Security in Cloud Computing Zac douglass Chris kahn
Mission Statement To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud
Background Cloud computing is separated into three service models: Infrastructure as a Service Platform as a Service Software as a Service And four deployment models: Public cloud Private cloud Community cloud Hybrid cloud
Significance Cloud computing is becoming a major aspect in the IT environment Many businesses, organizations, and agencies all implement the cloud Becoming more popular for hackers/organized crime While in its infancy, now is the perfect time to shape the cloud around a secure environment Major losses can happen Must take preventative action!
Monitoring The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine Usually controlled by the Host (Privileged Control) Wide range of effect Threat based on trust
DDOS Very serious security risk Cloud Systems must be available 24/7 Would delimit a Cloud System's main function One interrupted Virtual Machine can wreak havoc
Solutions Focus on Virtual Machines because they are the backbone For a DDOS you can restart the malicious Virtual machine Allows reallocation of resources Firewalls are crucial Allows disabling all non-essential connections Needs highly specific IP tables for maximum security
Conclusion Cloud computing is the future of the IT world Security of the cloud is VERY important Infrastructures rely on the cloud to: Conduct efficient business practices Minimize cost associated with resources Rid IT systems of duplicate software/hardware Security risks compromise these aspects