Delhi:2021 continues with cloud security issues. Col. Inderjeet Singh, Cyber Security Expert, Director General, Cyber Security Association of India gives a complete insight into cloud computing technologies, the cloud security issues, and also the ways to tackle it.
Cloud Computing is being used by many of us in our daily lives. A typical example of cloud technology is the use of web-based email services or the preparation of any document on the Internet. In the field of information technology,there are three different types of cloud computing:
- infrastructure as a service (IaaS)
- platform as a service (PaaS)
- and software as a service (SaaS)
All these types of cloud technologies are used for different kinds of work/services. Cloud Computing is instrumental in business development because it provides impressive results promptly.
Cloud computing is a collective term you might have heard quite a long time back. So to make it a bit easy for you, cloud computing is all about:-
- Storing
- accessing
- and managing big data and software applications on the Internet
In this technology, the entire data is protected by firewall networks. With software and data installed in data centers worldwide, you can use the software without using your computer’s hard drive.
Also Read: Deepfakes: The dark side of Artificial Intelligence
Expanding into cloud technology (or expanding use of the cloud) are some of the top business priorities and a crucial element to achieving an organization’s mission. Cloud services help enterprises expand their capabilities while minimizing labour costs and capital expenditures for adding new technology solutions. It also helps them to increase their agility by instantly acquiring infrastructure resources and services when required.
Cloud Computing is the ultimate and most cost-effective data solution to meet new and growing business demands today. The transition to the cloud has brought new security challenges. Since cloud computing services are available online, this means anyone with the right credentials can access them. The availability of enterprise data attracts many hackers who attempt to study the systems, find flaws in them, and exploit them for their benefit.
Cloud Security is often a bottleneck for cloud services, and it remains to be one of the top concerns of many professionals around the world. However, in addition to the ample benefits of cloud technology, there are also challenges, some of which are security-related. In 2019, over 540 million Facebook user records on the Amazon cloud server were exposed. The risks and challenges associated with cloud security need to be properly addressed before you adopt a cloud solution.
Col. Inderjeet explains cloud security challenges. He further adds that security challenges in the cloud can leave your data and organization at risk of cyberattacks that could have long-term, devastating effects. Although most company owners believe that the cloud computing system is significantly better than their on-premise network, there are many cloud security challenges to address.
That even large, successful companies face challenges while working with cloud infrastructures and sometimes end up falling victim to cyberattacks.
Lack of Visibility/ Control
A lack of visibility is one of the most important cloud security challenges as it affects the organization’s ability to enact incident response plans, verify the efficacy of their security controls and properly assess information about their data, services, and users. It is crucial for organizations to have a cloud usage policy with approved mechanisms for getting approved servers stood up, deployment processes, etc. A lack of visibility in the public cloud also poses business risks in terms of compliance, governance, and security. This is important for verifying how much visibility and control the cloud computing solution will offer.
To address Lack of Visibility/Control Issues -Cloud security controls such as core network/hardware controls, data center controls, and operational security practices like change control, data disposal, and other controls will help prevent a wide variety of teams from deploying all sorts of resources outside of the visibility of the security team.
Col Inderjeet suggests that it is better to ensure that you have good auditing in place. Have strong controls for approved server images, processes for deploying. Furthermore, monitor cloud audit logs for unapproved usage.
Data Breach and Data Leak
In this, the information is accessed and extracted without authorization. This event usually results in a data leak. The information in the cloud storage is under multiple levels of access. However, it is available from various devices and accounts with cryptographic keys. In other words, a hacker can get into it if he knows someone who has access to it. In cloud environments, the accounts with the highest risks are cloud service accounts or subscriptions. Phishing attacks, exploitation of cloud-based systems, or stolen credentials can compromise these accounts.
To avoid Data Breach and Data Leak –use Multi-factor Authentication: For example, typing a password and then receiving a notification on a mobile phone with a randomly-generated single-use string of numbers active for a short period. This has become one of the cloud security standards nowadays.
Data-at-Rest Encryption: Data-at-rest is a type of data that is stored in the system but not actively used on different devices. This process includes logs, databases, datasets, etc. This data can be encrypted and decrypted when it is used again.
Firewall: between a private and public network that controls in and out traffic in the system. Internal firewall to monitor authorized traffic and detect anomalies.
Access Management System