Cloud Security

Cloud Security is a specialized domain of computer science that encompasses the policies, technologies, and controls deployed to protect data, applications, and infrastructure hosted in a cloud computing environment. It operates on a crucial "shared responsibility model," where the cloud provider is responsible for the security *of* the cloud (e.g., the physical hardware and network), while the customer is responsible for security *in* the cloud, which includes managing access, configuring services correctly, and protecting their own data. Key practices involve identity and access management (IAM), data encryption, network segmentation, and continuous monitoring to defend against threats, ensure data privacy, and maintain regulatory compliance.

  1. Foundations of Cloud Security
    1. Understanding Cloud Computing
      1. Essential Characteristics
        1. On-Demand Self-Service
          1. Broad Network Access
            1. Resource Pooling
              1. Rapid Elasticity
                1. Measured Service
                2. Service Models
                  1. Infrastructure as a Service (IaaS)
                    1. Platform as a Service (PaaS)
                      1. Software as a Service (SaaS)
                        1. Functions as a Service (FaaS)
                        2. Deployment Models
                          1. Public Cloud
                            1. Private Cloud
                              1. Hybrid Cloud
                                1. Multi-Cloud
                                  1. Community Cloud
                                2. Cloud Security Fundamentals
                                  1. Defining Cloud Security
                                    1. Cloud Security Objectives
                                      1. Confidentiality
                                        1. Integrity
                                          1. Availability
                                          2. Cloud Security Challenges
                                            1. Loss of Physical Control
                                              1. Shared Infrastructure Risks
                                                1. Vendor Lock-in Concerns
                                                  1. Compliance Complexity
                                                2. Shared Responsibility Model
                                                  1. Core Principles
                                                    1. Provider Responsibilities
                                                      1. Physical Infrastructure Security
                                                        1. Host Operating System Patching
                                                          1. Network Controls
                                                            1. Hypervisor Security
                                                            2. Customer Responsibilities
                                                              1. Guest Operating System Updates
                                                                1. Application-Level Controls
                                                                  1. Identity and Access Management
                                                                    1. Data Encryption
                                                                    2. Responsibility Variations by Service Model
                                                                      1. IaaS Responsibility Matrix
                                                                        1. PaaS Responsibility Matrix
                                                                          1. SaaS Responsibility Matrix
                                                                        2. Cloud Security vs Traditional Security
                                                                          1. Architectural Differences
                                                                            1. Control Mechanisms
                                                                              1. Visibility Challenges
                                                                                1. New Attack Vectors
                                                                                  1. Security Tool Adaptations