Cloud Computing Security

Cloud Computing Security

In the past, companies had to buy massive, expensive physical servers and store them in secure rooms inside their offices. Today, companies rent virtual servers and software hosted over the internet by massive providers like Amazon (AWS), Microsoft (Azure), and Google (GCP). This is Cloud Computing.

While the cloud is incredibly scalable and convenient, storing sensitive data on someone else's server introduces completely unique cybersecurity challenges.


The 3 Models of Cloud Computing

Security strategies heavily depend on which cloud model a company uses:

  1. IaaS (Infrastructure as a Service): You rent the raw virtual hardware (servers, networking). Example: AWS EC2. You have maximum control, but you are fully responsible for installing and securing the operating system.
  2. PaaS (Platform as a Service): You rent a ready-made environment to build and host your own apps. Example: Heroku. The provider handles the servers and OS, you just secure your app's code.
  3. SaaS (Software as a Service): You rent a completely finished, ready-to-use application over the web. Example: Google Workspace, Salesforce. The provider handles all technical security; you only need to secure user access (strong passwords and MFA).

The Shared Responsibility Model

A massive misconception is that "because it's in the cloud, Amazon/Google handles all the security." This is false. Security in the cloud operates on a Shared Responsibility Model:

The Shared Responsibility Model You Manage Provider Manages On-Premises IaaS PaaS SaaS Data & Access Applications Operating System Virtualization Servers Storage Networking

Major Cloud Security Threats


Deep Dive: Identity and Access Management (IAM)

In the physical world, your network is protected by physical walls and a locked front door. In the cloud, the "front door" is entirely virtual, meaning Identity is the new perimeter.

To secure this, organizations use IAM (Identity and Access Management). This is a central framework of policies and technologies ensuring that the right users have the appropriate access to cloud resources.


Knowledge Check

?

Under the Shared Responsibility Model, who is primarily responsible for configuring proper data encryption and strong passwords for applications running IN the cloud?