Security in Cloud Computing (Salmon Joy)
Security in Cloud Computing (Salmon Joy)
Security
in Cloud
Computin
g Salmon Joy
Technology Expert and
Educator
Cloud: What You Need to
KnowUNDERSTAND HOW THE CLOUD WORKS
Customer
Responsible for securing the operating
systems, applications, data, and
configurations of the virtual machines they
deploy.
Platform as a
Service (PaaS)
Cloud Service Provider
Responsible for the underlying
infrastructure and the platform services,
including runtime environments and
managed databases.
Customer
Responsible for the security of their
applications, data, and any configurations
they make within the platform.
Software as a
Service (SaaS)
Cloud Service Provider
Responsible for the entire stack, including
the infrastructure, platform, and the software
application itself.
Customer
Responsible for the security of their data
within the application, user access controls,
and any settings they can configure.
Key Management
Services
Effective key management is critical to maintaining the security
AWS Key Management of encrypted
Azure Keydata. Google Cloud Key
Service Vault Management Service
Breach Impact
Breach Impact
Kubernetes
Hackers gained access to Tesla's Kubernetes console,
which was not password-protected.
Once inside, they deployed mining scripts to utilize
Console
Tesla’s cloud resources for cryptocurrency mining.
Hack (2018)
Impact
Increased operational costs due to unauthorized
resource usage.
Potential exposure of proprietary data and disruption
of operations.
Data
them to access Uber’s data stored on AWS S3 buckets.
Sensitive information, including personal data of riders
and drivers, was compromised.
Breach Impact
Extortion Impact