Section 15.134 Cloud Security Flashcards
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
Cloud security threats 1
Shared Physical Server Vulnerabilities
In cloud environments, multiple users share the same physical server
● Compromised data from one user can potentially impact others on the
same server
Shared Physical Server Risk Mitigation
● Implement strong isolation mechanisms (e.g hypervisor protection, secure multi-tenancy)
● Perform regular vulnerability scanning, and patch security gaps
Cloud security threats 2
Inadequate Virtual Environment Security
Virtualisation is essential in cloud computing
● Inadequate security in the virtual environment can lead to unauthorized access and data breaches
Inadequate Virtual Environment Security Mitigation
● Use secure VM templates
● Regularly update and patch VMs
● Monitor for unusual activities
● Employ network segmentation to isolate VMs
VM = Virtual Machine
Cloud security threats 3
User Access Management
Weak user access management can result in unauthorized access to sensitive data and systems
User Access Management Mitigation
● Enforce strong password policies
● Implement multi-factor authentication
● Limit user permissions (Principle of Least Privilege)
● Monitor user activities for suspicious behavior
Cloud security threats 4
Lack of Up-to-date Security Measures
Cloud environments are dynamic and require up-to-date security measures
● Failure to update can leave systems vulnerable to new threats
Lack of Up-to-date Security Measures Mitigation
● Regularly update and patch software and systems
● Review and update security policies
● Stay informed about the latest threats and best practices
Cloud security threats 5
Single Point of Failure
Cloud services relying on specific resources or processes can lead to system-wide outages if they fail
Single Point of Failure Mitigation
● Implement redundancy and failover procedures
● Use multiple servers, data centers, or cloud providers
● Regularly test failover procedures
Cloud security threats 6
Weak Authentication and Encryption Practices
Weak authentication and encryption can expose cloud systems and data
Weak Authentication and Encryption Practices Mitigation
● Use multi-factor authentication
● Strong encryption algorithms
● Secure key management practices
Cloud security threats 7
Unclear Policies
Unclear security policies can lead to confusion and inconsistencies in
implementing security measures
Unclear Policies Mitigiation
● Develop clear, comprehensive security policies covering data handling, access control, incident response, and more
● Regularly review and update policies and provide effective communication and training
Cloud security threats 8
Data Remnants
Residual data left behind after deletion or erasure processes
● In a cloud environment, data may not be completely removed, posing a
security risk