Cloud Service Provider (CSP)
The vendor offering cloud services. The CSP will own the datacenter, employ the staff, own and manage the resources (hardware and software), monitor service provision and security, and provide administrative assistance for the customer and the customer’s data and processing needs.
The individual or organization purchasing, leasing, or renting cloud services
Cloud Access Security Broker (CASB)
A third-party entity offering independent identity and access management (IAM) services to CSPs and cloud customers, often as an intermediary. This can take the form of a variety of services, including single sign-on, certificate management, and cryptographic key escrow.
The entities that ensure organizations are in compliance with the regulatory framework for which they’re responsible. These can be government agencies, certification bodies, or parties to a contract.
Regulations include the Health Information Portability and Accountability Act (HIPAA), the Graham-Leach-Bliley Act (GLBA).
The Payment Card Industry Data Security Standards (PCI-DSS), the International Organization for Standardization (ISO), the Sarbanes–Oxley Act (SOX), and so forth.
Regulators include the Federal Trade Commission (FTC), the Securities and Exchange Commission (SEC), and auditors commissioned to review compliance with contracted or asserted standards (such as PCI-DSS and ISO), among many others.
Cloud Computing Definitions
Because cloud definitions are at the heart of understanding the following concepts and applying security fundamentals for mastering Cloud Security Professional, we have included some of those definitions here.
Apache Cloud Stack
An open source cloud computing and IaaS platform developed to help make creating, deploying and managing cloud services easier by providing a complete “stack” of features and components for cloud environments.
An operational driver for decision making and input for risk management.
Cloud App (Cloud Application)
The phrase used to describe a software application accessed via the Internet; may include an agent or applet installed locally on the user’s device.
Its nothing buy an person or individual who having master in security and information field or in another word subject matter expert for cloud computing infrastructure and deployment.
Backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is stored in an accessible form from multiple distributed resources that comprise a cloud. in simple words, it’s fast as lightning has different forms which totally depends on your cloud provider.
A type of computing, compared to grid computing, that relies on ensuring computing resources rather than having local server or personal devices to handle applications.
The goal of cloud computing is to apply traditional supercomputing or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second and consumer-oriented applications such as financial portfolios, or even to deliver personalized information or power immersive computer games.
Cloud Computing Reseller
A company that purchases hosting services from a cloud server hosting or computing provider and then resells them to its own customers.
The process of transitioning all or part of a company’s data, applications, and services from onsite premises to the cloud, where the information can be provided over the Internet on an on-demand basis.
A phrase frequently used in place of PaaS to denote an association to cloud computing.
The ability to move applications and associated data between one cloud
provider and another, or between legacy and cloud environments.
A service provider that offers customer storage or software solutions available via a public network, usually the Internet. The cloud provider dictates both the technology and operational procedures involved.
Cloud Services Broker (CSB)
Typically a third-party entity or company that looks to extend or enhance value to multiple customers of cloud-based services through relationships with multiple cloud service providers.
It acts as a liaison between cloud services customers and cloud service providers, selecting the best provider for each customer, and monitoring the services.
The storage of data online in the cloud, wherein a company’s data is stored in an accessible form from multiple distributed and connected resources that comprise a cloud.
Testing is also important in cloud computing and their roles and responsibilities.
Load and performance testing conducted on the applications and services provided by a cloud provider, particularly the capability to access the services, in order to ensure optimal performance and scalability under a wide variety of conditions.
A model where the cloud infrastructure is designed for use by a specific community. Generally, this is a community of users or consumers with shared concerns, missions, and/or security requirements.
The term used to describe applications or software that a business would use to assist the organization in solving enterprise problems.
An open source cloud computing and Infrastructure as a Service (IaaS) platform for enabling private clouds.
A NIST document that lists accredited and outmoded cryptosystems.
A cloud solution that mixes elements of public, private, and community cloud models.
Infrastructure as a Service (IaaS)
One of three main categories of cloud computing services, alongside Software as a Service (SaaS) and Platform as a Service (PaaS). Offers only hardware and administration, leaving the customer responsible for the OS and other software.
Managed Service Provider
An IT service where the customer dictates both the technology and operational procedures, and an external party executes administration and operational support according to a contract.
Multi-Tenant is also important in cloud computing roles and responsibilities factor Multiple customers using the same public cloud (and often the same hosts, in a virtualized cloud environment).
A guidance document with the primary goal of ensuring that appropriate security requirements and controls are applied to all U.S. federal government information in information management systems.
Platform as a Service (PaaS)
A way for customers to rent hardware, operating systems, storage, and network capacity over the Internet from a cloud service provider. PaaS is one of three main categories of cloud computing services, alongside Software as a Service (SaaS) and Infrastructure as a Service (IaaS).
The phrase used to describe a cloud computing platform that is implemented within the organization.
A private cloud is designed to offer the same features and benefits of public cloud systems but removes a number of objections to the cloud computing model, including control over enterprise or customer data, worries about security, and issues connected to regulatory compliance or contractual agreements.
Software as a Service (SaaS)
SaaS is a software delivery method that provides access to software and its functionality remotely as a web-based service.
Software as a Service allows organizations to access business functionality at a cost typically less than paying for licensed applications because SaaS pricing is based on a monthly fee.
SaaS is one of three main categories of cloud computing services, alongside Platform as a Service (PaaS) and Infrastructure as a Service (IaaS).
Trusted Cloud Initiative (TCI) Reference Model
The TCI reference model is a guide for cloud providers, allowing them to create a holistic architecture (including the physical facility of the datacenter, the logical layout of the network, and the processes necessary to utilize both) that cloud customers can purchase and use with comfort and confidence.
Vendor lock-in occurs in a situation where a customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or nontechnical constraints.
Vendor lock-out occurs when a customer is unable to recover or access their own data due to the cloud provider going into bankruptcy or otherwise leaving the market.
Creating a virtual (a logical vs. a physical) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources.
Computer hardware virtualization is a way of improving overall efficiency. It involves CPUs that provide support for virtualization in hardware and other hardware components that help improve the performance of a guest environment.
The most important factor that needs to remember in mind Cloud Computing Roles and Responsibilities
Confidentiality: Protecting information from unauthorized access/dissemination
Integrity: Ensuring that information is not subject to unauthorized modification
Availability: Ensuring that authorized users can access the information when they are.