Questions tagged [cloud-computing]

Cloud computing is about hardware-based services involving computing, network and storage capacities. These services are provided on-demand, hosted by the cloud provider and can easily scale up and down.

306 questions
16
votes
5 answers

Risks with Amazon S3 and costs

I have little security knowledge and looking at image hosting for a startup: Considering S3 doesn't allow you to set a cap on costs, how likely is it that someone could flood S3 with requests for my files and run up a considerable amount of…
going
  • 283
  • 2
  • 8
15
votes
2 answers

Protection of Keys/Passwords on Virtual Hardware (XEN, KVM, VMWare, etc.)

Is there any reasonable way to secure data on virtual hardware? What I mean by "virtual hardware" is the various hosted systems that one can rent from various online hosters, that run on top of XEN, KVM, VMWare ESXi and so on. With actual dedicated…
Dexter
  • 313
  • 1
  • 6
14
votes
4 answers

Key management in cloud datacenters

In terms of infrastructure, how do Cloud providers (organizations providing SaaS, PaaS, or IaaS via the cloud) manage keys and cryptography? From my understanding, "private" datacenters tend to manage and offload cryptography with dedicated hardware…
Louis
  • 373
  • 2
  • 9
12
votes
3 answers

How did the spammers get this address?

A few months ago I configured a test mail server on Amazon AWS, all legit. I used a new address to my catchall-domain (something similar to, but not exactly, test-config-aws-neptune-2014-08@my-domain.com). I've now started getting spam mail to that…
dotancohen
  • 3,698
  • 3
  • 24
  • 34
12
votes
7 answers

Encrypt Virtual Machine in the cloud

I am no expert when it comes to security in virtualized environments. However a problem I always saw is: What happens if the host OS gets hacked and an attacker gains administrative privileges? How can I protect a VM in the (public) cloud against…
Emi
  • 123
  • 1
  • 4
12
votes
2 answers

AWS Security - Dev Test Staging Production Environments

Right now all our systems are in a traditional data center and traditional network topology. We're planning to migrate to AWS and in doing so we're trying to figure out how to implement our dev/test/staging/production environments. Should we: 1)…
Brad
  • 613
  • 6
  • 12
12
votes
2 answers

Is it safe to store SSN's in Azure Cloud?

I'm doing due diligence on a company. They are entirely cloud based and need to collect lots of personal information from users (including SSN). Is this something I should be majorly concerned with? They say they are using encryption, and Azure is a…
11
votes
6 answers

It is safe to store photos and documents on skydrive / google cloud services?

I have over 20GB of photos and documents stored on my hard disk without a backup. I'm thinking about saving all of them in a cloud service such as Microsoft Skydrive or google cloud, but I'm wondering if it is really safe... I mean, can I trust…
Diogo
  • 657
  • 2
  • 5
  • 10
11
votes
12 answers

How can I share files with other individuals using the cloud in a secure way?

I would like to use a dropbox because it is easy and convenient. But I want to encrypt the files with the public key of the intended recipient, so he will be the only one who can access the data in the file. I have not found an easy mechanism to…
10
votes
2 answers

Export laws on the cloud (key size)

Do the U.S. export laws around AES-256 apply to applications hosted in the cloud?
David Savage
  • 211
  • 2
  • 6
10
votes
2 answers

Is cloud hosting allowed for FIPS 140-2?

I am in the very early stages of making my application FIPS 140-2 compliant... so early in fact that I am not sure what level it has to be... just writing a preliminary recommendations document at this point. However, I am fairly certain that the…
TheCatWhisperer
  • 406
  • 1
  • 5
  • 12
10
votes
4 answers

Does OpenID, SAML pose a threat to Tor's anonymity? How can I protect from a compromised .exit node?

This is a thought experiment on the interaction between Tor, OpenID and one (or more) compromised nodes in the secure path. I'm focused on how to use technology in a way that adds value to a secure cloud solution. I have no interest in using this…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
10
votes
1 answer

How to execute a command directly on the host system through docker.sock in a Docker container?

I've been studying Docker security and examining ways of escaping from container to host. Suppose Docker sock (docker.sock) is mounted into the container at /var/run/docker.sock, so that Docker client (docker) can send commands to Docker daemon…
Shuzheng
  • 1,097
  • 4
  • 22
  • 37
10
votes
2 answers

CloudFlare benefits or drawbacks

Anyone running a webserver would agree, security can be a hustle and tedious job. Recently I came across a service claiming to help with that -- CloudFlare.com. There's plenty of benefits listed on CloudFlare's own website, however I'm interested if…
slatecaster
10
votes
1 answer

What are the privacy differences with Azure trustee delegates in China, Germany, and other locations?

Azure has different privacy agreements set up with different datacenters as mentioned in this footnote Azure is now available in China through a unique partnership between Microsoft and 21Vianet, one of the country’s largest Internet providers.…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
1
2
3
20 21