Название: Machine Learning Techniques and Analytics for Cloud Security
Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Программы
isbn: 9781119764090
isbn:
If we look at the records provided by IDC, in the year 2020, public cloud expenses have made a mark, for the first time, it has left behind old-style IT structure. An increase of 34.4% has been recorded in cloud including private and public. Whereas traditional IT infra fall out by 8%.
Public hybrid cloud providers have the gap of capability between hyper scale cloud providers. Competition for enterprise workloads yields secondary markets throughout the world. The cloud service providers like Microsoft Azure Stack, AWS Outpost, and Google Cloud Anthos have become financially strong.
1.6 Security in Hybrid Cloud
A properly designed, managed, and integrated hybrid cloud is considered to be as secure as on-premise infrastructure. But reality is bit different. Gartner and WSJ [7] have recently reported that 95% data breaches occur in cloud computing due to human error. Here, in hybrid cloud, also human error plays a crucial role. Misconfiguration, misunderstanding of system use, and accidental data sharing all results threat to security. Security is essential in all application areas. Suppose in healthcare organizations patients’ data should be kept hidden. Pathological reports of any patient are not expected to be accessed by any unauthenticated person. Similarly in financial industry, trust is the most important factors. Details of all customers’ sensitive data have been kept like their income related info; their identification info their tax related document everything has been kept there. Customer should feel protected about their data. It happens in all sectors. With the help of public server and data centers, the business world is forwarding toward a new server free era but security measures have to be adjusted so that it can reap up ultimate technological and financial benefits. Since hybrid cloud is a “one size fits for all” solution for business development, it is advisable to look into the security issues more closely as threats to sensitive data might cause problem. Here is a list of issues specific to hybrid cloud security [11]:
Authority: In hybrid environment, multiple functioning components scattered through private and public cloud. Multiple services can also be taken from multiple public clouds. So, customers of hybrid cloud should decide the governance rule for components, functions, and data beforehand both for private and public cloud.
Portability: Supporting infrastructure must be there so that applications and data may move between public and private cloud. Data portability causes additional risk in hybrid cloud. Private data can be made secure by applying encryption techniques but when portability is allowed then who will be responsible for the protection of data in transit need to be addressed.
Presence of multiple interface: Multiple cloud may be present in a network and each of them most likely is to have their own set of security and privacy policy compounds. This acts as a back door for data breaching in case of hybrid cloud.
Lack of separation wall: Cloud customers have seamless access to private and public resources. As a result of that, sometimes, intruders take an indirect entry to penetrate the delicate data.
Security issues handling: Reporting and subsequent measures for security issues need to be shared to the customer as well as service providers so that they will be extra cautious from the next access. Sometimes, customers face unacceptable delay due to security issues, so in the SLA, it should be mentioned when and how they will be notified.
Application and data protection: Protections offered by the cloud providers are getting stronger day by day but still they are not enough. Advanced security information and event management (SIEM) solution need to be implemented.
Vendor lock-in: Sometimes, due to lack of scalability or security issues, cloud needs to be shifted from one vendor to other vendor. If the cost of switching is so high that the customer is forced to stick to the origin, it is known as vendor lock-in. Avoiding vendor lock-in needs to be included in the business policy.
Guard against shadow IT practice: Sometimes, within the organization, some person or departments are using sensitive data without the knowledge of the security group. This is called shadow IT practice, and often severe risks are associated with it.
Although hybrid cloud is considered more secure than public cloud as it provides greater control over the data but still data leakage, corruption, improper or unauthorized access, and data deletion can only be handled by secure channel, access control, data validation, and encryption. By doing the vulnerability management also security can be enhanced [32]. Risk assessment is often done to reduce vulnerability.
1.6.1 Role of Human Error in Cloud Security
As discussed, 95% of error in cloud security happens because of human error. Most of the time errors are not intentional but lack of seriousness, lack of overall knowledge of the system, poorly configured servers, misconfiguration, absence of proper authorization, etc., are players behind error generation. As a result, human expertise is not always believed to make safeguards against security threats. New kind of services and technologies are evolving every day for providing better services. There are automated security tools which can scan cloud configuration regularly and can enforce security policies which will not let intruders to get access.
1.6.2 Handling Security Challenges
When any organization is planning to deploy hybrid cloud, some box of tricks needs to apply to reduce the security threats. Though cloud vendors generally provide security measures but still they see the task as shared responsibility, also in case of multi-tenant cloud security algorithms are not same for all vendors. So, planning and standardization of all activities can handle security challenges to a great extent. Some best ever practices are as follows:
Encrypt all data: Best possible means to secure data is to do the encryption. Encrypt all data irrespective of their location. In hybrid cloud, data often move between two or more clouds and in transit data is vulnerable. Encrypted data is less likely to be compromised. Selective encryption can be more vulnerable as it is easy to identify which is encrypted and which is not. Target selection becomes easier in this case and data becomes more susceptible to threats.
Strengthen authentication and authorization process: Access to data should only be provided to authenticated user. Unnecessary and unauthorized access has to be prevented. In hybrid cloud, different applications run on different cloud, so access rights of different customer will not be same.
Customer awareness: One of the most important part in security as it can reduce human error to some extent. Customers should follow common guidelines for accessing data and services. They should be aware of the security threats and will take measures accordingly. They should use strong passwords and prevent access to sensitive data by any unauthenticated application.
Application of standardized process: Uniform standards have to be maintained; it should not be like any one can use anything. Network configuration, password structure, firewall setup, auditing and monitoring, and database maintenance everything need to be regulated. Regular updation of OS and applications is essential.
Strong disaster recovery plan: Though event of system or application failure in hybrid cloud is much less than other cloud, but still it can happen. Disaster recovery plans should take action in those scenarios. Regular backup and configuration of failover system should be a part of disaster recovery plan.
Employ СКАЧАТЬ