This Cloud Security tutorial shall first address the question whether Cloud Security is really a concern among companies which are making a move to the cloud. The tutorial also discusses the process of troubleshooting a problem in the cloud. This tutorial is ideal for people who are planning to make a career shift in the cloud industry. Below are the topics covered in this tutorial:
1. Why and What of Cloud Security?
2. Private, Public or Hybrid
3. Is Cloud Security really a concern?
4. How secure should you make your application?
5. Troubleshooting a threat in the Cloud
6. Cloud Security in AWS
2. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Agenda for Today’s Session
Why and What of Cloud Security?
Public, Private or Hybrid?
Is Cloud Security really a concern?
How secure should you make your application?
Troubleshooting a threat in the Cloud
Cloud Security in AWS
5. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Why Cloud Security?
Let’s talk about some security breaches in the past:
LinkedIn
Sony iCloud
6.5 M usernames and passwords were hacked from linkedin database and published to public sites.
6. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Why Cloud Security?
Let’s talk about some security breaches in the past:
Linkedin
Sony iCloud
Sony experienced the most aggressive cyber attack in history where in their financials, movie projects and much
more was published publicly by hackers
7. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Why Cloud Security?
Let’s talk about some security breaches in the past:
Linkedin
Sony iCloud
iCloud faced a similar hack wherein private images of users from their database were made public.
9. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
What is Cloud Security?
It is the use of latest technologies and security techniques to protect your data, applications and infrastructure associated with cloud
computing .
19. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
How secure should you make your application?
It is science because you have to come up with new ways of securing your application.
29. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Cloud Security
Monitoring Data Gaining Visibility Managing Access
Using machine learning algorithms you can set your monitoring application to flag an event.
30. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Cloud Security
Monitoring Data Gaining Visibility Managing Access
Once you get to know something wrong is going on , you would want to know when and where.
31. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Cloud Security
Monitoring Data Gaining Visibility Managing Access
With managing access you will have a list of users who have access, and hence wipe the culprit out of the system.
34. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Cloud Security
AWS Cloudwatch
• Monitor EC2 and other AWS resources
• The ability to monitor custom metrics
• Monitor and store logs
• Set Alarms
• View Graphs and Statistics
• Monitor and React to Resource Changes
36. www.edureka.co/cloudcomputingEDUREKA AWS ARCHITECT CERTIFICATION TRAINING
Cloud Security
AWS CloudTrail
• CloudTrail is a logging service which can
be used to log the history of API calls.
• It can also be used to identify which user
from AWS Management Console
requested the particular service.
• Taking reference from our example, this is
the tool from where you will identify the
notorious “hacker”.