Open In App

Infrastructure Security at the Host Level in Cloud Computing

Pre-requisite: Cloud Computing

In this article, we’ll discuss the infrastructure security at the host level in cloud computing followed by the introduction of the topic itself then moving towards the host security at various delivery models such as System as a Service(SaaS), Platform as a Service(Paas) and Infrastructure as a service(Iaas) after which we will end this article by discussing the Virtual server Security.



During the review process of host security and assessing risks, one should always consider the context of cloud service delivery models(IaaS, PaaS, and SaaS) and various deployment models(Public, Private, and Hybrid). As we know there are no new security threats to hosts specific to cloud computing apart from the virtualization security threats like virtual machine escape, system configuration drift, and insider threats.

The elastic nature of cloud computing can bring new operation challenges from a security management perspective. Therefore managing the vulnerabilities and patches is tougher than running a scan, as the rates of changes are much higher than in traditional data centers.



SaaS and Paas Host Security

Generally, the cloud service providers do not share information regarding their host platforms, hosts OS, and the processes that are in place to secure the hosts, as hackers might exploit that information when they are trying to break into the cloud services. Hence, in the context of System as a service(SaaS) or Platform as a service(PaaS) cloud services security of the host should be non-transparent with the customers and the responsibility of securing the host is confined to the cloud service providers.

Infrastructure as a Service(IaaS) Host Security

The customers of Infrastructure as a Service(IaaS) are primarily responsible for securing the hosts in the cloud, Infrastructure as a Service(IaaS) employs virtualization at the host layer, IaaS host security can be categorized as follows: 

Virtualization Software Security

It provides customers to create and terminate virtual instances. Virtualization can be achieved by using virtualization models such as:-OS-level virtualization, paravirtualization, or hardware-based virtualization. In public, IaaS application customers do not have access to this software layer as it is managed by cloud service providers.

Customer Guest OS or Virtual Server Security

The virtual instance of an operating system is placed above the virtualization layer and is visible to customers from the internet. Customers have full access to virtual servers. For example:- various versions of Linux, Microsoft, and Solaris are available in amazon’s aws for creating an instance.

Virtual Server Security

The customers of Infrastructure as a Service(IaaS) have full access to the virtualized guest virtual machines that are hosted and isolated from each other by hypervisor technology. Thus, customers are responsible for the security management of the guest virtual machines. A public Infrastructure as a Service(IaaS) offers a web service API to perform management functions such as provisioning, decommissioning, and duplication of virtual servers on the IaaS platform itself.

These system management functions can provide elasticity for resources to grow or shrink according to the demands. Network access mitigation steps to be taken for restricting access to virtual instances as the virtual servers are available to anyone on the internet. Conventionally, the cloud service providers block all ports except port 22(secure shell or SSH) for accessing the virtual servers instances.

Host Security Threats in the Public IaaS

Securing Virtual Servers

Ways to Secure the Virtual Servers in the Cloud require Operational Security procedures as:-

Article Tags :