Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • Data
  • Protecting Cloud Data
  • Best Practice
  • Network
  • Provider Responsibilities
  • Customer Responsibilities
  • Additional Services
  • Best Practice
  • Compute
  • Platform Compute Protection
  • Confidential Computing
  1. Sky
  2. Cloud Security & Regulatory Compliance

Resource Protection

Data

Types of Cloud Data: Files, Relational Database (Managed, Proprietary, IaaS), Non-Relational Database, Big Data, Sensitive Data

Protecting Cloud Data

At Rest

  • Implement mechanisms to ensure confidentiality, integrity, and availability when data is not actively accessed or transmitted.

  • Network Controls and Permissions

  • Encryption: Use encryption to secure data.

  • Hardware Security Modules (HSM): For added protection.

  • Backup and Replication: Ensure data can be restored and maintained.

In Transit

  • Implement security measures to protect data transmitted across networks.

  • Encryption: Always use encryption through secure communication protocols.

  • Hardware Security Modules (HSM): Use for secure key management.

Best Practice

  • Access Controls: Limit access to resources, data, and networks.

  • Encryption: Apply encryption at rest, in transit, and end-to-end.

  • Backup and Recovery: Regularly back up data and have recovery plans in place.

  • Regular Security Audits and Assessments: Perform regular checks to ensure security measures are effective.

Network

Provider Responsibilities

  • Infrastructure Protection: Includes DDoS protection and general threat management for both virtualized and physical infrastructure.

  • Physical Connection: The provider manages the physical network connectivity between different customers' cloud resources.

Customer Responsibilities

  • VPC (Virtual Private Cloud)

  • Network ACLs: Control traffic at the subnet level.

  • Security Groups: Manage traffic at the EC2 instance level.

  • PrivateLink: Establish private connectivity between VPCs and supported services.

  • Network Security Groups (NSG): Manage security at the subnet and instance levels.

  • Private Endpoint: Securely connect to Azure services.

  • Firewall Rules: Control traffic at the VPC, subnet, and VM levels.

  • VPC Service Controls: Define security perimeters around cloud services.

Additional Services

  • AWS: Shield, Web Application Firewall (WAF), GuardDuty.

  • Azure: Firewall, Application Gateway, FrontDoor.

  • Google Cloud: Cloud Armor.

Best Practice

  • Utilize cloud provider tools and minimize the public attack surface.

  • Review and adjust firewall rules; avoid opening ports globally.

  • Monitor network activity, set up alerts for abnormal usage, and maintain an incident response plan.

Compute

  • Patch Management: Regular updates to operating systems and services.

  • Automated OS Patching: Available for IaaS on platforms like AWS and Azure.

  • Resource Protection: Securing resources against unauthorized access and threats.

  • OS Hardening: Configure operating systems to run only required services with secure settings.

  • Monitoring: Utilize logs for tracking and detecting issues.

  • Attack Surface Minimization: Block unnecessary ports and reduce potential vulnerabilities.

  • Availability: Deploy multiple instances to ensure high availability and fault tolerance.

Platform Compute Protection

  • Provider Responsibility: The cloud provider secures the services and operating systems running the applications.

  • Custom Options: Customers can configure additional security settings for their PaaS environments.

  • The cloud service provider (CSP) handles patching and updates.

Confidential Computing

Enables the execution of workloads while keeping data and code confidential from the cloud provider, other tenants, and potential attackers.

Requirements: Requires specific compute instance sizes and hardware to ensure secure and isolated execution environments (application enclaves).

Built-in monitoring features are provided by the cloud platform, with options to use third-party monitoring tools as well.

PreviousCloud Security & Regulatory ComplianceNextICCA: Cloud Security & Regulatory Compliance

Last updated 9 months ago

🥃
Data encryption options  |  Cloud Storage  |  Google CloudGoogle Cloud
Protecting data with encryption - Amazon Simple Storage ServiceAmazon Simple Storage Service
Logo
Azure Storage encryption for data at restMicrosoftLearn
Logo
Azure Confidential Computing – Protect Data In Use | Microsoft AzureMicrosoft Azure
Healthcare platform confidential computing - Azure Example ScenariosMicrosoftLearn
Logo
Azure Monitor overview - Azure MonitorMicrosoftLearn
Logo
Logo
Logo