JEDI in the Cloud

On a windy and blistering rainy day, you are expected to feel gloomy? A few lines of codes are demonstrative of statement:

def weather (windy, raining):
if windy == True and raining == True:
return “You are expected to feel gloomy!”
elif windy == False and raining == False:
return “JEDI in the Cloud”
else:
return “What is cloud computing?”
print(weather(True,False))

Cloud computing provides various services over the Internet, which is best known as the cloud. The cloud has great power! Referencing Peter Parker’s Principle according to Wikipedia, “With great power comes great responsibility.” Three traditional cloud deployment models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Of the three traditional cloud deployment models, SaaS is an effective service that is managed in totality by cloud vendors.  Similarly, Security as a Service (SECaaS) is a service, whereas a cloud vendor security infrastructure is utilized.  Organizations may retain control of their operating system with IaaS services.  PaaS clients retain control of their data and applications.  Cost reduction, speed, elasticity, performance, reliability, privacy and security are some common criteria for evaluating cloud deployment. Department of Defense (DoD) had published The Cloud Computing Security Requirements Guide (CC SRG), outlining a baseline of security requirements that include traditional cloud deployment models. Also, different security models are obtainable such as public, private, community and hybrid cloud deployment.  Private cloud security is the better solution for sensitive data than a public cloud.  In addition to, two or more similar organizations could share information through a community cloud.  Unlike a community cloud, a hybrid cloud is a combination of a private and a public cloud. With security a key criteria of cloud computing, what is happening with cloud security?  There is good news, and there is bad news. A recent announcement by DoD had awarded Microsoft the Joint Enterprise Defense Infrastructure (JEDI) contract that covets modernization of warfighting infrastructure. Perhaps this announcement is good news for Microsoft. Even fewer lines of codes are possible:

JEDI=”Joint Enterprise Defense Infrastructure!”
print (JEDI[:-1])
print (JEDI.split())

On the other hand, Amazon is not cheerful about DoD’s announcement.  Cloud computing has reported notable breaches.  According to Bradford, seven notable companies affected by cloud security threats are Microsoft (2010), Dropbox  (2012), National Electoral Institute of Mexico (2016), LinkedIn (2016), Home Depot (2014), Apple iCloud (2014) and Yahoo (2014). Configuration errors via human errors are frequent culprits of cloud computing as well as poor security practices and Gen V (5th Generation) attacks.  Best Western is added to the list of notable companies affected by cloud security threats. Riley reports that security researchers at vpnMentor identified a misconfigured 179GB database, Autoclerk, on September 13.  Autoclerk is owned by Best Western and is hosted by Amazon Web Services (AWS) according to Riley’s article.  Autoclerk is linked to other external booking platforms (e.g., community cloud infrastructure).  A sort method is convenient in Python:

cloud_breach = [“Microsoft”, “Dropbox”, “National Electoral Institute of Mexico”, “LinkedIn”, “Home Depot”, “Apple iCloud”, “Yahoo”]
cloud_breach.insert(5, “Best Western”)
cloud_breach.sort()
print (cloud_breach)

Cloud computing immunity is not guaranteed.

Resources:
Bradford, C. “7 Most Infamous Cloud Security Breaches.” 25 July,  StorageCraft, https//blog.storagecraft.com/7-infamous-cloud-security-breaches/. Accessed 08 November 2019. 
Capital One. “Information on the Capital One Cyber Incident.” 23 September 2019, Capital One, https//www.capitalone.com/facts2019/. Accessed 12 November 2019.
“Cloud Computing.”12 November 2019. Wikipedia, The Free Encyclopedia,  https//en.wikipedia.org/wiki/With_great_power_comes_great_responsibility. Accessed 12 November 2019.
Dobran, B. “SECaaS: Why Security as a Service is a Trend To Watch.” 29 May 2018. phoenixNap, https//phoenixnap.com/blog/secaas-security-as-a-service.  Accessed 08 November 2019.
GitHub. “https//github.com/vz-risk/VCDB/issues/14396.  Accessed 12 November 2019.
“Immediate Release: DOD Announces Enterprise General Purpose Cloud Contract Award.” 25 October 2019. Department of Defense, https//www.defense.gov/Newsroom/Releases/Release/Article/1999651/dod-announces-enterprise-general-purpose-cloud-contract-award/. Accessed 08 November 2019.
McMillan, R. “Capital One Breach Casts Shadow Over Cloud Security.” 30 July 2019. https//www.wsj.com/articles/capital-one-breach-casts-shadow-over-cloud-security-11564516541 Accessed 12 November 2019. 
Microsoft Azure. “What is cloud computing? A beginner’s guide.” Microsoft Azure, https//azure.microsoft.com/en-us/overview/what-is-cloud-computing/ Access 07 November 2019.
Norodo. Daniel. Sunny Storm. 28 December 2010. Flickr. https//www.flickr.com/photos/danielnorris/5301686078/. Accessed 16 November 2019.
Riley, D. “Customer data from Best Western and other hotels exposed in massive data breach.” 21 October 2019, Silicon Angle, https//siliconangle.com/2019/10/21/customer-data-best-western-hotels-exposed-massive-data-breach/. Accessed 12 November 2019.
Rouse, M. “Infrastructure as a Service (Iaas).” September 2018, TechTarget, https//searchcloudcomputing.techtarget.com/definition/Infrastructure-as-a-Service-IaaS. Accessed 11 November 2019.
Rundle, J. “Human Error Often the Culprit in Cloud Data Breaches.” 27 August 2019, The Wall Street Journal, https//www.wsj.com/articles/human-error-often-the-culprit-in-cloud-data-breaches-11566898203. Accessed 12 November 2019.
Shaptunova, Y. “Top 4 Cloud Deployment Models You Need to Know.” 15 August 2017,  Sam Solutions, https//www.sam-solutions.com/blog/four-best-cloud-deployment-models-you-need-to-know/. 08 November 2019.
Simonite, T. “Microsoft Is the Surprise Winner of a $10B Pentagon Contract.” 25 October 2019, Wired, https//www.wired.com/story/microsoft-surprise-winner-dollar10b-pentagon-contract/. Accessed 25 October 2019.
Stack, B. “Here’s How Much Your Personal Information Is Selling for on the Dark Web.” 06 December 2017. Experian, https//www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/. Accessed 12 November 2019.
“With great power comes great responsibility.” 24 October 2019. Wikipedia, The Free Encyclopedia, https//en.wikipedia.org/wiki/With_great_power_comes_great_responsibility . Accessed 08 November 2019.

Leave a comment