0% found this document useful (0 votes)
13 views25 pages

Cloud Security Strategies & Stats

These include the specifics of the security of the cyber-physical system.

Uploaded by

Vartika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views25 pages

Cloud Security Strategies & Stats

These include the specifics of the security of the cyber-physical system.

Uploaded by

Vartika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Cloud Security

S.Venkatesan
Acknowledgement: The contents, example scripts and some figures are copied from various sources.
Thanks to all authors and sources made those contents public and usable for educational purpose

2
NIST reference architecture
Security Requirements
Cloud-based control approach
Statistics
• 92% Enterprises Have a Multi-Cloud Strategy in Place

• 98% of Organizations Experienced a Cloud Security Breach


in Past 18 Months

• 72% of IT Security Leaders Rank Cloud as Top Digital


Transformation Priority

• ~90% of Data Breaches Target Servers

• 96% of Web App Attack-Based Mail Server Compromises


Involve the Cloud
TPM
Google Cloud Security
• Communications over the internet to Google public cloud
services are encrypted in transit.

• To protect DoS Google Cloud Armor

• Identities, users, and services are strongly authenticated.


Access to sensitive data is protected by advanced tools like
phishing-resistant security keys (Titan Security Key).

• Data stored on Google infrastructure is automatically


encrypted at rest and distributed for availability and
reliability.
Layers of encryption
Data at Google is broken up into encrypted
chunks for storage& Key Hierarchy
Protecting Data at Rest on Amazon S3 Glacier

• Data at rest stored in Amazon S3 Glacier is


automatically server-side encrypted using 256-bit
Advanced Encryption Standard (AES-256) with
keys maintained by AWS.

• The encryption key is then encrypted itself using


AES-256 with a master key that is stored in a
secure location.

• The master key is rotated on a regular basis.


Protecting Data at Rest on Amazon RDS

• INSERT INTO Customers (CustomerFirstName,CustomerLastName) VALUES


(AES_ENCRYPT('John',@key), AES_ENCRYPT('Smith',@key);
Harden the VMs – Google Cloud
• Integrity of the VMs will be checked.

• Secure Boot

• Virtual Trust Platform Module (TPM) - Platform


integrity, Disk encryption, Password protection.

• Google Titan Chip (similar to TPM) - securely identify


and authenticate legitimate access at the hardware
level, minimizing the chances of running altered
software.
Harden Your VMs with Shielded Computing

Cloud Next '19


Integrity of the Data
• One of the problems associated with
outsourcing data to cloud service providers is
the data integrity of outsourced data.

• Data integrity encompasses the


– Completeness
– Correctness and
– Freshness
Merkle Tree

Feifei Li, Marios Hadjileftheriou, George Kollios, and Leonid Reyzin, Authenticated Index Structures for Outsourced
Databases Handbooks on Database Security
An Example
Merkle Tree
Radix Path Identifier
Merkle Hash Tree with Radix Path Identifiers
Properties
Single Authentication Table
Level Based Authentication Table
Multi-Join Query
References
• Erik Kajati, Peter Papcun, Chao Liu, Ray Y. Zhong,
Jiri Koziorek, Iveta Zolotova, Cloud based cyber-
physical systems: Network evaluation study,
Advanced Engineering Informatics, Volume 42,
2019.

• https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nists
pecialpublication500-292.pdf

• https://www.apriorit.com/dev-blog/545-
sandbox-evading-malware

You might also like