UNIT - V Cloud Security Mechanisms Fundamental Cloud Security • Information security is a complex ensemble of techniques, technologies, regulations, and behaviors that collaboratively protect the integrity of and access to computer systems and data • IT security measures aim to defend against threats and interference that arise from both malicious intent and unintentional user error Confidentiality • Confidentiality is the characteristic of something being made accessible only to authorized parties • Within cloud environments, confidentiality primarily pertains to restricting access to data in transit and storage Integrity • Integrity is the characteristic of not having been altered by an unauthorized party • An important issue that concerns data integrity in the cloud is whether a cloud consumer can be guaranteed that the data it transmits to a cloud service matches the data received by that cloud service Other technical terms • Authenticity • Availability • Threat • Vulnerability • Risk • Security Controls • Security Mechanisms • Security Policies • Threat Agents • Anonymous Attacker • Malicious Service Agent • Trusted Attacker • Malicious Insider Cloud Security Threats • This section introduces several common threats and vulnerabilities in cloud - based environments Traffic eavesdropping is a type of cyberattack where an unauthorized party intercepts and monitors network traffic to steal sensitive data. It is also known as network sniffing or packet sniffing It is of two types: 1. Passive Eavesdropping – The attacker secretly listens to network communications without altering the data. 2. Active Eavesdropping – The attacker intercepts and manipulates network traffic to extract or modify information. Traffic Eavesdropping Traffic Eavesdropping Malicious Intermediary A malicious intermediary is an attacker who secretly intercepts, alters, or manipulates communications between two parties without their knowledge. This type of attack is commonly known as a Man - in - the - Middle (MitM) attack It is of different types. 1. Interception – The attacker positions themselves between two communicating parties (e.g., a user and a website). 2. Eavesdropping – They monitor, record, or steal sensitive data (e.g., login credentials, credit card details). 3. Modification – They alter the transmitted data, injecting malicious content or redirecting users to fraudulent sites. Malicious Intermediary Denial of Service A Denial of Service (DoS) attack is a cyberattack aimed at overwhelming a system, network, or website with excessive traffic or resource requests, making it unavailable to legitimate users. Types of DoS Attacks: 1. Volume - Based Attacks – Overload a network with massive amounts of traffic. ◦ Examples : UDP flood, ICMP flood (Ping flood) 2. Protocol Attacks – Exploit vulnerabilities in network protocols to exhaust system resources. ◦ Examples : SYN flood, Ping of Death, Smurf attack 3. Application - Layer Attacks – Target specific applications, often mimicking legitimate traffic. ◦ Examples : HTTP flood, Slowloris attack Distributed Denial of Service (DDoS) Attack A more powerful version of a DoS attack where multiple compromised devices (often a botnet) are used to attack a target simultaneously. Effects of DoS Attacks: • Websites or online services become slow or inaccessible. • Businesses suffer financial and reputational damage. • Critical infrastructure can be disrupted (e.g., banking, healthcare, government services). How to Prevent DoS/DDoS Attacks: • Use a Web Application Firewall (WAF) – Filters out malicious traffic. • Rate Limiting & Traffic Filtering – Limits the number of requests from a single source. • Deploy DDoS Protection Services – Services like Cloudflare, AWS Shield, or Akamai help mitigate attacks. • Monitor Network Traffic – Detect and respond to unusual spikes in traffic. • Use Load Balancers – Distribute traffic across multiple servers to prevent overload. Denial of Service Insufficient Authorization Insufficient Authorization , as described by Thomas Erl , refers to a security vulnerability where a system does not properly enforce access control policies, allowing unauthorized users to access restricted resources or perform actions beyond their permitted privileges. Key Aspects of Insufficient Authorization: 1. Weak or Missing Role - Based Access Control (RBAC) – Users can access functions or data they shouldn't. 2. Overprivileged Users – Users have more permissions than necessary. 3. Bypassing Access Controls – Attackers exploit system flaws to escalate privileges. 4. Failure to Verify Permissions at Each Step – The system assumes previous authentication is enough without rechecking authorization. Examples: • A normal user accessing an admin panel by changing the URL (e.g., /admin/dashboard ). • Employees accessing confidential HR or financial data without proper clearance. • API endpoints that allow unauthorized users to modify or delete records. How to Prevent It: • Implement Role - Based Access Control (RBAC) – Assign least privilege access. • Enforce Access Controls at Every Layer – Don't assume prior authentication means authorization. • Use Multi - Factor Authentication (MFA) – Adds an extra layer of security. • Perform Regular Access Reviews – Audit and remove unnecessary privileges. • Validate User Privileges in APIs & Backend Systems – Prevent unauthorized API access. Insufficient Authorization Virtualization Attack A Virtualization Attack , as described by Thomas Erl , refers to a security threat targeting virtualized environments , such as virtual machines (VMs), hypervisors, and cloud infrastructure. These attacks exploit vulnerabilities in virtualization technology to compromise the c onf identiality, integrity, or availability of virtualized systems. Common Virtualization Attacks: 1. Hyperjacking – An attacker gains control of the hypervisor (the software managing VMs) and can manipulate or spy on all virtual machines running on it. 2. VM Escape – A compromised VM escapes its isolated environment and gains access to the host system or other VMs. 3. VM Hopping – Attackers move laterally between VMs on the same host by exploiting weak segmentation or shared resources. 4. DoS Attacks on Virtualized Resources – Overloading the hypervisor or virtual network, leading to service disruption. 5. Snapshot Attacks – Exploiting VM snapshots to restore systems to an insecure state or steal data. How to Prevent Virtualization Attacks: • Secure the Hypervisor – Use trusted hypervisors (e.g., VMware, Hyper - V, KVM) and apply regular security patches. • Enforce VM Isolation – Prevent one VM from accessing another using network segmentation and strict access controls. • Monitor and Audit Virtual Machines – Detect unauthorized activity or abnormal behavior. • Use Strong Authentication – Implement MFA for hypervisor and VM management access. • Restrict VM Snapshots – Limit who can create or restore snapshots to prevent rollback to a vulnerable state. How to Prevent Virtualization Attacks: • Secure the Hypervisor – Use trusted hypervisors (e.g., VMware, Hyper - V, KVM) and apply regular security patches. • Enforce VM Isolation – Prevent one VM from accessing another using network segmentation and strict access controls. • Monitor and Audit Virtual Machines – Detect unauthorized activity or abnormal behavior. • Use Strong Authentication – Implement MFA for hypervisor and VM management access. • Restrict VM Snapshots – Limit who can create or restore snapshots to prevent rollback to a vulnerable state. Virtualization Attack Overlapping Trust Boundaries Overlapping Trust Boundaries occur when different entities (e.g., cloud providers, tenants, third - party services) share the same security perimeter , leading to trust assumptions that may introduce security risks. This is a critical concern in multi - tenant cloud environments where resources, infrastructure, or data are shared among different users or organizations. Key Risks of Overlapping Trust Boundaries: 1. Data Leakage Between Tenants – If one tenant’s security is compromised, another tenant's data might be exposed. 2. Cross - Tenant Attacks – Attackers could exploit misconfigurations or vulnerabilities in shared cloud services to gain access to another organization’s resources. 3. Weak Access Controls – If cloud providers do not enforce strict isolation, unauthorized users may gain access to sensitive systems. 4. Shared Responsibility Confusion – Cloud security is a shared responsibility between the provider and the customer. Misunderstandings can lead to gaps in protection.