Friday, September 20, 2019

Cyber Security Breaking Down Cloud Security

Breaking Down Cloud Security
Cloud security can be analysed by each segments.

Overview of Cloud Computing:
We are going to see below
  • Security Implication
  • Five Essential Characteristics Of Cloud
  • Four Deployment Models
  • Cloud service Models
  • NIST Guidelines On Cloud Security

Security Implications:
  • Data confidentiality and privacy are important for cloud network.
  • Classification and marking data based on Cloud.
  • Cloud network guarantees available resources.

Five Essential Characteristics Of Cloud:
  • On demand self service
  • Broad network access
  • Resource pooling
  • Rapid elasticity
  • Measured services

Four Deployment models:

Public Cloud Network:
Public cloud network is used by general public over the Internet system exists with cloud providers

Private Cloud Network:
Private cloud used by single organisation systems and infrastructure will be on premises or with third party control.

Hybrid Cloud Network:
Hybrid cloud network services uses two or more distinct cloud infrastructure by the combination of public and private cloud.

Community Cloud:
Community cloud is a collection of organisations that share an affiliation operated by organisations or third party.

Cloud Services Model:

IAAS:Infrastructure as a service 

IAAS is a service provider will give infrastructure as a service.
Servers/Network/Storage devices.

PAAS:Platform as a service

PAAS is a service provider will give platform as a service. Support O/S - middleware/dev tools/hypervisors.

SAAS:Software as a service 

SAAS is a service provide will give software as a service. Salesforce.com/VDI/VX11/Google Docs/Drive/HCS.

NIST: National Institute Of Standards And Technology:
  • NIST is a cloud computing Public security work group, which will used standard for security.
  • NIST SP 500-292,NIST SP 500-293, NIST SP 500-299 for vol 1,2,3.NIST cloud computing reference architecture.
  • NIST SP 800-144,NIST SP 800-145,NIST SP 800-146  are the guidelines for security in cloud environments. 

Hills Station view :



Blog for securing you from modern threats from hackers:

No comments:

Post a Comment