
Cloud
Learning Level
Cloud security is a shared responsibility. The cloud provider secures the infrastructure, but you secure your applications and data.
Provider Secures You Secure
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
Servers Applications
Network Configurations
Power/Cooling API keys
Data Centers User access
Hypervisors Data classificationKey insight: You can't secure data by just relying on the provider. Active security is your responsibility.
Verify that users are who they claim to be.
Methods:
Example:
User logs in ā Provides username/password
ā Cloud provider verifies ā Issues token
ā Token proves authenticated for 24 hoursData unreadable without the correct key.
In transit: Encrypt data traveling over internet (TLS/SSL)
At rest: Encrypt data stored in database or storage
Example:
Password: "mypassword123"
Encrypted: "$2b$12$R9h7kj42...encrypted..."
Cloud stores encrypted version onlyDetermine what authenticated users are allowed to access.
Methods:
Example:
Employee (basic role): Can read their own data
Manager (manager role): Can read team data
Admin (admin role): Can read everything and deleteUsers get minimum permissions needed.
ā Wrong: "Give everyone admin access"
ā Right: "Give only necessary permissions"
Never commit API keys to code. Store in environment variables.
ā Wrong:
const apiKey = "sk_prod_1234567890"
ā
Right:
const apiKey = process.env.STRIPE_API_KEYMulti-factor authentication prevents password theft.
Login with password ā MFA challenge
ā Confirm with phone ā Access grantedEncrypt sensitive data (passwords, payment info, health data).
Log who accessed what and when.
Admin logs show:
- Alice accessed customer database at 3:15 PM
- Bob uploaded new code at 4:30 PM
- System auto-scaled at 5:00 PMTarget Breach (2013): Hackers stole 40 million credit cards.
What happened:
1. Hackers got contractor's VPN credentials
2. Contractor had database access
3. No MFA on contractor account
4. No log monitoring for unusual access
5. Breach undetected for months
Lessons:
| Mistake | Why it's bad | Fix |
|---|---|---|
| Hardcoding API keys | Keys in code ā source control ā exposed | Use environment variables |
| No backups | Ransomware encrypts data ā permanently lost | Regular automated backups |
| All users as admins | Everyone can delete everything | Role-based access |
| No MFA | Password theft = account compromise | Enable MFA for all users |
| Public database | Data world-accessible | Restrict network access |
Want production patterns? š Security Fundamentals (Experienced)
Resources
Ojasa Mirai
Master AI-powered development skills through structured learning, real projects, and verified credentials. Whether you're upskilling your team or launching your career, we deliver the skills companies actually need.
Learn Deep ⢠Build Real ⢠Verify Skills ⢠Launch Forward