Cloud Security Concepts

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:00
>> Hello. Welcome to Module 1.4, Cloud Security Concepts.
00:00
Now we really need to visit
00:00
the fundamental concepts regarding Cloud security.
00:00
In this module, we're going to learn to identify
00:00
the three principles in
00:00
the CIA triad and explain their roles
00:00
>> in Cloud security.
00:00
>> Ultimately, security is about managing risk.
00:00
There are a number of principles that
00:00
Cloud security professionals use
00:00
to identify those risks to the Cloud,
00:00
and identify means of really mitigating those risks,
00:00
or really responding to them in various ways.
00:00
We're going to really describe
00:00
the security process that
00:00
enforce these principles in the Cloud.
00:00
Also, I really want to always want to stress
00:00
the importance of availability in the Cloud,
00:00
which we'll learn more about in a moment.
00:00
There are three main security principles.
00:00
They call them in information security, the CIA triad,
00:00
and they are confidentiality, integrity and availability.
00:00
Confidentiality is really ensuring that
00:00
only those people who need access to the Cloud,
00:00
the information, the servers have access to it.
00:00
No one who is unauthorized has
00:00
access to any of the information
00:00
that they're not supposed to.
00:00
Everyone has the right information for their roles.
00:00
That's really the crux of confidentiality.
00:00
Integrity. Integrity is ensuring that
00:00
no modifications can be made to data, or applications,
00:00
or utilization of Cloud services
00:00
without proper monitoring,
00:00
recording exactly how or who and when it occurs.
00:00
That is integrity.
00:00
Availability,
00:00
that is the ability to access
00:00
your Cloud instance.
00:00
>> We've stressed that one of
00:00
>> the key characters to the Cloud or that enabled it,
00:00
was the use of broadband access,
00:00
the ability to access
00:00
someone else's physical infrastructure over the Cloud.
00:00
Availability is the need to
00:00
always be able to access that
00:00
when you need the Cloud services,
00:00
they're always there. That's availability.
00:00
Let's talk about some of the processes that we'll be
00:00
using to enforce these principles in the Cloud.
00:00
Data security, to ensure that
00:00
only people who need
00:00
to access your data have access to it,
00:00
you need to define what the data is.
00:00
How much security does it need?
00:00
How valuable is this data?
00:00
The risks associated with protecting the data
00:00
really dictate what countermeasures you
00:00
employ in the Cloud to keep that data safe.
00:00
Virtualization,
00:00
although there are certain physical servers
00:00
that are utilized in the Cloud,
00:00
there are also virtual servers.
00:00
Now, Cloud computing utilizes virtual servers and
00:00
virtualization in general in order
00:00
to augment the capabilities of organizations.
00:00
However, virtualizing and
00:00
virtual servers themselves have a number of
00:00
security aspects
00:00
and configurations that need to be taken into
00:00
consideration to successfully run them in the Cloud.
00:00
Encryption, this is
00:00
something you may have seen or be familiar with.
00:00
Encryption is the process of applying
00:00
algorithms to information to render
00:00
them unable to be deciphered or read by
00:00
unauthorized parties who don't have
00:00
the proper decryption key to
00:00
render them back to plain texts.
00:00
Encryption, this is
00:00
a critical technology that is used within
00:00
the Cloud to ensure that data is really confidential.
00:00
Then also encryption plays a role in integrity,
00:00
ensuring that the hashes on files remain
00:00
the same or any amount of doctoring or changes
00:00
are caught.
00:00
Speaking of catching people, auditing and compliance,
00:00
this is a big part of the Cloud and
00:00
often something that isn't
00:00
necessarily considered sometimes.
00:00
You need to ensure that everything that happens in
00:00
the Cloud meets the legal guidelines
00:00
that are applicable to your Cloud,
00:00
the data that you're utilizing,
00:00
and the customers that you have.
00:00
Being able to look back through
00:00
and audit a process to ensure that you
00:00
can attribute the actions
00:00
that anyone has taken along the way
00:00
is a really important part of being able to
00:00
maintain a secure Cloud environment.
00:00
What aspect of the CIA triad is
00:00
most important in the Cloud contexts?
00:00
Availability, confidentiality, or integrity.
00:00
The answer is availability.
00:00
You're using, "Wait a second,
00:00
that's the CIA triad.
00:00
Why exactly is availability so much more important?"
00:00
In the context of the Cloud without availability,
00:00
there is nothing else.
00:00
If you can't access the Cloud environment,
00:00
if you really are out of business, you're out of luck.
00:00
Ensuring that you have proper availability is one of
00:00
the more essential Cloud security risks
00:00
to address as we go forward.
00:00
In this module, we cover
00:00
the three principles of the CIA triad,
00:00
confidentiality, integrity, and availability,
00:00
and also talked about the common processes that are
00:00
often used to ensure security in the Cloud,
00:00
such as encryption, virtualization,
00:00
data labeling,
00:00
and make sure you can audit and comply with
00:00
the security standards that are
00:00
applicable to your business and organization.
00:00
See you in the next module.
Up Next
What are the Cloud Service Models?
Infrastructure as Service as a Service (IaaS)
Infrastructure as Service as a Service (IaaS) Risks
Platform as a Service (PaaS)
Platform as a Service (PaaS) Risks