control over client desktops
- Allows for almost completely hosted IT infrastructure
Virtual desktop infrastructure (VDI)
refers to using a VM as a means of provisioning
corporate desktops. In a typical VDI, desktop computers are replaced by low-spec,
low-power thin client computers. When the thin client starts, it boots a minimal OS,
allowing the user to log on to a VM stored on the company server infrastructure.
The user makes a connection to the VM using some sort of remote desktop protocol(Microsoft Remote Desktop or Citrix ICA, for instance). The thin client has to find the correct image and use an appropriate authentication mechanism. There may be a 1:1
mapping based on machine name or IP address or the process of finding an image may
be handled by a connection broker.
virtual desktop environment
VDE
All application processing and data storage in the virtual desktop environment
(VDE) or workspace is performed by the server.
Application Virtualization
Application virtualization is a more limited type of VDI. Rather than run the whole
client desktop as a virtual platform, the client either accesses an application hosted on
a server or streams the application from the server to the client for local processing.
- Hosting or streaming individual software applications on a server
- XenApp, App-V, ThinApp
Container virtualization (application cells)
- Resource separation at the OS level
- Cannot run different OS VMs
- Docker (uses docker engine instead of hypervisor)
Container vs VMs
VM use hypervisor
Container Application cell/container virtualization dispenses with the idea of a hypervisor and
instead enforces resource separation at the operating system level.
- uses docker engine
VM escaping
VM escaping refers to malware running on a guest OS jumping to another guest
or to the host. (Can be really bad)
VM escape Protection
- Reduce impact of successful exploits
- Ensure careful placement of VM services on hosts/within network
- Respect security zones (DMZ)
•
Guest OS security
•
OS environment must still be maintained, patched, etc.
VM sprawl
when guest machines are not tracked, not used, etc. Introduces security problems because the systems aren’t maintained or secured.
Virtual machine life cycle management (VMLM)
Virtual machine life cycle management (VMLM) software can be deployed to enforce
VM sprawl avoidance. VMLM solutions provide you with a centralized dashboard for
maintaining and monitoring all the virtual environments in your organization
template-based VM creation
VMs should conform to an applicationspecific
template with the minimum configuration needed to run that application
(that is, not running unnecessary services).
Obtaining and integrating cloud security data
Cloud-based services must be integrated within regular security policies and
procedures and audited for compliance.
Where indicators of on-premises attacks are
found in local application logs and network traffic, indicators of cloud-based attacks are
found in API logs and metrics.
Cloud security Responsibility matrix and SLAs
- Security of the cloud
- Security in the cloud
As with any contracted service, cloud computing is a means of transferring risk. As such,
it is imperative to identify precisely which risks you are transferring, to identify which
responsibilities the service provider is undertaking, and to identify which responsibilities
remain with you. This should be set out in a service level agreement (SLA) with a
responsibility matrix.
Cloud security reporting
Where critical tasks are the responsibility of the service provider, you should try
to ensure that there is a reporting mechanism to show that these tasks are being
completed, that their disaster recovery plans are effective, and so on.
Cloud security legal and compliance responsibilities
Another proviso is that your company is likely to still be directly liable for serious
security breaches; if customer data is stolen, for instance, or if your hosted website
is hacked and used to distribute malware. You still have liability for legal and
regulatory requirements. You might be able to sue the service provider for damages,
but your company would still be the point of investigation. You may also need to
consider the legal implications of using a cloud provider if its servers are located in a
different country.
Cloud security insider threat
You must also consider the risk of insider threat, where the insiders are administrators
working for the service provider. Without effective security mechanisms such as
separation of duties and M of N control, it is highly likely that they would be able to
gain privileged access to your data. Consequently, the service provider must be able
to demonstrate to your satisfaction that they are prevented from doing so.