Cloud computing is about hardware-based services involving computing, network and storage capacities. These services are provided on-demand, hosted by the cloud provider and can easily scale up and down.
Questions tagged [cloud-computing]
306 questions
16
votes
5 answers
Risks with Amazon S3 and costs
I have little security knowledge and looking at image hosting for a startup:
Considering S3 doesn't allow you to set a cap on costs, how likely is it that someone could flood S3 with requests for my files and run up a considerable amount of…
![](../../users/profiles/5690.webp)
going
- 283
- 2
- 8
15
votes
2 answers
Protection of Keys/Passwords on Virtual Hardware (XEN, KVM, VMWare, etc.)
Is there any reasonable way to secure data on virtual hardware? What I mean by "virtual hardware" is the various hosted systems that one can rent from various online hosters, that run on top of XEN, KVM, VMWare ESXi and so on.
With actual dedicated…
![](../../users/profiles/8273.webp)
Dexter
- 313
- 1
- 6
14
votes
4 answers
Key management in cloud datacenters
In terms of infrastructure, how do Cloud providers (organizations providing SaaS, PaaS, or IaaS via the cloud) manage keys and cryptography?
From my understanding, "private" datacenters tend to manage and offload cryptography with dedicated hardware…
![](../../users/profiles/965.webp)
Louis
- 373
- 2
- 9
12
votes
3 answers
How did the spammers get this address?
A few months ago I configured a test mail server on Amazon AWS, all legit. I used a new address to my catchall-domain (something similar to, but not exactly, test-config-aws-neptune-2014-08@my-domain.com).
I've now started getting spam mail to that…
![](../../users/profiles/4758.webp)
dotancohen
- 3,698
- 3
- 24
- 34
12
votes
7 answers
Encrypt Virtual Machine in the cloud
I am no expert when it comes to security in virtualized environments.
However a problem I always saw is: What happens if the host OS gets hacked and an attacker gains administrative privileges?
How can I protect a VM in the (public) cloud against…
![](../../users/profiles/13793.webp)
Emi
- 123
- 1
- 4
12
votes
2 answers
AWS Security - Dev Test Staging Production Environments
Right now all our systems are in a traditional data center and traditional network topology.
We're planning to migrate to AWS and in doing so we're trying to figure out how to implement our dev/test/staging/production environments. Should we:
1)…
![](../../users/profiles/1928.webp)
Brad
- 613
- 6
- 12
12
votes
2 answers
Is it safe to store SSN's in Azure Cloud?
I'm doing due diligence on a company. They are entirely cloud based and need to collect lots of personal information from users (including SSN). Is this something I should be majorly concerned with? They say they are using encryption, and Azure is a…
![](../../users/profiles/107045.webp)
Tyler Perkins
- 123
- 5
11
votes
6 answers
It is safe to store photos and documents on skydrive / google cloud services?
I have over 20GB of photos and documents stored on my hard disk without a backup. I'm thinking about saving all of them in a cloud service such as Microsoft Skydrive or google cloud, but I'm wondering if it is really safe... I mean, can I trust…
![](../../users/profiles/3636.webp)
Diogo
- 657
- 2
- 5
- 10
11
votes
12 answers
How can I share files with other individuals using the cloud in a secure way?
I would like to use a dropbox because it is easy and convenient.
But I want to encrypt the files with the public key of the intended recipient, so he will be the only one who can access the data in the file.
I have not found an easy mechanism to…
![](../../users/profiles/6661.webp)
Hotze de Jong
- 111
- 1
- 1
- 3
10
votes
2 answers
Export laws on the cloud (key size)
Do the U.S. export laws around AES-256 apply to applications hosted in the cloud?
![](../../users/profiles/3398.webp)
David Savage
- 211
- 2
- 6
10
votes
2 answers
Is cloud hosting allowed for FIPS 140-2?
I am in the very early stages of making my application FIPS 140-2 compliant... so early in fact that I am not sure what level it has to be... just writing a preliminary recommendations document at this point. However, I am fairly certain that the…
![](../../users/profiles/24309.webp)
TheCatWhisperer
- 406
- 1
- 5
- 12
10
votes
4 answers
Does OpenID, SAML pose a threat to Tor's anonymity? How can I protect from a compromised .exit node?
This is a thought experiment on the interaction between Tor, OpenID and one (or more) compromised nodes in the secure path. I'm focused on how to use technology in a way that adds value to a secure cloud solution. I have no interest in using this…
![](../../users/profiles/396.webp)
makerofthings7
- 50,090
- 54
- 250
- 536
10
votes
1 answer
How to execute a command directly on the host system through docker.sock in a Docker container?
I've been studying Docker security and examining ways of escaping from container to host.
Suppose Docker sock (docker.sock) is mounted into the container at /var/run/docker.sock, so that Docker client (docker) can send commands to Docker daemon…
![](../../users/profiles/53024.webp)
Shuzheng
- 1,097
- 4
- 22
- 37
10
votes
2 answers
CloudFlare benefits or drawbacks
Anyone running a webserver would agree, security can be a hustle and tedious job. Recently I came across a service claiming to help with that -- CloudFlare.com. There's plenty of benefits listed on CloudFlare's own website, however I'm interested if…
slatecaster
10
votes
1 answer
What are the privacy differences with Azure trustee delegates in China, Germany, and other locations?
Azure has different privacy agreements set up with different datacenters as mentioned in this footnote
Azure is now available in China through a unique partnership between Microsoft and 21Vianet, one of the country’s largest Internet providers.…
![](../../users/profiles/396.webp)
makerofthings7
- 50,090
- 54
- 250
- 536