Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • What is?
  • Web-Based Cloud Management Tools
  • Command-Line Based Cloud Management Tools
  • API-Based Cloud Management Tools
  • Cost Management
  • Billing, Monitoring & Optimization
  • Calculators
  • Support & SLAs
  • Cloud SLAs
  • Support
  1. Sky

Cloud Management

PreviousCloud BasicsNextShared Responsibility Model

Last updated 9 months ago

What is?

A cloud management tool helps organizations efficiently manage, monitor, and optimize their cloud infrastructure and services. It provides features for resource provisioning, performance monitoring, cost management, and automation.

Mainly there are 3 types of cloud management tools -

Web-Based Cloud Management Tools

Offer a graphical user interface (GUI) for managing cloud resources through a web browser, providing an intuitive way to configure, monitor, and control cloud services.

Command-Line Based Cloud Management Tools

Allow users to interact with cloud services via command-line interfaces (CLI), offering powerful scripting and automation capabilities for managing resources.

API-Based Cloud Management Tools

Provide programmatic access to cloud services via APIs, enabling developers to integrate cloud management into applications and automate tasks through code.

#Example: Listing Objects in an S3 Bucket Using AWS SDK for Python (Boto3)

import boto3

# Create an S3 client
s3_client = boto3.client('s3')

# List objects in a specified S3 bucket
response = s3_client.list_objects_v2(Bucket='your-bucket-name')

# Print the object keys
for obj in response.get('Contents', []):
    print(obj['Key'])

Cloud Shell: Provides a browser-based terminal or shell environment within the cloud platform, allowing users to manage resources and perform operations directly from the cloud provider's environment.

Cost Management

Cloud pricing models determine how organizations are charged for using cloud services. The main models include:

  • Pay-As-You-Go (Consumption-Based): Charges based on actual usage of resources, such as storage, compute time, or data transfer. You pay only for what you use, with no upfront costs.

  • Reserved Instances: Allows you to reserve cloud resources (e.g., virtual machines) for a fixed term (e.g., 1 or 3 years) at a discounted rate compared to on-demand pricing. This model is useful for predictable workloads.

  • Spot Instances (or Preemptible VMs): Provides access to spare computing capacity at a lower cost compared to on-demand instances. However, these instances can be terminated by the cloud provider with little notice.

  • Savings Plans: Offers flexible pricing by committing to a certain amount of usage (e.g., compute resources) over a period (e.g., 1 or 3 years) in exchange for lower rates. It provides more flexibility than reserved instances.

  • Free Tier: Many cloud providers offer a free tier with limited resources or usage to allow users to experiment or use basic services without incurring costs.

  • Subscription-Based: Charges based on a subscription model where you pay a fixed fee for access to a set of services or features for a specified period.

  • Licensing-Based: Some cloud services involve licensing fees for software or applications that are billed separately from the cloud infrastructure usage.

Some other points that needs to be looked at -

  • Data Transfer: Refers to the movement of data between different locations, such as between cloud services and end-users, or between cloud regions. Cloud providers may charge for data transferred out of their services.

  • Egress Cost: Specifically refers to the cost associated with transferring data out of the cloud provider's network to the internet or another external destination. Egress costs can vary based on the amount of data and destination.

  • Marketplace Billing: Involves charges related to third-party software or services purchased through a cloud provider’s marketplace. These additional costs are for vendor-supported applications or services that integrate with the cloud environment, often billed separately from the core cloud infrastructure costs.

Billing, Monitoring & Optimization

Billing

There are different billing entities (what is being billed), with a billing cycle that is generally a month. Optimize billing rate with billing management tools.

  • Billing Entities: Refers to the various components or services for which you are billed, such as compute instances, storage, data transfer, and additional third-party applications. Each entity has its own pricing structure and billing metrics.

  • Billing Cycle: Typically, cloud billing is on a monthly cycle, where charges are accumulated over the month and billed at the end of the billing period. This cycle allows for regular review and adjustment of usage and costs.

  • Optimize Billing Rate: Billing management tools help optimize costs by providing insights into usage patterns, identifying areas for cost savings, and offering recommendations for optimizing resource allocation. These tools can help manage and reduce overall cloud spending by making informed decisions and adjustments.

Monitoring

  • Budgets: Setting budgets in cloud management tools allows you to allocate a specific amount of money for cloud usage over a given period. It helps track spending against predefined limits and ensures you stay within financial constraints.

  • Alerts: Alerts are notifications triggered when spending approaches or exceeds budget thresholds. They provide real-time updates on unexpected charges or cost spikes, enabling timely intervention to manage and control cloud expenses.

Optimization

  • Agents (Azure Advisors, Google Recommenders, AWS Cost Anomaly Detection): These tools analyze cloud usage patterns and provide recommendations to optimize costs. They suggest cost-cutting measures, help with sizing adjustments, and recommend autoscaling strategies to match demand and reduce waste.

  • Serverless Options: Serverless computing allows you to run applications without managing servers, often reducing costs by charging only for actual usage rather than pre-allocated resources.

  • Long-Term Commitments: Committing to long-term use of cloud resources, such as through reserved instances or savings plans, can offer significant discounts compared to on-demand pricing. This approach helps in reducing overall costs by securing lower rates for committed usage.

Calculators

Support & SLAs

Cloud SLAs

  • Customer Responsibility: In a cloud SLA, the customer is typically responsible for managing the workloads and services they deploy within the cloud environment. This includes ensuring their applications and data are properly configured and maintained.

  • Contractual Agreement: An SLA is a formal contract between the service provider and the customer that outlines the expected level of service. It specifies performance metrics, such as uptime guarantees, response times, and support levels, along with how these metrics will be measured and enforced.

Support

Cloud support encompasses the help and services provided by the Cloud Service Provider (CSP) to assist customers in effectively managing cloud resources. This includes:

  • Technical Assistance: Support with technical issues and troubleshooting.

  • Issue Resolution: Addressing and resolving problems that arise with cloud services.

  • Service Monitoring: Monitoring cloud resources to ensure optimal performance and availability.

  • Configuration and Deployment Assistance: Help with setting up and configuring cloud resources and services.

  • Knowledge Base and Documentation: Access to guides, FAQs, and documentation for self-service support.

  • SLAs: Service Level Agreements outlining support response times and resolution commitments.

  • Service Upgrades: Assistance with updating and upgrading cloud services.

  • Training: Providing education and training on effectively using cloud resources.

🥃
Amazon Web Services Sign-In
Logo
Microsoft Azure Portal | Microsoft Azure
Logo
https://console.cloud.google.com/console.cloud.google.com
Installing or updating the latest version of the AWS CLI - AWS Command Line InterfaceAWS Command Line Interface
Installing the AWS Tools for PowerShell - AWS Tools for PowerShellAWS Tools for PowerShell
How to install the Azure CLIMicrosoftLearn
Choose the right Azure command-line tool - Azure CLIMicrosoftLearn
Cloud APIs | Google CloudGoogle Cloud
What is Amazon API Gateway? - Amazon API GatewayAmazon API Gateway
API Management – Manage APIs | Microsoft Azure
What is AWS CloudShell? - AWS CloudShellAWS CloudShell
Azure Cloud Shell overviewMicrosoftLearn
Cloud Shell  |  Google CloudGoogle Cloud
Pricing Calculator | Microsoft AzureMicrosoft Azure
AWS Pricing Calculator
Google Cloud Pricing Calculator
AWS Service Level AgreementsAmazon Web Services, Inc.
Licensing Documents
Google Cloud Platform Service Level Agreements | Google CloudGoogle Cloud
Pricing for AWS Support Plans | Starting at $29 Per Month | AWS SupportAmazon Web Services, Inc.
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Cloud SDK - Libraries and Command Line Tools | Google CloudGoogle Cloud
Azure Support Plans Comparison | Microsoft Azure
Customer Care | Google CloudGoogle Cloud
Logo
Logo
Logo
Logo
Quickstart  |  Cloud Tools for PowerShell  |  Google CloudGoogle Cloud
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo