CHAPTER 7

Cloud security

Cloud computing allows organizations to deliver business-critical applications, services, and resources to their customers, partners, or employees over the internet on-demand. In other words, there's no need to maintain resources physically anymore. Whenever you access files or services from a computer through the internet, you are accessing the cloud.

Moving to the cloud can help enterprises enhance security, streamline operations, and cut costs. Enterprises can greatly benefit from implementing cloud computing services like software as a service (SaaS), infrastructure as a service (IaaS), platform as a service (PaaS), and communications as a service (CaaS), which can digitally deliver resources and software programs.

Using public cloud platforms like Amazon Web Services and Azure, enterprises can host web applications, run web servers, set up databases, and provide many other solutions online.

What is cloud security?

Cloud security is all about protecting the resources hosted on cloud platforms. These resources include applications, infrastructures, or databases. Enterprises can secure their data on the cloud by employing a combination of rules, techniques, and technologies to monitor and protect the data that enters and exits the cloud.

Cloud service providers implement safety measures like encryption, intrusion detection, advanced firewalls, event logging, compliance to security regulations, and physical security in data centers to maintain security in the cloud. They equip themselves with the latest technologies and experienced cybersecurity experts to offer their customers top-of-the-line data security. Further, consumers can choose additional cybersecurity measures like a web application firewall (WAF), identity and access management (IAM), etc. as additional security measures if needed.

Who is responsible for ensuring cloud security?

Cloud service providers and consumers are equally responsible for security in the cloud. While cloud service providers usually provide multiple layers of data security such as encryption, security groups, and multi-factor authentication, consumers are responsible for deploying, configuring, and maintaining these security systems.

Most cloud-based data breaches happen due to a lack of security awareness and human error. There are a few things that enterprises can do to ensure sensitive data remains secure on the cloud, such as monitoring insider behavior, using strong passwords, and backing up data locally.

 

Chapter 2

Different functions of SIEM

Learn about the different capabilities of an ideal SIEM solution.

 

Chapter 3

Component of SIEM Architecture

 

Chapter 4

Log Management

Learn about log management and why it is necessary.

 

Chapter 5

Incident Management

Learn about security incidents and how they are handled.

 

Chapter 6

Threat intelligence

Learn about security audits, real-time monitoring, and correlation and how they are useful to mitigate cyberthreats.

 

Chapter 7

Cloud security

Learn why it is important to secure data that is stored online on cloud computing platforms.

 

Chapter 8

User Entity and Behavior Analytics

Learn why UEBA is critical to maximize cybersecurity.

 

Chapter 9

Data protection

Learn why it is important to adhere to compliance regulations.