INE Training Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • INE Training Notes
  • Courses
    • eJPT - PTSv2
      • 📒Penetration Testing Prerequisites
        • Introduction
        • Networking
        • Web Applications
      • 📒1. Assessment Methodologies & Auditing
        • Information Gathering
        • Footprinting & Scanning
        • Enumeration
          • 🔬SMB Enum
          • 🔬FTP Enum
          • 🔬SSH Enum
          • 🔬HTTP Enum
          • 🔬MYSQL Enum
          • 🔬SMTP Enum
        • Vulnerability Assessment
        • Auditing Fundamentals
      • 📒2. Host & Network Penetration Testing
        • System/Host Based Attacks
          • 🪟Windows Attacks
            • 🔬IIS - WebDAV
            • 🔬SMB - PsExec
            • 🔬RDP
            • 🔬WinRM
            • 🔬Win Kernel Privesc
            • 🔬UAC Bypass
            • 🔬Access Token
            • 🔬Alternate Data Stream
            • 🔬Credentials Dumping
          • 🐧Linux Attacks
            • 🔬Bash
            • 🔬FTP
            • 🔬SSH
            • 🔬SAMBA
            • 🔬Cron Jobs
            • 🔬SUID
            • 🔬Hashes Dumping
        • Network Based Attacks
          • 🔬Tshark, ARP, WiFi
        • The Metasploit Framework (MSF)
          • 🔬HFS - MSF Exploit
          • 🔬Tomcat - MSF Exploit
          • 🔬FTP - MSF Exploit
          • 🔬Samba - MSF Exploit
          • 🔬SSH - MSF Exploit
          • 🔬SMTP - MSF Exploit
          • 🔬Meterpreter - MSF
          • 🔬Win Post Exploitation - MSF
          • 🔬Linux Post Exploitation - MSF
        • Exploitation
          • 🔬Fixing Exploits - HFS
          • 🔬Win Workflow Platform - MSF
          • 🔬Win Black Box Pentest
          • 🔬Linux Black Box Pentest
        • Post-Exploitation
          • 🔬Windows Post-Exploitation
          • 🔬Windows Privilege Escalation
          • 🔬Windows Persistence
          • 🔬Linux Post-Exploitation
          • 🔬Linux Privilege Escalation
          • 🔬Linux Persistence
          • 🔬Cracking Hashes
          • 🔬Pivoting
        • Social Engineering
      • 📒3. Web Application Penetration Testing
        • Intro to Web App Pentesting
          • 🔬HTTP Enumeration
          • 🔬Web App Scanning
          • 🔬Web App Attacks
      • 🔬Exam Preparation - Labs
        • PTSv1 Prerequisites Labs
          • 🔬HTTP(S) Traffic Sniffing
          • 🔬Find the Secret Server
          • 🔬Data Exfiltration
          • 🔬Burp Suite Basics - Directory Enumeration
        • PTSv2 Practice Labs
      • 🌐eJPT References
      • 📜eJPT Cheat Sheet
    • ICCA
      • 📒1. Cloud Foundations
      • 📒2. Cloud Management Concepts
      • 📒3. Cloud Identity, Security, and Compliance
      • 🌐Icca References
    • eMAPT
      • 📒Android
      • 📒iOS
      • 🌐eMAPT References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Management Foundations
  • Management Responsibility
  • Security Responsibility
  • Resiliency Responsibility
  • Workload Responsibility
  • Resource Management
  • AWS
  • Azure
  • Monitoring & Alerts
  • Identity & Access Management

Was this helpful?

Edit on GitHub
  1. Courses
  2. ICCA

📒2. Cloud Management Concepts

Previous📒1. Cloud FoundationsNext📒3. Cloud Identity, Security, and Compliance

Last updated 1 year ago

Was this helpful?

📕 Learning Objectives

  • Basics aspects of managing cloud resources and related tasks

  • Cloud access control fundamentals

Management Foundations

refers to the distribution of security and management responsibilities between cloud service providers and cloud customers. Both the CSP and the customer have distinct roles and responsibilities to ensure the security, availability and proper management of the cloud environment and its resources.

Management Responsibility

The CSP will always be responsible for the physical facility and infrastructure, virtualization and cloud management plane.

The customer is always responsible for identities and subscription access.

  • Customer Responsibility e.g.

    • IaaS: Virtual machine (O.S.), Services, Workload (Application, Data, Service configuration)

    • PaaS: Workload (Application, Data, Service configuration)

    • SaaS: Customizations (Data, Service configuration, Usage, Identity, Access, Good practices & Compliance)

Security Responsibility

CSP is responsible for

  • Physical, Infrastructure, Platform security

  • Identity system security

  • Standards compliance

The customer is responsible for

  • Identity, Data, Application security (good practices)

  • Standards compliance

Resiliency Responsibility

CSP responsibility

  • Infrastructure Resiliency, Uptime service level agreement (SLAs)

  • Service Availability, Disaster Recovery

Customer responsibility

  • Build resilient applications and integrate CSP built-in availability and resiliency

  • Implement data backup, replication, business continuity planning

Workload Responsibility

CSP is responsible for

  • SaaS out-of-the-box workload failures (with no customization)

📌 Effective software lifecycle management techniques are essential.

The customer is responsible for

  • Workload configuration

  • App and Data security

  • Monitoring and Performance

Resource Management

Control Plane

  • The cloud is controlled by the management plane, which relates to the management and control of cloud infrastructure and services.

    • Web-based console

    • REST APIs

    • Command line tool

Data Plane

  • The Data plane is the cloud workload

    • VMs, Data, Applications, Services

A workload, a custom application, needs maintaining of its resources like code base, data and security.

Monitoring

  • Provided built-in cloud tools to monitor spending, performance, automated alerting & actions

    • Applications need monitoring

Change Management in the cloud refers to the process of effectively managing and controlling changes to cloud-based systems, services and infrastructure, by implementing procedures and policies to ensure change planning, testing, deployment and so on.

  • Governance is critical- relevant compliance requirements, industry regulations, and organizational policies

  • Documentation and tracking

AWS

  • RDS - Create a database (Platform service) - Templates & Settings

    • Connectivity & Security, Monitoring, Logs, Configuration, Maintenance

Azure

Monitoring & Alerts

Cloud monitoring is the process of observing, gathering and analyzing data from cloud-based applications, services and resources to guarantee their overall performance, availability, security and health.

It involves the use of monitoring tools, metrics and alerts to track and assess the behavior and state of various components within the cloud environment.

  • Resource Monitoring

  • System Monitoring frameworks

Proactive Resource Management

  • Cloud Automation & Alerting

Identity & Access Management

Cloud Identity and Access Management (IAM) refers to the set of practices, policies and tools used to manage user identities, control access to cloud resources and enforce security measures within a cloud computing environment.

  • management of user authentication, authorization, permissions

❗ Root user - absolute full rights on everything

Federated user - authenticated and authorized to access resources in a system or application through a trusted external identity provider.

  • Users, Groups, Roles, Policies

  • Federated Users

  • Policies (User, Role, Resource, Condition)

  • Users, Groups, Roles

  • Federated Users

  • Users, Groups, Permissions

  • Federated Users

  • Policies grant permissions (Effect, Action, Resources, Conditions)


🔗

includes the tasks and considerations involved in deploying, configuring, monitoring and securing the specific applications, services and data that make up the workload.

🔗

Azure PowerShell script as a (template JSON files)

🔗

🔗

🔗

Third parties: , ,

🔗

🔗

🔗

AWS Shared Responsibility Model for Resiliency
Workload responsibility
Resource Management Models in Cloud Computing - geeksforgeeks.org
template
Azure Monitor
AWS CloudWatch
Google Cloud Monitoring
Splunk
PRTG
Nagios
Google IAM
Azure AD
AWS IAM
Cloud shared responsibility
Defending the Whole, IaaS, PaaS, and SaaS from Mark Nunnikhoven
AWS responsibility "Security of the Cloud"
GCP IAM permission management
Azure AD - IAM
AWS IAM
AWS IAM