Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Cloud Computing: Shared Security Model

May 29, 2021June 2, 2021 by admin

In cloud computing, security is a shared responsibility between the CSP and the customer. The service model will dictate the general responsibilities, but specifics will also vary based on the actual service being consumed.

Security Considerations for Infrastructure as a Service (IaaS)

Within IaaS, a key emphasis and focus must be placed on the various layers and components stemming from the architecture through to the virtual components. Given the reliance and focus placed on the widespread use of virtualization and the associated hypervisor components, this forms a key focus as a method or attack vector to gain access to or disrupt cloud service.

 

The purpose of IaaS infrastructure is to provide standardized compute, memory, network, and storage resources that enable scalability by providing a highly abstracted, shared environment that hosts virtual machines for multiple tenants.

During due diligence, the customer should ensure that security partitions reliably isolate tenants from one another. This isolation must be present throughout all IaaS infrastructure components: host, virtual machine, compute, memory, network, and storage.

When deploying a private cloud IaaS service, the enterprise should enforce a baseline security configuration across all physical hosts. IT governance should require clients to have sufficient security systems such as anti-virus, anti-malware, and up-to-date patches. This should be enforced through robust security mechanisms.

Another important part of due diligence is how network traffic of each tenant’s systems is isolated from the other tenants on the system. Virtual servers connected by virtual network cards to virtual networks should be protected by virtual firewalls.

From the service provider network’s point of view regarding nonaffiliated systems, you can require network encryption. All systems should be isolated logically by taking advantage of network virtualization techniques. For storage services, access control or system authorization will typically be implemented at the operating system level.

Next article in series – IaaS: Hypervisor Security

Related

1 thought on “Cloud Computing: Shared Security Model”

  1. Pingback: IaaS: Hypervisor Security – Cloud Gal 42

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!