Cloud computing is about hardware-based services involving computing, network and storage capacities. These services are provided on-demand, hosted by the cloud provider and can easily scale up and down.
Questions tagged [cloud-computing]
306 questions
0
votes
0 answers
secure deletion in virtual machines
when we securely delete a volume in a machine which is installed in a virtual machine or docker, for example by overwriting 7 times or more, we securely delete the data in virtual disk (in guest) and some related data in real disk (in host) may…
![](../../users/profiles/252913.webp)
alex
- 1
0
votes
0 answers
What are reasonable level of security for a interal-use organization application hosted on the cloud?
I'm working on an small web application (Flask). The application is only for distributed internal usage, e.g. only users with credentials created by the organization will have access to the services beyond the Login page and the organization creates…
![](../../users/profiles/134122.webp)
Francky_V
- 103
- 3
0
votes
1 answer
What (aside from the law) prevents cloud-hosting owners from eavesdropping on servers/code?
Given a server hosted on a cloud platform, what would stop the cloud platform owner from stealing the server's data and/or code?
As far as I can tell, a motivated cloud owner could retrieve the data in its servers while keeping plausible…
![](../../users/profiles/245848.webp)
Asker
- 101
- 2
0
votes
1 answer
Unknown folders in OneDrive
Today I opened OneDrive by accident, since I do not use it. To my surprise, inside there were unknown folders, in foreign (to me) languages. Namely, "document" and "photo" folders in Korean and a shortcut in French with the meaning of…
![](../../users/profiles/244350.webp)
user851
- 101
- 1
0
votes
1 answer
Cloud application Vulnerability assessment
Do you think server side assessment of application is important when application is hosted on a cloud like Amazon?
Assessment on software used to host the application not the actual application, e.g. assessment of nginx webserver using nessus or…
![](../../users/profiles/9767.webp)
dany
- 193
- 7
0
votes
0 answers
Is it possible to make a remote server part of VPN so that only machines within a domain network can access the server?
First, let me describe the problem I am trying to solve.
I have a domain-based network. My Source Control server resides on
this network. This meant only devices connected to the network (part
of the domain) could access the Source Control server.…
![](../../users/profiles/235019.webp)
devanalyst
- 101
0
votes
1 answer
Using unique per-session gpg keys to store backups on cloud storage
I'd like to encrypt my server's daily backups and send them to dropbox / google drive / etc., as a backup.
I've read of various approaches. Assuming symmetric encryption (passphrase rather than public/private keypair), people seem to: tar, compress,…
![](../../users/profiles/201889.webp)
lonix
- 363
- 3
- 11
0
votes
0 answers
Someone is Cryptomining from my Google Compute Engine Instance
I run an airflow instance which python process scheduler, which is used to trigger different python ML process which has no relation to crypto mining. This is the process which is running this dockerized process…
![](../../users/profiles/228922.webp)
isht3
- 1
- 1
0
votes
1 answer
Use of HTTP functions in GCP Cloud Functions Is Not Secure. Why they are still available?
As Google mentions itself in the documentation,
the HTTP functions in Cloud Functions have no authentication and are not secure. HTTP functions are unprotected and will respond to any HTTP request, which means anybody on the internet could start…
![](../../users/profiles/5470.webp)
LLub
- 1,246
- 10
- 21
0
votes
1 answer
The main things a cloud data center could inject into its hardware
So some cloud service providers like Amazon use custom hardware to improve different characteristics of their servers. This also means they can control the security better, because there is nothing hidden inside their silicon since they made it. But…
![](../../users/profiles/128550.webp)
Lance
- 588
- 5
- 16
0
votes
0 answers
Meltdown checker says AWS and Rackspace is vulnerable - Why?
Today I was curious how my vmware environment stacked up against Spectre and Meltdown. So I ran spectre-meltdown-checker. It came back clean with
7 of 8 variants OK (the failed one is apparently not possible to exploit under VMware)
Then I was…
![](../../users/profiles/156809.webp)
user3280964
- 1,130
- 2
- 7
- 13
0
votes
3 answers
Security risks of exposing a VM to single IP address on the Internet
I have a small office network with about 10 workstations and a single physical domain controller. I want to move it to the cloud. For that, I deployed a Windows VM on Azure, which I'm going to promote as an additional DC. Then, I'll shut down the…
![](../../users/profiles/94531.webp)
eden881
- 237
- 1
- 2
- 7
0
votes
2 answers
Privacy of client's virtual machine in cloud computing
As we know clients can create and run their virtual machines (VM)in the cloud computing. My question is about the confidentiality of data stored in the client's VM.
Question 1: Does data stored in a client's VM remain private in the cloud? Is the…
![](../../users/profiles/182565.webp)
Ay.
- 101
- 3
0
votes
2 answers
How does the TPM provide security for the cloud?
The primary scope of TPM is to assure the integrity of a platform. In
this context, "integrity" means "behave as intended". ~Wiki
I'm learning more about how the TPM performs integrity covering aspects as root of trust, chain of trust, PCRs…
user178521
0
votes
1 answer
Detect and Scan Open Ports
I am trying to understand two questions -
I run Qualys/Nessus scans on periodic basis in our Azure/AWS environment and always run into issues while detecting for Open ports, A basic nmap scan would detect open port however a Qualys/Nessus scan…
![](../../users/profiles/140601.webp)
Vaibhav
- 5
- 4