-
Notifications
You must be signed in to change notification settings - Fork 0
/
cloud
116 lines (68 loc) · 1.74 KB
/
cloud
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
cloud computing:::
characterstices of cloud computing
on demand self service
broad n/w access
resouce pooling
rapid elasticity
measured service
understanding IAAS,PAAS and SAAS(infrastructure,platform and s/w as a service)
cloud deployment model:::
private cloud
public cloud
community cloud
hybrid cloud(spread footprint public and private)
cloud computer arch::::
cloud consumer
cloud auditor
cloud provider
cloud broker
cloud carrier
promise of cloud:::
low barrier to entry
elasticity
cost reduction
flexiblity
security
is the cloud secure:::?
organization security consideration:::
data sovereingty::::
server monkey
shadow IT::
what cloud res in org
who is creating them
who is using them
do they adhere with compliance and security policies
what business problem do they solve
can u address underlying problem
cloud computing risks::
creaditial reuse
session hijecking
exposed keys
social engineering
engress and agress data
hypervisor -breakouts:::::::
peace of s/w ,hardware,and firmware it create and runs virtual machine
resource pooling
physical infrastrure-->virtualize layer-->logic infra.-->operating system--->application
arstechnica.com(website)
malcious cloud uses::
DDOS
password cracking
botnet command and controler
captch solving
resources.infosecinstituel.com(website)
Row hammer
motherboard.vice.com(website)
cloud computer security strength::
cloudflare.com(website)
server adminsitrator as a service:::
Azura active directory
Vnet on demand:::
hardware security modules
securing the adminstrator portal::::
hardning the configuration:::
securing the transport layer::::
vpn create encrytped tunnel..
sql injection alerts in azura:::::::::
security as a service::::
barracude firewall(hardware tools)