Cloud security
Introduction
Netflix, Uber, Airbnb, Swiggy β ella companies um cloud la run aaguranga. 92% of organizations cloud use pannuranga. But cloud la data store pannaa security enna aaagum? π€
Cloud security is different from traditional security. Un office la server iruntha nee physical ah lock pannalaam. Cloud la? Provider kitta infrastructure irukku, un kitta data and application irukku.
Indha article la cloud security fundamentals, shared responsibility, common mistakes, and best practices β ellam paapom! βοΈπ
Top Cloud Security Threats
Cloud Security Alliance (CSA) top threats:
1. Misconfiguration π§ β #1 Threat!
- Public S3 buckets, open security groups
- Default credentials, unnecessary permissions
- 2023 la 65% of cloud breaches misconfiguration dhaan!
2. Insecure APIs π
- Weak authentication on APIs
- No rate limiting
- Sensitive data in API responses
3. Lack of Cloud Security Architecture ποΈ
- Lift-and-shift without security redesign
- No network segmentation
- Missing monitoring and logging
4. Insufficient Identity Management π€
- Over-privileged IAM roles
- No MFA for admin accounts
- Shared credentials
5. Account Hijacking π
- Phishing for cloud console credentials
- Stolen API keys in GitHub repos
- Session hijacking
6. Insider Threats π΅οΈ
- Disgruntled employees
- Accidental data exposure
- Shadow IT (unapproved cloud services)
Real Breach: S3 Misconfiguration
Capital One Breach (2019) β 106 million customers affected! π±
What happened:
1. AWS WAF (Web Application Firewall) misconfigured
2. Attacker SSRF (Server-Side Request Forgery) exploit pannaru
3. EC2 instance metadata access pannaru
4. IAM role credentials steal pannaru
5. S3 buckets la irundhu massive data download
Root cause: Over-privileged IAM role + WAF misconfiguration
Lesson:
- β Least privilege IAM roles
- β IMDSv2 use pannunga (metadata protection)
- β Regular security audits
- β CSPM tools use panni misconfigurations detect pannunga
Cost: $300 million+ in fines and remediation! πΈ
Cloud IAM β Identity & Access
Cloud la IAM (Identity and Access Management) is king! π
AWS IAM Best Practices:
- π Root account use pannaadheenga β IAM users create pannunga
- π MFA enable pannunga β especially admin accounts
- π Least privilege β minimum permissions mattum
- π Key rotation β Access keys regularly rotate pannunga
- π CloudTrail β All API calls log pannunga
IAM Policy Example:
Idhu specific IP range la irundhu mattum S3 read access allow pannum.
Service Accounts / Roles:
- Applications ku long-term credentials venaam
- IAM Roles use pannunga (temporary credentials)
- Cross-account access ku Assume Role use pannunga
Cloud Network Security
Cloud la network security traditional la irundhu different:
VPC (Virtual Private Cloud) π:
- Un own isolated network in cloud
- Subnets: Public (internet access) vs Private (internal only)
- Route tables control traffic flow
Security Groups π‘οΈ:
- Instance-level firewall
- Stateful β return traffic automatic allow
- Default: All outbound allow, all inbound deny
NACLs (Network ACLs) π:
- Subnet-level firewall
- Stateless β explicit allow/deny both directions
- Additional layer of defense
Best Architecture:
Cloud Security Tools
Cloud security ku essential tools:
CSPM (Cloud Security Posture Management) π:
- Misconfigurations detect pannum
- Compliance check pannum
- Tools: Wiz, Prisma Cloud, AWS Security Hub
CWPP (Cloud Workload Protection) π»:
- Containers, VMs, serverless protect pannum
- Runtime protection
- Tools: Aqua Security, Sysdig, Lacework
CASB (Cloud Access Security Broker) π:
- Shadow IT detect pannum
- Data loss prevention
- Tools: Netskope, Zscaler, Microsoft Defender for Cloud Apps
CIEM (Cloud Infrastructure Entitlement Mgmt) π€:
- Over-privileged identities find pannum
- Least privilege enforce pannum
- Tools: CrowdStrike, Ermetic, Authomize
| Category | Purpose | Top Tool |
|---|---|---|
| CSPM | Misconfiguration | Wiz |
| CWPP | Workload protection | Aqua |
| CASB | SaaS security | Netskope |
| CIEM | Identity management | CrowdStrike |
Container & Kubernetes Security
Modern cloud apps containers la run aaguranga β security critical!
Container Security Checklist π:
- β Base images scan pannunga (vulnerabilities)
- β Minimal base images use pannunga (Alpine, distroless)
- β Run as non-root user
- β Read-only file systems
- β Resource limits set pannunga
- β Image signing and verification
Kubernetes Security βΈοΈ:
- RBAC (Role-Based Access Control) properly configure
- Network Policies β pod-to-pod traffic restrict
- Pod Security Standards β privileged containers avoid
- Secrets management β External secrets operator use
- Admission controllers β OPA/Gatekeeper
Cloud Logging & Monitoring
"You can't protect what you can't see!" ποΈ
AWS Security Logging:
- CloudTrail β All API calls log (who did what, when)
- VPC Flow Logs β Network traffic metadata
- GuardDuty β AI-powered threat detection
- Config β Resource configuration history
- SecurityHub β Centralized security findings
Azure Security Logging:
- Activity Log β Subscription-level events
- Diagnostic Settings β Resource logs
- Microsoft Sentinel β Cloud SIEM
- Defender for Cloud β Security recommendations
Must-Do Logging:
- π Enable CloudTrail in ALL regions
- π S3 access logging enable
- π VPC Flow Logs enable
- π Send all logs to central SIEM
- π Set up real-time alerts for critical events
- π Log retention β minimum 1 year for compliance
Secure Cloud Architecture
``` ββββββββββββββββββββββββββββββββββββββββββββββββββββ β Secure Cloud Architecture β ββββββββββββββββββββββββββββββββββββββββββββββββββββ€ β β β PERIMETER β β ββββββββββββββββββββββββββββββββββββββββ β β β CloudFlare/WAF β DDoS Protection β β β β API Gateway β Rate Limiting, Auth β β β βββββββββββββββββββββ¬βββββββββββββββββββ β β βΌ β β PUBLIC SUBNET β β ββββββββββββββββββββββββββββββββββββββββ β β β Load Balancer (ALB/NLB) β β β β Bastion Host (SSH jump box) β β β βββββββββββββββββββββ¬βββββββββββββββββββ β β βΌ β β PRIVATE SUBNET (App Tier) β β ββββββββββββββββββββββββββββββββββββββββ β β β ECS/EKS Containers β β β β Security Groups: port 443 only β β β β IAM Roles: least privilege β β β βββββββββββββββββββββ¬βββββββββββββββββββ β β βΌ β β PRIVATE SUBNET (Data Tier) β β ββββββββββββββββββββββββββββββββββββββββ β β β RDS (encrypted), ElastiCache β β β β No internet access! β β β β Security Groups: app tier only β β β ββββββββββββββββββββββββββββββββββββββββ β β β β MONITORING: CloudTrail + GuardDuty + SIEM β β SECRETS: AWS Secrets Manager / Vault β β BACKUP: Cross-region encrypted backups β ββββββββββββββββββββββββββββββββββββββββββββββββββββ ```
Cloud Compliance
π Compliance Frameworks cloud la follow pannanum:
- SOC 2 β Security, availability, processing integrity
- ISO 27001 β Information security management
- PCI DSS β Credit card data handle pannaa mandatory
- HIPAA β Healthcare data (US)
- GDPR β European user data
- India DPDP Act β Indian personal data protection
β οΈ Remember: Cloud provider certifications un compliance guarantee aagaadhu! Provider infrastructure certified, but un application and data handling nee separately prove pannanum.
β Use AWS Artifact, Azure Compliance Manager for reports.
Cloud Security Best Practices
π Top 10 Cloud Security Best Practices:
1. π MFA enable for ALL accounts (especially root/admin)
2. π Least privilege IAM policies
3. π Encrypt data at rest AND in transit
4. π Private subnets for sensitive workloads
5. π Enable ALL logging (CloudTrail, Flow Logs)
6. π Use CSPM for continuous monitoring
7. π Automate security with IaC (Terraform + tfsec)
8. π¦ Scan container images before deployment
9. ποΈ Use secrets management (no hardcoded keys!)
10. π§ͺ Regular penetration testing
Start with #1 and #2 β maximum impact, minimum effort! πͺ
Summary
Key Takeaways π―:
- Shared Responsibility β Provider infra, you data + config
- Misconfiguration = #1 cloud threat β automate checks!
- IAM = Most critical β least privilege, MFA, role-based
- Network = VPC, subnets, security groups layered defense
- Logging = Enable everything, centralize in SIEM
- Tools = CSPM + CWPP + CASB for comprehensive coverage
- Compliance = Your responsibility, not just provider's
Cloud security is a journey, not a destination. Continuous monitoring and improvement venum! βοΈπ
π Mini Challenge
Challenge: Secure AWS/Azure Account Setup
2-3 weeks time la cloud security architecture setup pannunga:
- Cloud Account Hardening β AWS free tier account create pannunga. Root account MFA enable pannunga, IAM users create pannunga (least privilege roles). Access keys rotate pannunga regularly.
- S3 Bucket Security β S3 bucket create pannunga, public access block enable pannunga. Server-side encryption configure pannunga. Bucket policies restrict pannunga (specific IPs, roles mattum access).
- VPC Configuration β VPC create pannunga, subnets (public/private) setup pannunga. Security groups configure pannunga (inbound/outbound rules). Network ACLs layer add pannunga.
- CloudTrail & CloudWatch β CloudTrail enable pannunga (audit logging). CloudWatch dashboards setup pannunga. Suspicious activities detect panna alerts create pannunga.
- Secrets Management β AWS Secrets Manager use panni database credentials, API keys store pannunga. Rotation policies configure pannunga.
- Compliance Check β AWS Config enable pannunga. Misconfigurations detect panna rules setup pannunga. Compliance reports generate pannunga.
Certificate: Nee cloud security architect! βοΈπ
Interview Questions
Q1: Shared responsibility model β AWS/Azure perspective la?
A: AWS = infrastructure security (physical, network, host). Customer = data security, application security, IAM, OS patching, encryption. Clear responsibility boundary. Customer misconception β AWS secure illanu think pannum, but misconfiguration risk high.
Q2: Cloud misconfiguration β most common issues?
A: Public S3 buckets, overly permissive IAM roles, unencrypted data, default credentials, missing MFA. Automated scanning tools (CSPM) identify panni fix pannunga important.
Q3: Multi-cloud strategy β security implications?
A: Each cloud platform different security tooling. Consistency maintain panna challenging. Centralized SIEM, unified IAM solution, compliance tracking across clouds β setup required. Cost increase possible.
Q4: Containers (Docker/Kubernetes) security?
A: Image scanning (vulnerabilities check), registry access control, runtime security (behavior monitoring), secrets management, network policies. Orchestration platform (Kubernetes) secure configuration critical.
Q5: Cloud cost optimization β security impact?
A: Cost-cutting = security compromise risk. Reserved instances, auto-scaling optimize panna dapat. But insufficient monitoring resources, security tools disable panna etc safety risk. Balance important.
Frequently Asked Questions
Shared Responsibility Model la data security yaaru responsibility?