<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud Security - Techyaz.com</title>
	<atom:link href="https://techyaz.com/category/cloud/cloud-security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Tips, Tutorials and How-to Topics</description>
	<lastBuildDate>Wed, 28 Jul 2021 11:17:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://techyaz.com/wp-content/uploads/2017/11/cropped-Site-icon-150x150.png</url>
	<title>Cloud Security - Techyaz.com</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cloud Secrets Management Tool &#8211; HashiCorp Vault</title>
		<link>https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/</link>
					<comments>https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/#respond</comments>
		
		<dc:creator><![CDATA[Kiran Mehta]]></dc:creator>
		<pubDate>Wed, 28 Jul 2021 11:17:05 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2718</guid>

					<description><![CDATA[<p>Today, we will talk about cloud secrets management tool Hashicorp vault in this article. As we know, cloud services providers have presented numerous inherent features and tools to protect the cloud environment. We have seen cloud tools for monitoring, audit,&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/">Cloud Secrets Management Tool &#8211; HashiCorp Vault</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today, we will talk about cloud secrets management tool Hashicorp vault in this article. As we know, cloud services providers have presented numerous inherent features and tools to protect the cloud environment. We have seen cloud tools for monitoring, audit, access, authentication, encryption etc. in AWS, Azure and GCP any top Cloud Service providers. These features and tools can provide basic line of defense that can protect the cloud infrastructure against some of the security threats. However, there’s also the vision of organizations to have specific protection layer for privilege information and sensitive data. This year we have seen unexpected surge in cyberattacks across all industries. Hence across industry we have noticed a more focused approach to maintain Privilege Access solution in order to protect their environment.</p>
<p>Privilege /Secrets maintenance is most crucial requirement in Identity and Access management services. The secrets/passwords are everywhere however in cloud environment these number are 4x times as compares to on premise solution with static secrets. The Secrets could be any form of digital credentials and sensitive information which could lead to breach!</p>
<h2>What are Secrets?</h2>
<p>A secret can be any sensitive information for e.g.</p>
<ul>
<li>User password</li>
<li>Application and Database and other system-to-system passwords.</li>
<li>auto-generated passwords /encryption keys</li>
<li>Private encryption keys</li>
<li>API Key and other application keys/credentials inside containers</li>
<li>SSH Keys</li>
<li>authorization tokens</li>
<li>Private certificates for secure communication, transmitting and receiving of data (TLS, SSL etc.)</li>
<li>One-time password devices</li>
</ul>
<h2>Why we need to manage Secrets?</h2>
<p>The Secret management is imperative in today scenarios as this has been most affected sector and primary target for any Hackers. The emerging threat in digital environment and highly equipped hackers with self-learning abilities to classify, assess and exploit any vulnerability in the environment</p>
<p>Whether we are using secrets in different cloud services or within a particular cloud-based application, unorganized secrets management procedures can bring serious threat to entire security of platform for example: &#8211;</p>
<ul>
<li>Hard-coded and default credentials</li>
<li>Managing passwords manually</li>
<li>Sharing passwords</li>
<li>Regular rotations</li>
<li>Weak password and storing it in plain text files</li>
<li>Hardcoded and embedded live scripts</li>
</ul>
<h2>Secrets Management Tools</h2>
<p>In Cloud security it is imperative that primary focus should be on access control and circulation of dynamic secrets. There are various tools features provided by Cloud service provider and third-party vendors in Market for secret keys management however the most flexible and easy tool trending these days in the cloud industry is <strong>Hashicorp Vault</strong>. It comes with two products to provide cloud security services the Vault and boundary</p>
<p><img fetchpriority="high" decoding="async" width="734" height="543" class="wp-image-2719" src="http://techyaz.com/wp-content/uploads/2021/07/word-image.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image.png 734w, https://techyaz.com/wp-content/uploads/2021/07/word-image-300x222.png 300w" sizes="(max-width: 734px) 100vw, 734px" /></p>
<p>Hashicorp is a software company with a <strong>Freemium Business Model.</strong> They provide various products to fully managed platform to automate infrastructure on any cloud.</p>
<p>The Hashicorp is based on open-source tools and marketable harvests that enable developers, operators, and security experts to secure, run, provision, and connect cloud-computing they basically provide infrastructure as code which is very flexible and mature. The products prevalent for cloud security are secrets management tool Hashicorp Vault and Boundary.</p>
<h2>What is HashiCorp Vault?</h2>
<p>HashiCorp Vault is a is a secrets management tool for securely accessing <em>secrets</em>. It is used to accomplish secrets keys management in distributed systems across cloud platforms. Vault empowers cloud security players to control access to tokens, passwords, encryption keys, and certificates to defend any potentially sensitive data. The contemporary “zero trust” model is used to harden inside the HashiCorp vault. The Vault can be easily integrated with applications to be explicitly authenticated, authorized to fetch secrets, rotating secrets and perform sensitive operations, along with catering audit requirements.</p>
<p>HashiCorp <a href="https://www.hashicorp.com/cloud-operating-model">Vault</a> solution is widely used across many industries including large financial organizations, hospitality, and everything in between to provide security in the cloud operating model.</p>
<p><img decoding="async" width="378" height="384" class="wp-image-2720" src="http://techyaz.com/wp-content/uploads/2021/07/word-image-1.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image-1.png 378w, https://techyaz.com/wp-content/uploads/2021/07/word-image-1-295x300.png 295w, https://techyaz.com/wp-content/uploads/2021/07/word-image-1-80x80.png 80w" sizes="(max-width: 378px) 100vw, 378px" /></p>
<p><strong>Secrets Management tool HashiCorp Vault</strong> allows steady control access to encryption keys, passwords, certificates etc. for shielding technologies and applications. This delivers an extensive secrets management solution for enterprises looking for securing cloud environment</p>
<p><strong>1</strong>&#8211; Vault helps protect data at rest and data in transit.</p>
<p><strong>2</strong>&#8211; Vault exposes a high-level API for cryptography for developers to secure sensitive data without revealing encryption keys.</p>
<p><strong>3-</strong> Vault also can act like a certificate authority, to provide dynamic short-lived certificates to secure communications with SSL/TLS.</p>
<p><strong>4- </strong>Vault enables a brokering of identity between different platforms, such as AD on premises and AWS IAM to permit applications to work across platform borders. Vaults provide: &#8211;</p>
<ul>
<li>Storage Backends for Encrypted</li>
<li>Isolated Namespaces</li>
<li>Secure plugins</li>
<li>Detailed Historical Audit logs</li>
<li>Tenancy, rotating and revoking of secrets</li>
</ul>
<ol>
<li>Vault provides a master key and generates encryption keys to protect data. The master key is split into five parts. Any three of the five parts are required to reconstruct the master key.</li>
</ol>
<h2>HashiCorp Vault Architecture</h2>
<p>The below <a href="https://www.vaultproject.io/docs/internals/architecture">architectural diagram</a> of secrets management tool HashiCorp vault can explain the workflow of the vault process and services.</p>
<ul>
<li>Storage Backend</li>
<li>Barrier</li>
<li>Secrets Engine</li>
<li>Audit Device</li>
<li>Auth Method</li>
<li>Client Token</li>
<li>Token Store</li>
<li>Root Tokens</li>
<li>Rollback Manager</li>
<li>Core</li>
<li>Audit Broker</li>
<li>Expiration Manager</li>
</ul>
<p><img decoding="async" width="917" height="527" class="wp-image-2721" src="http://techyaz.com/wp-content/uploads/2021/07/word-image-2.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image-2.png 917w, https://techyaz.com/wp-content/uploads/2021/07/word-image-2-300x172.png 300w, https://techyaz.com/wp-content/uploads/2021/07/word-image-2-768x441.png 768w" sizes="(max-width: 917px) 100vw, 917px" /></p>
<p><strong>Storage Backend</strong> &#8211; A storage backend is used for robust storage of encrypted<strong> </strong>data. The storage is placed at bottom of Architecture stack as it is non trusted components for the vault and chosen as per client requirement, the considered factors for the same are like High availability/Disaster recovery/Recovery time Objective. When the Vault is started the storage backend must be declared and configured well in advance.</p>
<p><strong>HTTP API &#8211;</strong> The HTTP API is used to interact with clients, and it is also non-trusted component for the vault hence placed outside the Barrier</p>
<p><strong>Barrier</strong> &#8211; The barrier is strong cryptographic components which creates an un-penetrable protection layer around the Vault. The barrier ensures data is validated and decrypted as it goes inside the Vault and all data gets encrypted as it goes out from the vault. The barrier by default stays in sealed state and must be unlocked before requesting any access operation to the vault.</p>
<p>The Unlocking of the vault is possible only using combination of Unseal Keys. When the vault is initialized it generate encryption keys. This key is in turn protected by Master key which gets divided into 5 parts and combination of any 3 keys of which are required to rebuild the master key. For protection purpose all data that flows between Vault and the storage backend passes through the barrier.</p>
<p><img loading="lazy" decoding="async" width="921" height="626" class="wp-image-2722" src="http://techyaz.com/wp-content/uploads/2021/07/word-image-3.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image-3.png 921w, https://techyaz.com/wp-content/uploads/2021/07/word-image-3-300x204.png 300w, https://techyaz.com/wp-content/uploads/2021/07/word-image-3-768x522.png 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></p>
<p><em>Image &#8211; <a href="https://www.vaultproject.io/docs/internals/architecture">Vault Architectures</a></em></p>
<p><strong>Secrets Engine</strong> – Secrets engines are components which store, generate, or encrypt data. Secret Engine is like virtual file system supporting operations like read, write, delete, generate dynamic credentials, encryptions etc. In Vault when a secrets engine is enabled, a random UUID is generated. This becomes the data root for that engine. As Secret engine writes to the physical storage layer, it is prefixed with that UUID folder as relative access is not supported by the vault hence the secrets engine cannot access other data.</p>
<p><strong>Audit Device</strong> – are leveraged to keep comprehensive record of logs for all requests and response inside the vault. As all the operations executed inside the vault are API request and response, thus audit log contains all authenticated communication with Vault, as well all generated errors.</p>
<p><strong>Auth Method</strong> – Authentication is used to validate access to vault. The auth method are responsible for conveying identity and a set of policies to a user. Vaults validate a user and returns a client token that can be used for future requests.</p>
<p><strong>Client Token /Vault token</strong>&#8211; Tokens are the method for authentication within Vault. Token can be generated leveraging authentication methods they can also be used dynamically to generate tokens based on external identities. Inside the Vault tokens record to information like Access control list policies. These policies control directs what access are allowed to the user inside the Vault these tokens also carried meta data which is used for Audit logs such as creation time, last renewal time etc.</p>
<p><strong>Token Store</strong> &#8211; Are token authentication backend that it is responsible for creating and storing tokens, the token store has no login capability and all actions require existing authenticated tokens.</p>
<p><strong>Root Tokens &#8211;</strong> are tokens that have the root policy committed to them.</p>
<p><strong>Rollback Manager</strong> &#8211; This is internal component of Vault to control partial failure cases by using write ahead logging.</p>
<p><strong>Core &#8211;</strong> The core is used to manage the flow of requests through the system, it enforces Access control Lists and ensure audit logging is done.</p>
<p><strong>Audit Broker</strong> – is leveraged to distribute the request out to all the configured audit devices.</p>
<p><strong>Expiration Manager &#8211;</strong> is used to automatically revokes the secret on Lease expire if allowed by the client</p>
<h2>HashiCorp Vaults Pricing</h2>
<p>Let&#8217;s discuss about Hashicorp vaults pricing. There are 3 options to use this tool from pricing stand point.</p>
<ol>
<li>Open Source</li>
<li>Cloud – Managed Vault</li>
<li>Enterprise Vault Premium editions.</li>
</ol>
<p><img loading="lazy" decoding="async" width="771" height="343" class="wp-image-2723" src="http://techyaz.com/wp-content/uploads/2021/07/word-image.jpeg" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image.jpeg 771w, https://techyaz.com/wp-content/uploads/2021/07/word-image-300x133.jpeg 300w, https://techyaz.com/wp-content/uploads/2021/07/word-image-768x342.jpeg 768w" sizes="auto, (max-width: 771px) 100vw, 771px" /></p>
<p>The Vault Open-source freeware version has limitation of ~50 users only and to leverage all features and functionality it is highly recommended to use Cloud or Enterprise version. You can visit attached link for all <a href="https://www.hashicorp.com/products/vault/pricing">Vault Pricing Options.</a></p>
<h2>Conclusion</h2>
<p>In this Article we have covered What are Secrets? Why we need Secrets Management? and Secrets Management tool offered by Hashicorp Vault. There are several other tools available for secrets management in the market as mentioned below. As per the client requirement and existing infrastructure we can propose appropriate tools to our clients as long it serves the purpose of underline security with future integration possibilities</p>
<ul>
<li><strong>Conjur Secrets Manager</strong> (Open Source) &#8211; CyberArk</li>
<li><strong>Dynamic Access Provider</strong> (DAP) Enterprise &#8211; CyberArk</li>
<li><strong>AWS Secrets Manager</strong> &#8211; Rotate, manage, and retrieve database credentials, API keys, and other secrets through their lifecycle</li>
<li><strong>Azure Key Vault &#8211; </strong>securely storing and accessing secrets</li>
<li><strong>Akeyless Vault </strong>for <a href="https://www.akeyless.io/">Secrets Management and Secure Remote Access</a></li>
<li><strong>Docker secrets management </strong></li>
</ul>
<p>The Security trend seen in last 5 years has shown paradigm shift towards <strong>Identify and Access management</strong> domain. IAM plays vital role in preventing Cyberattacks due to leak credentials and hence many organizations are moving towards taking proactive steps by adding more secrets tools and technology to protect their sensitive information. As these organization moves towards more flexible, scalable, secure and cloud agnostic environment.</p>
<p>The Hashicorp suits of products are outstanding in terms of ease of use, integration, and configurations. The can flawlessly assimilates with all offerings of major cloud vendors. The Hashicorp products carry solution to full scale infrastructure security management.</p>
<p>For the next topics we will cover about other HashiCorp product in security and its comparison to Other traditional Privilege Access Management tools in the market. Stay tuned for upcoming topics on <strong>Boundary</strong> and <strong>CyberArk PAM</strong> solution offerings.</p>
<p><span style="color: #0000ff;"><em><strong>Related Articles:</strong></em></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security &amp; Data Protection</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/" target="_blank" rel="noopener">Cloud Security – How to Secure Cloud Environment?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a></strong></li>
</ul>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/">Cloud Secrets Management Tool &#8211; HashiCorp Vault</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CCSK Certification Training Material</title>
		<link>https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/</link>
					<comments>https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Sat, 21 Sep 2019 10:16:18 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[CCSK]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2466</guid>

					<description><![CDATA[<p>CCSK stands for Certificate of Cloud Security Knowledge. The CCSK Certification is an individual certification that any person can take if they want to make their carrier in Cloud security. What is CCSK? The Cloud Security Alliance (CSA) has established&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/">CCSK Certification Training Material</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CCSK stands for Certificate of Cloud Security Knowledge. The CCSK Certification is an individual certification that any person can take if they want to make their carrier in Cloud security.</p>
<h3><strong>What is CCSK?</strong></h3>
<p>The Cloud Security Alliance (CSA) has established a web-based/online examination for cloud security skills for an individual’s competence in key cloud security controls, policies, compliance &amp; issues. The Certification was launched in 2010 by CSA (Cloud Security Alliance), the CCSK is a widely recognized expertise benchmark for Cloud Security Professionals. It is widely approved catalog of security best practices, the &#8220;Security Guidance for Critical Areas of Focus in Cloud Computing V4.0&#8221;.</p>
<p>CCSK eases a common understanding of cloud security concepts. This surges the risk analytics of risk decisions that are made in your organization.</p>
<h3><strong>What are the benefits of CCSK?</strong></h3>
<p>The CCSK is envisioned to provide understanding of security issues and best practices over a broad range of cloud computing domains. The CCSK certification will identify you as an induvial who have knowledge about security issues, policies and compliance of Cloud Environment in all platform and domains.</p>
<p>The CCSK is strongly recommended for IT auditors, and it is even required for portions of the CSA Security, Trust &amp; Assurance Registry (STAR) program.</p>
<p>The CCSK was recognized as the most valuable IT certification in terms of average salary by Certification Magazine.</p>
<h3><strong>How to Prepare for CCSK?</strong></h3>
<p>CCSK test will have 60 questions to be completed in 90 minutes with no pause. It’s an open book exam however that is a myth if you believe you can complete 80% of questions while searching in book. So better prepare for exam and don’t investigate materials on books while giving exam.</p>
<p>The Test participants will have 2 opportunity to appear for exam in case you cannot score 80% in first attempt, I would recommend you take online course/trainings with vast variety of sample questions which will help you to clear the certification in final attempt. Have a look at below courses that will help you with sample questions.</p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourse%2Funderstanding-ccsk-v4%2F">CCSK v4.0 &#8211; Certificate of Cloud Security Knowledge Tests</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3DCCSK%2520Cloud%2520Security%2520Certification%26src%3Dsac%26kw%3Dccsk">Udemy Courses on CCSK Certification (Certificate of Cloud Security Knowledge)</a></strong></li>
</ul>
<p>There are many formal Training course you can buy online before appearing for CSK certification which will make it easy for you to pass the examinations.</p>
<p>However, if you believe in self-learning all you need is to go read and deep understanding of 3 documents which are enough for clearing the exam of CCSK.</p>
<ul>
<li>6% of the questions are based on the <a href="https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment/">ENISA (European Union agency for cyber security)</a> report.</li>
<li>87% of the questions are based on the <a href="https://cloudsecurityalliance.org/download/security-guidance-v4/">CSA Guidance v4.</a></li>
<li>7% of questions are based on the <a href="https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v3-0-1/">CSA’s CCM 3.0.1 (Cloud Control Matrix)</a></li>
</ul>
<h3><strong>What all domain are covered under CCSK course?</strong></h3>
<p>I have given below list of topics that anybody can learn from the above attached links in order to take this certification. I will again emphasis all of you to go through the links attached for sample questions and tests in above section. You can find such sample papers here as well.</p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3DCCSK%2520Cloud%2520Security%2520Certification%26src%3Dsac%26kw%3Dccsk">Udemy Courses on CCSK Certification (Certificate of Cloud Security Knowledge)</a></strong></li>
</ul>
<p>Have a look at the topics from each documents.</p>
<h4><strong>CSA Topics</strong></h4>
<ul>
<li>Domain 1 Cloud Computing Concepts and Architectures</li>
<li>Domain 2: Governance and Enterprise Risk Management</li>
<li>Domain 3: Legal Issues, Contracts and Electronic Discovery</li>
<li>Domain 4: Compliance and Audit Management</li>
<li>Domain 5: Information Governance</li>
<li>Domain 6: Management Plane and Business Continuity</li>
<li>Domain 7: Infrastructure Security</li>
<li>Domain 8: Virtualization and Containers</li>
<li>Domain 9: Incident Response</li>
<li>Domain 10: Application Security</li>
<li>Domain 11: Data Security and Encryption</li>
<li>Domain 12: Identity, Entitlement, and Access Management</li>
<li>Domain 13: Security as a Service</li>
<li>Domain 14: Related Technologies</li>
</ul>
<h4><strong>ENISA Topics</strong></h4>
<ul>
<li>ENISA Cloud Computing: Benefits, Risks and Recommendations for</li>
<li>Information Security</li>
<li>Isolation failure</li>
<li>Economic Denial of Service</li>
<li>Licensing Risks</li>
<li>VM hopping</li>
<li>Five key legal issues common across all scenarios</li>
<li>Top security risks in ENISA research</li>
<li>OVF</li>
<li>Underlying vulnerability in Loss of Governance</li>
<li>User provisioning vulnerability</li>
<li>Risk concerns of a cloud provider being acquired</li>
<li>Security benefits of cloud</li>
</ul>
<h4><strong>Cloud Security Alliance &#8211; Cloud Controls Matrix</strong></h4>
<ul>
<li>CCM Domains</li>
<li>CCM Controls</li>
<li>Architectural Relevance</li>
<li>Delivery Model Applicability</li>
<li>Scope Applicability</li>
<li>Mapped Standards and <strong>Frameworks</strong></li>
</ul>
<p>Reference links: <a href="https://cloudsecurityalliance.org/">https://cloudsecurityalliance.org/</a></p>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/">Understanding Cloud Security &amp; Data Protection</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz" target="_blank" rel="noopener">Twitter </a>handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/">CCSK Certification Training Material</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud Security &#8211; How to Secure Cloud Environment?</title>
		<link>https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/</link>
					<comments>https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Mon, 24 Dec 2018 11:08:04 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2442</guid>

					<description><![CDATA[<p>Today, I am going to discuss about securing cloud environment. Cloud security is popular word in IT industries these days. Let&#8217;s start with basics and all possible ways to protect your cloud environment. Cloud Security Streams / Features Today we&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today, I am going to discuss about securing cloud environment. Cloud security is popular word in IT industries these days. Let&#8217;s start with basics and all possible ways to protect your cloud environment.</p>
<h3><span style="color: #333399;"><strong>Cloud Security Streams / Features</strong></span></h3>
<p>Today we will discuss about cloud security areas which we should consider in scope while designing a security solution for your cloud environment. In Cloud context, security comes as a shared responsibility between the Cloud Service provider (CSP)and its Tenants. All major CSP’s ensure to make available different features, tools and solution options which can be leverage by clients to have a secure cloud environment. The Cloud Security Streams are as follows</p>
<ol>
<li><strong>Physical Security – </strong>includes Cloud Data Center protection of hardware, software, networks also data centers are protected by security personnel and electronic devices such as cameras.</li>
<li><strong>Network security – </strong>Includes data security in transit to and from the public cloud provider. It means designing and building network configuration and its elements allowing a secure access to cloud resources from your on-premise Data centers, Office, Internet etc.</li>
<li><strong>System Security- </strong>This capability covers operating system hardening, protection and policy control. The host security at PaaS and SaaS Level are transferred to CSP.</li>
<li><strong>Application Security – </strong>It’s a shared responsibility in cloud context to protect the application running over the cloud. Based on type of cloud model application security is managed, for e.g in SaaS cloud provider will manage the security of the application. While at the PaaS level platform security will be managed by CSP and deployed application will be customer responsibility.</li>
<li><strong>Data security – </strong>Data security capability includes securing data in transit and at rest it to avoid data loss and exposure.</li>
<li><strong>Identity and Access management- </strong>This capability evolves around authentication, verification and authorization of cloud resources.</li>
<li><strong>Encryptions – </strong>as all communications between regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect sensitive data.</li>
<li><strong>Security operations- </strong>Governance and strategic direction on security policies, risk assessment and its maintenance</li>
</ol>
<h3><span style="color: #333399;"><strong>How to Secure your Cloud Environment?</strong></span></h3>
<p>Below are simple steps which can be followed to ensure the cloud infrastructure is secured. we must leverage best in market solution while designing a secure and cost-effective solution.</p>
<ol>
<li>Ensure to leverage data and Network security built-in features provided by the cloud Service provider partner solutions.</li>
<li>Design an Appropriate Data Backup solution along with Encryption enabled for covering data security.</li>
<li>Regular Audit / scan of Test of Application layer and get Quarterly/ yearly scan reports of Cloud infra from CSP.</li>
<li>Design Stable and Redundant Backup solution to cover Disaster Recovery and Business Continuity.</li>
<li>Design your environment to use layered security by allowing many data access accounts and permissions as possible.</li>
</ol>
<p><strong>Note:</strong> In cloud environment security comes with shared responsibility model. The Hypervisor layer and anything below it which includes hardware and applications &amp; physical security are protected by service provider. The operating system and above layer need to be taken care by the client /User. I would recommend leveraging CSP’s features with combination of Third party tools to ensure having secure environment for Business.  <strong> </strong></p>
<p>Today I will share the top best in class Cloud Service provider Microsoft Azure, AWS and Google cloud platform build in features which can be leveraged to design a secure cloud solution for your CSP.</p>
<h4><span style="color: #993300;"><strong>Microsoft Azure Security Built In Security Features</strong></span></h4>
<p>Microsoft is providing numerous tools and features to secure your cloud environment. These tools have their respective cost. Microsoft has also provided broker platform features like monitoring your cloud estate from single plane of glass.  Below is the list of security tools which can be leveraged to design a secure cloud environment:</p>
<ul>
<li>Operations Management Suite Security (OMS) and Audit Dashboard</li>
<li>Azure Resource Manager</li>
<li>Application Insights</li>
<li>Azure Monitor</li>
<li>Log Analytics</li>
<li>Azure Advisor</li>
<li>Azure Security Center</li>
<li>Role-Based Access Control (RBAC)</li>
<li>Shared Access Signature</li>
<li>Internal DNS</li>
<li>Azure DNS</li>
<li>Log Analytics NSGs</li>
<li>Enable log categories for NSGs:
<ol>
<li>Event</li>
<li>Rules counter</li>
</ol>
</li>
</ul>
<p><strong>Encryption</strong><strong> </strong></p>
<p>Azure supports various encryption models, including server-side encryption that uses service-managed keys, customer-managed keys in Key Vault, or customer-managed keys on customer-controlled hardware. With client-side encryption, client can manage and store keys on-premises or in another secure location.<strong> </strong></p>
<ul>
<li>Encryption in Transit</li>
<li>Encryption at rest</li>
<li>Storage Service Encryption</li>
<li>Client-side Encryption</li>
<li>Azure Disk Encryption (IaaS Virtual Machine Disk)</li>
</ul>
<p><strong>Applications Security</strong><strong> </strong></p>
<p>This feature provides security micro-segmentation for your virtual networks in Azure.</p>
<ul>
<li>Web Application vulnerability scanning</li>
<li>Penetration Testing</li>
<li>Web Application firewall</li>
<li>The web application firewall (WAF)</li>
<li>Authentication and authorization in Azure App Service</li>
<li>Layered Security Architecture (providing differing levels of network access for each application tier)</li>
<li>Web server diagnostics
<ul>
<li>Detailed Error Logging</li>
<li>Failed Request Tracing</li>
<li>Web Server Logging</li>
<li>Application diagnostics</li>
<li>All (displays all events)</li>
<li>Application Errors (displays exception events)</li>
<li>Performance (displays performance events)</li>
<li>Storage</li>
<li>Storage Analytics (Successful requests, Failed requests, including timeout, throttling, network, authorization, and other errors)</li>
<li>Enabling Browser-Based Clients Using CORS</li>
<li>Cross-Origin Resource Sharing (CORS)</li>
</ul>
</li>
</ul>
<p><strong>Network Security </strong></p>
<p>Microsoft Azure provides confidentiality, integrity, and availability of customer data, while also enabling transparent accountability. Available network recommendations by Microsoft are as follows:</p>
<ol>
<li>Add a Next Generation Firewall Recommends that client can add a Next Generation Firewall (NGFW) from a Microsoft partner to increase your security protections</li>
<li>Route traffic through NGFW only Recommends that you configure network security group (NSG) rules that force inbound traffic to your VM through your NGFW.</li>
<li>Enable Network Security Groups on subnets or virtual machines Recommends that you enable NSGs on subnets or VMs.</li>
<li>Restrict access through Internet facing endpoint Recommends that you configure inbound traffic rules for NSGs.</li>
</ol>
<p>Below are the main components or areas where you should focus to enhance the network security of your cloud environment.</p>
<ul>
<li>Network Layer Controls</li>
<li>Network Security Groups</li>
<li>A Network Security Group (NSG)</li>
<li>Route Control and Forced Tunneling</li>
<li>Forced tunneling</li>
<li>Virtual Network Security Appliances &#8211; Azure partner network security appliance solution.</li>
<li>Azure Virtual Network</li>
<li>Azure networking supports various secure remote access scenarios. Some of these include:</li>
<li>Connect individual workstations to an Azure Virtual Network</li>
<li>Connect on-premises network to an Azure Virtual Network with a VPN</li>
<li>Connect on-premises network to an Azure Virtual Network with a dedicated WAN link</li>
<li>Connect Azure Virtual Networks to each other</li>
<li>VPN Gateway</li>
<li>Express Route</li>
<li>Microsoft Azure ExpressRoute (Dedicated WAN Link -ExpressRoute connections do not go over the public Internet)</li>
<li>Application Gateway (Layer 7 Load Balancer)</li>
<li>Web Application Firewall</li>
<li>Traffic Manager</li>
<li>Microsoft Azure Traffic Manager</li>
<li>Azure Load Balancer (Layer 4 Load Balancer) &#8211; Internet-facing load balancing.</li>
</ul>
<p><strong>Compute Security </strong></p>
<p>Unified security management and advanced threat protection across hybrid cloud workloads , there are various tool available by azure for the compute environment.</p>
<ul>
<li>Antimalware &amp; Antivirus &#8211; Azure IaaS, use antimalware software from security vendors such as (Microsoft, Symantec, Trend Micro, McAfee, and Kaspersky to protect your virtual machines).</li>
<li>Hardware Security Module (store keys in hardware Security modules (HSMs) certified to FIPS 140-2 Level 2 standards.)</li>
<li>Virtual machine backup</li>
<li>Azure Backup (Windows &amp; Linux only)</li>
<li>Azure Site Recovery (DR &amp; BCP Orchestration)</li>
<li>SQL VM TDE (Transparent data encryption (TDE) and column level encryption (CLE) are SQL server encryption features. This form of encryption requires customers to manage and store the cryptographic keys you use for encryption.)</li>
<li>The Azure Key Vault (AKV)</li>
<li>VM Disk Encryption (Azure Disk Encryption (industry standard BitLocker feature of Windows and the DM-Crypt feature of Linux))</li>
<li>Virtual networking</li>
<li>Patch Updates</li>
<li>Security policy management and reporting</li>
<li>Identify and access management</li>
</ul>
<p><strong>Secure Identity (IAM)</strong></p>
<p>Protect application and data at the front gate with Azure Identify and access management solutions.</p>
<ul>
<li>Multi-Factor Authentication (Multi-Factor Authentication experience that works with both Microsoft Azure Active Directory and Microsoft accounts, and includes support for wearables and fingerprint-based approvals)</li>
<li>Password policy enforcement</li>
<li>Token-based authentication enables authentication via Azure Active Directory.</li>
<li>Role-based access control (RBAC)</li>
<li>Integrated identity management (hybrid identity) enables you to maintain control of users’ access across internal data centers and cloud platforms, creating a single user identity for authentication and authorization to all resources.<strong> </strong></li>
</ul>
<h4><span style="color: #993300;"><strong>AWS Built-in Security Features </strong></span></h4>
<p>Like other CSP the AWS cloud security solution has also been offering various feature to design cloud security. Below are the list of some of the services that you can use for cloud security.</p>
<ul>
<li>AWS Artifact</li>
<li>AWS Certificate Manager (SSL/TLS Certificates)</li>
<li>Amazon Cloud Directory</li>
<li>AWS CloudHSM Key Storage &amp; Management</li>
<li>Amazon Cognito User Sign Up &amp; Sign In</li>
<li>AWS Directory Service Directory</li>
<li>AWS Firewall Manager</li>
<li>Amazon GuardDuty Threat Detection</li>
<li>AWS Identity and Access Management (IAM)</li>
<li>Amazon Inspector</li>
<li>Security Assessment</li>
<li>AWS Key Management Service</li>
<li>Amazon Macie (Sensitive Data Classification)</li>
<li>AWS Organizations (Multiple Account Management)</li>
<li>AWS Shield (DDoS Protection)</li>
<li>AWS Secrets Manager</li>
<li>AWS Single Sign-On (SSO)</li>
<li>AWS WAF (Web Application Firewall)</li>
</ul>
<p><strong>Infrastructure Security</strong></p>
<p>It help identify and protect applications and infrastructure from cyber-attacks and other advanced threats vectors. Infrastructure security is important area to secure cloud environment. Have a look at below tools that is available in AWS market place to secure cloud environment.</p>
<p><strong>Tools Offered in AWS Market Place </strong></p>
<ul>
<li>Barracuda</li>
<li>Check Point</li>
<li>TM_logo_red_2c_transparent_small</li>
<li>Alert Logic</li>
<li>Intel Security</li>
<li>Symantec</li>
<li>600x400_Sophos_logo</li>
<li>FORTINET_logo</li>
<li>PaloAlto</li>
<li>imperva-new</li>
<li>openvpn</li>
<li>netgate</li>
<li>Gigamon-Free-Standing-Orange-Logo</li>
</ul>
<p><strong>Configuration &amp; Vulnerability Analysis</strong></p>
<p>Tools to help you inspect application deployments for security risks and vulnerabilities, while receiving priorities and advice to assist with remediation.</p>
<p><strong>Stealth</strong></p>
<ul>
<li>cloudcheckr- The CloudCheckr CMP offers a single pane of glass view to help modern enterprises manage and optimize their public cloud</li>
<li>600x400_Tenable_Logo</li>
<li>600x400_EvidentIo</li>
</ul>
<p><strong>Logging and monitoring</strong></p>
<p>Help maintain visibility and auditability of activity in your application infrastructure and receive policy-driven alerting, and reporting.</p>
<ul>
<li>Sumo Logic</li>
<li>200x133_Splunk_Logo</li>
<li>Cisco_600x400</li>
</ul>
<p><strong>Data Security</strong></p>
<p>Assist with safeguarding your data from unauthorized disclosure and modification, through encryption, key management, and policy-driven controls.</p>
<ul>
<li>300x100_Gemalto_Logo</li>
<li>hytrust</li>
<li>townsendsecurity</li>
</ul>
<h4><span style="color: #993300;"><strong>Google Cloud Platform Build In Security Features</strong></span></h4>
<p><strong>Shielded VMs</strong> are virtual machines (VMs) on Google Cloud Platform hardened by a set of security controls that help defend against rootkits and boot kits to secure cloud environment.</p>
<ul>
<li>Verifiable integrity with secure and measured boot</li>
<li>vTPM exfiltration resistance</li>
<li>Trusted UEFI firmware</li>
<li>Tamper-evident attestations</li>
<li>Live migration and patching</li>
</ul>
<p><strong>Binary Authorization</strong> is a deploy-time security control that ensures only trusted container images are deployed on Kubernetes Engine.</p>
<ul>
<li>Policy creation</li>
<li>Policy verification and enforcement</li>
<li>Audit logging</li>
<li>Open source support for Kubernetes</li>
<li>Break Glass support</li>
<li>Integration with third-party solutions</li>
<li>Integrate Binary Authorization with leading container security and CI/CD partners, such as CloudBees and Twistlock.</li>
</ul>
<p><strong>Google Cloud Load Balancing </strong></p>
<p>Scale your applications on Google Compute Engine from zero to full-throttle with Google Cloud Load Balancing, with no pre-warming needed</p>
<ul>
<li>HTTP(S) Load Balancing</li>
<li>TCP/SSL Load Balancing</li>
<li>SSL Offload</li>
<li>Advanced Feature Support</li>
<li>UDP Load Balancing</li>
<li>Stackdriver Logging</li>
<li>Seamless Autoscaling</li>
<li>High Fidelity Health Checks</li>
<li>Affinity</li>
<li>Cloud CDN Integration</li>
</ul>
<p><strong>Authentication, Integrity, and Encryption</strong></p>
<p>Google employs several security measures to help ensure the authenticity, integrity, and privacy of data in transit.</p>
<ul>
<li><strong>Encryption at rest</strong></li>
<li><strong>Encryption in transit </strong></li>
</ul>
<p><strong>Encryption in use &#8211; </strong>protects data when it is being used by servers to run computations, e.g. homomorphic encryption.</p>
<p>ALTS, a mutual authentication and transport encryption system that runs at the application layer, to protect RPC communications. Using application-level security allows applications to have authenticated remote peer identity, which can be used to implement fine-grained authorization policies</p>
<p><strong>Google Key Management Service</strong></p>
<p>Cloud KMS is a cloud-hosted key management service that lets you manage cryptographic keys for your cloud services the same way you do on premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.<strong> </strong></p>
<ul>
<li>Symmetric and asymmetric key support</li>
<li>Encrypt and decrypt via API</li>
<li>Automated and at-will key rotation</li>
<li>Delay for key destruction</li>
<li>High global availability</li>
<li>Application Layer Transport Security</li>
</ul>
<p><strong>Google Cloud Data Loss Prevention </strong></p>
<p>Automatically discover and redact sensitive data everywhere</p>
<ul>
<li>Flexible Classification</li>
<li>Secure Data Handling</li>
<li>Custom Detectors</li>
<li>Easy Workload Integration</li>
<li>Likelihood Scores</li>
<li>Pay As You Go Pricing</li>
<li>Detailed Findings</li>
<li>Simple and Powerful Redaction</li>
<li>REST API</li>
</ul>
<p><strong>Google Cloud HSM</strong></p>
<p>Cloud HSM a cloud-hosted hardware security module (HSM) service on Google Cloud Platform.</p>
<ul>
<li>Symmetric and asymmetric key support</li>
<li>Statement attestation</li>
<li>Integration with Cloud KMS</li>
<li>Multi-region support</li>
<li><a href="https://support.google.com/a/answer/6280516?hl=en">G Suite DLP Mail</a></li>
<li><a href="https://support.google.com/a/answer/6321530?hl=en">G Suite DLP Drive</a></li>
<li><a href="https://support.google.com/a/answer/60781?hl=en">G Suite Doc Controls</a></li>
</ul>
<p><strong>Google Chrome Browser</strong></p>
<p>Manage centrally employee activity in the cloud, across all devices and platforms, now and in the future</p>
<ul>
<li>Advanced malware and phishing protection gives employees a safe cloud experience.</li>
<li>Regular security updates</li>
<li>Users are protected from the latest security vulnerabilities — no patching required.</li>
<li>Sandboxing</li>
<li>Prevents malware and isolates malicious web pages that try to infect devices, monitor web activity, or steal data.</li>
<li>Site isolation</li>
<li><a href="https://gsuite.google.com/products/admin/mobile/?_ga=2.85405721.-1694977695.1537292179">G Suite Device Management</a></li>
</ul>
<p><strong>Identity &amp; Access Management</strong></p>
<p>Protect user identities by managing the user lifecycle, authentication and assurance, and managing system and application access.</p>
<ul>
<li><a href="https://support.google.com/cloudidentity/answer/7319251?hl=en&amp;visit_id=1-636542458197935367-13221123&amp;rd=1">Cloud Identity</a></li>
<li><a href="https://cloud.google.com/iam/">Cloud IAM</a></li>
<li><a href="https://cloud.google.com/iap/">Cloud Identity-Aware Proxy</a></li>
<li><a href="https://cloud.google.com/security-key/">Security Keys</a></li>
<li><a href="https://cloud.google.com/resource-manager/">Cloud Resource Manager</a></li>
<li><a href="https://firebase.google.com/products/auth/">Firebase Authentication</a></li>
</ul>
<p><strong>Application</strong> <strong>Security</strong></p>
<ul>
<li><strong>Cloud Security Scanner</strong>-Automatically scan your App Engine apps for common vulnerabilities</li>
<li><strong>Apigee</strong>-API Management for Visibility and Control Design, secure, analyze, and scale APIs anywhere.</li>
</ul>
<p><strong>Security Monitoring &amp; Operations </strong></p>
<p>Monitor for malicious activity, handle security incidents, and support operational processes that prevent, detect, and respond to threats.</p>
<ul>
<li>Stackdriver Logging</li>
<li>Cloud Security Command CenterALPHA</li>
<li>Access Transparency</li>
</ul>
<p><strong>Cloud Security Command CenterALPHA</strong></p>
<ul>
<li>Asset Discovery and Inventory</li>
<li>Sensitive Data Identification</li>
<li>Application Vulnerability Detection</li>
<li>REST API</li>
<li>Access Control Monitoring</li>
<li>Anomaly Detection From Google</li>
<li>Third-party Security Tool Inputs (Integrate output from your existing security tools such as Cloudflare, CrowdStrike, Dome9, Palo Alto Networks, Qualys, and RedLock into Cloud Security Command Center to detect DDoS attacks)</li>
<li>Real-time Notifications</li>
</ul>
<p><strong>Google Governance, Risk &amp; Compliance</strong></p>
<p>Support governance and compliance processes, including performing assessments, demonstrating compliance, and achieving certifications. You should read attached Third-party audits and certifications article in given link: https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/</p>
<p>I hope you liked this article. I would recommend you to also read this article about cloud security and data protection: <a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security and Data Protection</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Cloud Security &#038; Data Protection</title>
		<link>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/</link>
					<comments>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Fri, 03 Nov 2017 10:44:16 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1099</guid>

					<description><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like Is our data secured in Cloud environment? Or Is your&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like <strong>Is our data secured in Cloud environment?</strong> Or <strong>Is your data in Cloud hackable?</strong> Or <strong>Can your data be disclosed by the Cloud Service Provider?</strong></p>
<p>Here I am going to answer all these questions and explaining about Cloud Security in this context.</p>
<h3><span style="color: #000080;"><strong>Is your data secure in Cloud environment?</strong></span></h3>
<p><strong>Yes,</strong> your data will be secured in <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">cloud environment</a> if you can design security solution/configurations leveraging public cloud providers features and third-party tools efficiently.</p>
<p>The amount of security configuration work you must do will varies, depending on what kind of cloud services you select and how sensitive your data is.</p>
<p>Security in Cloud creates a shared responsibility model between the customer and Cloud Service Provider (CSP). CSPs are responsible for securing the infrastructure (hardware, software, networks, and facilities of their Data center) that supports the cloud and you will be responsible for anything you put on the cloud or connect to the cloud (Data, Operating System, softwares, tools, License, Access, Credentials, authentication, encryption etc.)</p>
<h3><span style="color: #000080;"><strong>Is your data in Cloud Hackable?</strong></span></h3>
<p><strong>No,</strong> cloud systems are not hackable in terms of technology, hardware and network services provided by cloud provider. However, if security configurations are not done accurately by the user then loopholes in security may lead vulnerability in your cloud environment.</p>
<h3><span style="color: #000080;"><strong>Can your data be disclosed by the Cloud Service Provider?</strong></span></h3>
<p>Your content/data <strong>will not</strong> be disclosed unless service provider required to do so to comply with the law of the country or a valid and binding order of a governmental or regulatory body. Unless prohibited from doing so or there is clear indication of illegal conduct about the use of CSP’s products or services. CSP notifies customers before disclosing customer content so they can seek protection from disclosure.</p>
<p>To understand all above and similar security related concerns you should first understand Cloud Security. Let’s discuss what is cloud security and how many domains we need to take care from cloud security point of view.</p>
<h3><span style="color: #000080;"><strong>What is Cloud Security?</strong></span></h3>
<p>As every second your information/data travel through cloud and from different locations, networks and regions. We need to ensure it is not leaked in process of transmission from one place to other. Typically, all firms are well verse about physical and technical security of their On-premise data center. Similarly, cloud services and Infrastructure need to be secured to protect the confidentiality, integrity, and availability of your or your client data.</p>
<p>In Cloud context, security is a shared responsibility between the Cloud Service Provider (CSP) and its users/customers. CSPs take care of physical and logical security of its underlying hardware until Hypervisor layer. However, anything above Operating System is Client responsibility because customer owns the data and service provider has no access to it. Although it also varies in each model of Cloud Computing for some services.</p>
<p>Cloud Security is all about leveraging security features and tools to design and build a secure cloud environment to protect the privacy and integrity of cloud customers and their data. Cloud Security is blend of technologies and policies designed to adhere and regulate compliance rules and protect information, data applications and infrastructure associated with <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> use.</p>
<h3><span style="color: #000080;"><strong>Cloud Security Categories</strong></span></h3>
<p>From cloud security perspective, below are the cloud security domains or categories that needs to be considered while building cloud environment.</p>
<ol>
<li><strong>Physical Security</strong></li>
<li><strong>Network security</strong></li>
<li><strong>System Security</strong></li>
<li><strong>Application Security</strong></li>
<li><strong>Data Security</strong></li>
<li><strong>Identity and Access management</strong></li>
<li><strong>Encryptions</strong></li>
<li><strong>Security operations</strong></li>
</ol>
<p>Each ownership for each type of security in cloud varies in each model of Cloud. You can see who is responsible for  what in each cloud model in below image.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1100" src="http://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png" alt="cloud security" width="1024" height="410" srcset="https://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png 1024w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-300x120.png 300w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-768x307.png 768w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security.png 1204w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<ol>
<li><strong>Physical Security- </strong>is the protection of hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. CSPs are responsible to take care of this security.</li>
<li><strong>Network Security – </strong>Includes data security in transit to and from the public cloud provider. It means designing and building network configuration and its elements allowing a secure access to cloud resources from your on-premise Data centers, Office, Internet etc. This security is shared responsibility between CSPs &amp; Customer.</li>
<li><strong>System Security- </strong>This capability covers operating system hardening, protection and policy control. The host security at PaaS and SaaS Level are transferred to CSP.</li>
<li><strong>Application Security – </strong>It’s a shared responsibility in cloud context to protect the application running over the cloud. Based on type of cloud model application security is managed, for e.g in SaaS cloud provider will manage the security of the application. While at the PaaS level platform security will be managed by CSP and deployed application will be customer responsibility.</li>
<li><strong>Data Security – </strong>Data security capability includes securing data in transit and at rest it to avoid data loss and exposure.</li>
<li><strong>Identity and Access management- </strong>This capability evolves around authentication, verification and authorization of cloud resources.</li>
<li><strong>Encryptions – </strong>As all communications between regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect sensitive data.</li>
<li><strong>Security operations- </strong>Governance and strategic direction on security policies, risk assessment and its maintenance.</li>
</ol>
<h3><span style="color: #000080;"><strong>Choose Cloud Service Provider considering Data Security, Information Security and Quality Assurance?</strong></span></h3>
<p>Its depends on data and its criticality in terms of sensitivity, availability &amp; durability requirement. For choosing most reliable cloud service provider we must consider <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">CSP’s accreditations, security certifications and third party audit assessment reports</a>. All major cloud service provider share their policies accreditation on data privacy, security, durability, availability information on their respective portals under valid Non-disclosure agreement. These certifications are global and can be achieved through periodic rigorous external audit accredited certification bodies based on <strong>NIST</strong> (National Industrial Security Program Operating Manual) global standards.</p>
<p>Some of the Most popular <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Cloud Service Provider Accreditations and Certification</a> for cloud computing compliance and security are given in attached article. Read it to understand Cloud Accreditations and Certification that will finally help you to choose right Cloud Service Provider.</p>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Reference Links:</strong></em></span> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</title>
		<link>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/</link>
					<comments>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 14:00:13 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1094</guid>

					<description><![CDATA[<p>Cloud Service provider is responsible for protecting its infrastructure that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud Service provider is responsible for <a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">protecting its infrastructure</a> that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and technical security of the cloud data center hence all CSPs publish several third-party auditors report to validate its compliance. CSPs  provide reports from third-party auditors who have verified their compliance with a variety of computer security standards and regulations that is known as Cloud Service Provider Accreditation.</p>
<p><img loading="lazy" decoding="async" class="aligncenter  wp-image-1097" src="http://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg" alt="Cloud Accreditations" width="525" height="295" srcset="https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg 1024w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-300x169.jpg 300w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-768x432.jpg 768w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations.jpg 1280w" sizes="auto, (max-width: 525px) 100vw, 525px" /></p>
<h3><span style="color: #000080;">Compliance Program provided by Cloud Services Providers</span></h3>
<p>Cloud Service providers ensure robust controls to secure their infrastructure, to protect client data. As virtual systems build over the cloud Infrastructure need also to be secured and it comes with shared responsibility and compliance. Cloud Data center environment comes with audit friendly features and standards to ensure client satisfaction about their data security. The IT infrastructure that CSP provides to its customers is designed and managed in orientation with security best practices and a variety of IT security standards due to economies of scale, including but not limited to the following:</p>
<p><span style="color: #800000;"><strong>AWS (Amazon) Security Certifications /Accreditation </strong></span></p>
<ul>
<li><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> Compliance Controls Catalogue (C5)</li>
<li>FedRAMP Partner Package</li>
<li>Global Financial Services Regulatory Principles IRAP Package</li>
<li>ISO 27001:2013 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27017:2015 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27018:2014 Certification and Statement of Applicability (SoA)</li>
<li>ISO 9001:2015 Certification</li>
<li>MAS TRM Guidelines Workbook</li>
<li>PCI DSS Attestation of Compliance (AOC) and Responsibility Summary</li>
<li>PSN Connection Compliance Certificate (CoCo)</li>
<li>PSN Service Provision Compliance Certificate</li>
<li>Quality Management System Overview</li>
<li>Service Organization Controls (SOC) 1 Report</li>
<li>Service Organization Controls (SOC) 2 Report</li>
<li>Service Organization Controls (SOC) 3 Report</li>
<li>SOC Continued Operations</li>
</ul>
<p><strong> </strong><span style="color: #800000;"><strong>Microsoft Azure Security and Compliance Certifications / Accreditation</strong></span><strong> </strong></p>
<ul>
<li>ISO 27001, FedRAMP, SOC 1 and SOC 2.</li>
<li>The Content Delivery and Security Association (CDSA)</li>
<li>Criminal Justice Information Services (CJIS)</li>
<li>The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) CSACCM</li>
<li>EU Model Clause</li>
<li>FDA 21 CFR Part 11(The US Food and Drug Administration (FDA) Code of Federal</li>
<li>Regulations (CFR) Title 21 Part 11)</li>
<li>FedRAMP(Federal Risk and Authorization Management Program (FedRAMP)</li>
<li>The Family Educational Rights and Privacy Act (FERPA)</li>
<li>FIPS 140-2. Federal Information Processing Standard (FIPS) Publication 140-2</li>
<li>The Health Insurance Portability and Accountability Act (HIPAA)</li>
<li>IRAP (Australian Government Information Security Registered Assessors Program)</li>
<li>ISO/IEC 27001/27002:2013</li>
<li>Multi-Level Protection Scheme (MLPS) is based on the Chinese state standard issued by the Ministry of Public Security</li>
<li>Multi-Tier Cloud Security Standard for Singapore (MTCS SS),</li>
<li>Payment Card Industry (PCI) Data Security Standards (DSS) version 3.0</li>
<li>TCS CCCPPF Trusted Cloud Service certification developed by the China Cloud Computing Promotion and Policy Forum (CCCPPF)</li>
<li>UK G-Cloud.<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>Google Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>SSAE16 / ISAE 3402 Type II:</li>
<li>SOC 1</li>
<li>SOC 2</li>
<li>SOC 3 public audit report</li>
<li>ISO 27017, Cloud Security</li>
<li>ISO 27018, Cloud Privacy</li>
<li>FedRAMP ATO for Google App Engine</li>
<li>PCI DSS v3.2</li>
<li>HIPAA</li>
<li>CSA STAR</li>
<li>MTCS Tier 3 Certification (Singapore)</li>
<li>Google Cloud Platform and the EU Data Protection Directive<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>IBM Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>FedRAMP</li>
<li>FISMA</li>
<li>FFIEC</li>
<li>SOC Reports</li>
<li>ISO 27001</li>
<li>ISO 27017</li>
<li>ISO 27018</li>
<li>Cloud Security Alliance</li>
<li>PCI Compliance</li>
<li>HIPAA</li>
<li>HITRUST Assessment</li>
<li>GSMA (DAL09, PAR01)</li>
<li>CJIS Standards</li>
<li>EU Model Clauses</li>
<li>Privacy Shield</li>
<li>IBM ISO Management System Certifications</li>
</ul>
<p><span style="color: #800000;"><strong><em>Related Read:</em></strong></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">What is Cloud Computing?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security &amp; Data Protection in Cloud</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><em><strong><span style="color: #800000;">Reference Links:</span></strong></em> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
