Module Details

Module Code: CYBR9023
Title: Cloud Security Architecting
Long Title: Cloud Security Architecting
NFQ Level: Expert
Valid From: Semester 2 - 2023/24 ( January 2024 )
Duration: 1 Semester
Credits: 5
Field of Study: 4811 - Computer Science
Module Delivered in: no programmes
Module Description: In this module, students will explore the world of cloud security and the critical importance it holds in today's digital landscape. Students will gain an understanding of approaches to designing and implementing rigorous security strategies, complemented by monitoring and detection methodologies that provide real-time insights and proactive responses. Students will gain an understanding of Identity and Access Management (IAM) best practices, including centralized management of authentication, authorisation, roles and policies, logging and auditing. Students will be equipped with necessary practical expertise to protect varied cloud resources such as storage services (Object, Block, File, Queue), database platforms, compute offerings (Virtual Machines, serverless functions, containers), and networking configurations (Virtual Networks, Subnets, Firewalls, VPNs). Students will develop a holistic understanding of the challenges and intricacies of securing multi-faceted cloud-hosted environments and an awareness of the encompassing compliance and regulatory landscapes. This module was developed under the Cyber Skills HCI Pillar 3 Project. Please refer to consortium agreement for ownership.
 
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Examine the foundational principles of cloud security, distinguishing it from traditional IT security and the nuances of various cloud architectures and service models.
LO2 Recognize the role of identity & access control in cloud environments as the security perimeter in the cloud, and design strategies for effective identity management and access controls.
LO3 Evaluate and secure the components that comprise cloud-hosted solutions ensuring the confidentiality, integrity and availability of digital assets.
LO4 Design and implement an overarching Cloud Security Posture Management (CSPM) strategy tailored to specific business needs and cloud architectures.
LO5 Examine the implications and complexities of compliance and regulatory standards in cloud security, adapting strategies to ensure adherence.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is strongly recommended before enrolment in this module. You may enrol in this module if you have not acquired the recommended learning but you will have considerable difficulty in passing (i.e. achieving the learning outcomes of) the module. While the prior learning is expressed as named MTU module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).

Incompatible Modules
These are modules which have learning outcomes that are too similar to the learning outcomes of this module. You may not earn additional credit for the same learning and therefore you may not enrol in this module if you have successfully completed any modules in the incompatible list.
No incompatible modules listed
Co-requisite Modules
No Co-requisite modules listed
Requirements

This is prior learning (or a practical skill) that is mandatory before enrolment in this module is allowed. You may not enrol on this module if you have not acquired the learning specified in this section.

No requirements listed
 
Indicative Content
Evolution of Cloud Security
Origins and rise of cloud platforms & responsibility shifts. Major cloud providers. Cloud architectures: Public, Private, and Hybrid. Cloud service models: IaaS, PaaS, and SaaS. Threat vectors specific to cloud environments. Importance of cloud security & distinction from traditional IT security. Strategic alignment of security controls with business objectives. Cloud security best practices.
Cloud Identity and Access Management
History of identity management. The application of the principle of least privilege in the cloud. User and role management in cloud platforms. Access strategies for cloud services. Modern authentication protocols such as OIDC, OAUTH,SAML/WSFED. Single Sign-On (SSO) and Multi-Factor Authentication (MFA) in the cloud. The different levels of MFA security, from gold standard phishing-resistant MFA (FIDO) to less secure Time-Based One-Time Password (TOTP) and SMS/Email MFA. Service and resource-based policies.
Data Security, Integrity, and Storage:
CIA triad, Zero trust. Data residency and sovereignty. Cloud storage security. Secure key and secret management.
Database Platforms & Security
Database offerings, encryption types & methods, data masking, auditing, threat detection, best practices.
Compute & Application Security
Virtual Machines, serverless functions, containers, app hosting, API hosting, threat detection, best practices.
Network Security
Virtual networks, network topology, subnets, peering, firewalls, VPNs, DDoS, monitoring, Multi-Cloud & Hybrid Cloud security.
Cloud Security Posture Management (CSPM)
CSPM strategies suited to diverse cloud architectures; real-time monitoring and threat detection systems; incident response integration; adoption of "Shift Left" security practices to integrate security earlier in the development lifecycle; application of Continuous Security methodologies; intertwining of these approaches with scalable security policies embedded within CI/CD pipelines using tools like Terraform/CloudFormation while centralizing security policy management.
Compliance and Regulatory Frameworks
Interpreting and adhering to compliance and regulatory standards including GDPR, HIPAA, PCI DSS & SOC2; ensuring cloud operation compliance; managing data sovereignty across multiple global jurisdictions within Azure, AWS, and other cloud services; tailoring security frameworks to specific organizational needs; staying up to date with changes in cloud security regulations and best practices. Compliance assessments & audits.
Security Management and Automation
Examination of security management tools; Infrastructure as Code (IaC) for security consistency (Security Policy as Code); Automated Threat Detection and incident response mechanisms; incorporation of security within DevSecOps workflows; securing CI/CD pipelines; understanding compliance intersections with security automation; keeping pace with emerging trends in the automation of cloud security.
Module Content & Assessment
Assessment Breakdown%
Coursework100.00%

Assessments

Coursework
Assessment Type Project % of Total Mark 40
Timing Week 7 Learning Outcomes 1,2,3
Assessment Description
The student will be expected to critically analyse cloud security subjects in writing (essay format) and undertake a security analysis of a provided hypothetical cloud infrastructure case study. Identify potential weaknesses and vulnerabilities, then propose remedial actions and pertinent security best practices.
Assessment Type Written Report % of Total Mark 60
Timing Sem End Learning Outcomes 2,3,4,5
Assessment Description
The student will be expected to develop a comprehensive cloud security strategy based on the requirements from a hypothetical organisation embarking on a cloud migration journey. This proposal should address areas such as Identity & Access Control, permissions, storage, compute, database security, networking, proactive monitoring, reporting mechanisms, and adherence to compliance standards.
No End of Module Formal Examination
Reassessment Requirement
Coursework Only
This module is reassessed solely on the basis of re-submitted coursework. There is no repeat written examination.

The University reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact Lectures covering the theoretical concepts underpinning the learning outcomes Every Week 2.00 2
Lab Contact Lab assignments based on preceding lecture material to provide practical experience working with the major cloud-hosted resource type. Student-provided AWS and Azure account, using free tier services. Every Week 2.00 2
Independent & Directed Learning (Non-contact) Non Contact Independent learning by the student Every Week 3.00 3
Total Hours 7.00
Total Weekly Learner Workload 7.00
Total Weekly Contact Hours 4.00
Workload: Part Time
Workload Type Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact Lectures covering the theoretical concepts underpinning the learning outcomes Every Week 2.00 2
Lab Contact Lab assignments based on preceding lecture material to provide practical experience working with the major cloud-hosted resource type. Student-provided AWS and Azure account, using free tier services. Every Week 2.00 2
Independent & Directed Learning (Non-contact) Non Contact Independent learning by the student Every Week 3.00 3
Total Hours 7.00
Total Weekly Learner Workload 7.00
Total Weekly Contact Hours 4.00
 
Module Resources
Recommended Book Resources
  • Aditya K. Sood. (2021), Empirical Cloud Security, Mercury Learning and Information, p.450, [ISBN: 978-1683926856].
Supplementary Book Resources
  • MIHIR. SHAH. (2023), Cloud Native Software Security Handbook, Packt Publishing, p.372, [ISBN: 978-1837636983].
  • Tim Mather, Subra Kumaraswamy,Shahed Latif. (2009), Cloud Security and Privacy, "O'Reilly Media, Inc.", p.338, [ISBN: 9781449379513].
Supplementary Article/Paper Resources
  • Singh, Ashish, and Kakali Chatterjee. (2017), Cloud security issues and challenges: A survey, Journal of Network and Computer Applications, 79.
Other Resources