1) Describe what is cloud computing? What types of application security solutions would you use for a cloud environment? Be specific.
`Hey,
Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.
Cloud computing is a type of computing that relies on shared computing resources rather than having local servers or personal devices to handle applications.
In its most simple description, cloud computing is taking services ("cloud services") and moving them outside an organization's firewall. Applications, storage and other services are accessed via the Web. The services are delivered and used over the Internet and are paid for by the cloud customer on an as-needed or pay-per-use business model.
1: Top-of-the-Line Perimeter Firewall
Most firewalls are very simple—they typically inspect a packet’s source and destination and that’s all. Some more advanced firewalls feature stable packet inspection, which checks the integrity of the file packets for stability issues prior to approving or rejecting the packet.
Top-of-the-line firewalls, such as Palo Alto Networks’ perimeter firewall solution will check the contents of the file packet to examine the type of file in addition to source, destination, and integrity. Such granularity is necessary to thwart the most advanced persistent threats out there today.
2: Intrusion Detection Systems with Event Logging
Numerous IT security compliance standards require businesses to have a means of tracking and recording intrusion attempts. So, for any business that wants to meet compliance standards such as PCI or HIPAA, using IDS event logging solutions is a must.
Some cloud providers offer monitoring for IDS, and will update their security rules for their firewalls to counter threat signals and malicious IP addresses that they detect for all of their cloud users.
3: Internal Firewalls for Individual Applications, and Databases
While having a strong perimeter firewall can block external attacks, internal attacks are still a major threat. Infrastructures that lack internal firewalls to restrict access to sensitive data and applications cannot be considered secure.
For example, a compromised employee user account can give hackers a way to bypass the perimeter firewall almost entirely. Or, a disgruntled ex-employee with a valid account may try to abuse their access privileges.
In either case, internal firewalls that keep individual applications, and databases separated can help limit the damage an attack from the inside can do.
4: Data-at-Rest Encryption
Encrypting the data that is stored on your cloud infrastructure can be an effective way to keep your most sensitive information from being accessed by the wrong party.
Strong encryption can minimize the risk of stolen data being used against your company or your customers/clients before you have a chance to alert them so they can take steps to protect their identities.
It’s better to have time to warn customers than to let hackers profit off of the stolen information immediately.
Kindly revert for any queries
Thanks.
Get Answers For Free
Most questions answered within 1 hours.