University of Technology Sydney

42035 Cloud Security

Warning: The information on this page is indicative. The subject outline for a particular session, location and mode of offering is the authoritative source of all information about the subject for that offering. Required texts, recommended texts and references in particular are likely to change. Students will be provided with a subject outline once they enrol in the subject.

Subject handbook information prior to 2025 is available in the Archives.

UTS: Engineering: Electrical and Data Engineering
Credit points: 6 cp

Subject level:

Postgraduate

Result type: Grade and marks

Requisite(s): ( 32548 Cybersecurity OR (48730 Cybersecurity AND 30 credit points of completed study in spk(s): MAJ03445 Networking and Cybersecurity major BSc ))
These requisites may not apply to students in certain courses. See access conditions.

Description

Cloud computing is a widely used computing paradigm for on-demand delivery of computing resources as utilities. It offers practically unlimited computing resources to users in a pay-as-you-go model with higher levels of quality of service in a substantially reduced infrastructure cost. In order to understand the impacts of adaptation of cloud-based solutions in businesses from cyber security perspectives, students must understand and learn the fundamentals of security, privacy and trust in cloud systems, and be able to apply them in practice.

Students engage in project-based learning to design and implement security solutions for trustworthy cloud-based applications using existing cloud platforms such as AWS or Azure. By using industry approaches to analysing security risks, together with the project, students learn the practical skills necessary to evaluate and develop secure cloud solutions as well as a fundamental understanding of security, privacy and trust in a cloud system.

Subject learning objectives (SLOs)

Upon successful completion of this subject students should be able to:

1. Analyse security risks and threats in cloud and cloud applications with reference to government regulations and industry best practice. (B.1)
2. Design secure defence mechanisms for cloud applications encompassing the security domains of infrastructure, platform, application, data and privacy. (C.1)
3. Implement security mechanisms for securing cloud applications to minimise risk and threats in a cloud system/service. (D.1)

Course intended learning outcomes (CILOs)

This subject also contributes specifically to the development of the following Course Intended Learning Outcomes (CILOs):

  • Socially Responsible: FEIT graduates identify, engage, and influence stakeholders, and apply expert judgment establishing and managing constraints, conflicts and uncertainties within a hazards and risk framework to define system requirements and interactivity. (B.1)
  • Design Oriented: FEIT graduates apply problem solving, design thinking and decision-making methodologies in new contexts or to novel problems, to explore, test, analyse and synthesise complex ideas, theories or concepts. (C.1)
  • Technically Proficient: FEIT graduates apply theoretical, conceptual, software and physical tools and advanced discipline knowledge to research, evaluate and predict future performance of systems characterised by complexity. (D.1)

Contribution to the development of graduate attributes

Engineers Australia Stage 1 Competencies

This subject contributes to the development of the following Engineers Australia Stage 1 Competencies:

  • 1.3. In-depth understanding of specialist bodies of knowledge within the engineering discipline.
  • 1.6. Understanding of the scope, principles, norms, accountabilities and bounds of sustainable engineering practice in the specific discipline.
  • 2.2. Fluent application of engineering techniques, tools and resources.
  • 2.3. Application of systematic engineering synthesis and design processes.
  • 3.4. Professional use and management of information.

Teaching and learning strategies

Students are required to read the lecture materials and short video explaining the take-away points and posing engaging questions before the lecture. These video questions and any topics raised by students, pertinent to the lecture contents, will be discussed during the lecture.

The lecture format will be mainly interactive in the form of questions & answers. A students or a group of students may also present their ideas and invite discussion during the class. It is the student's responsibility to read all materials, including those that are not specifically covered during the lecture time

All materials given in the subject readings and topics discussed in the lectures are all relevant to the assessment tasks. Students are expected to read each week's preparation materials in advance, prepare to raise discussion topics, participate during lecture times and lab/tutorial activities so that they can gauge feedback to any of their queries.

During each week's lab-tutorial session, students will perform a set of provided tasks. The tasks are closely related to the week's lecture topic. In-class quizzes may be conducted for producing quick responses of in-time verbal feedback to further support learning. Students will work in groups to answer the questions by performing hands-on activities and exploring external resources including the Internet.

Students are expected to participate in all lab-tutorial activities, complete assessment tasks, and actively participate in groups for the group-based activities both in and out of class time. For the last few weeks of the semester, time is allocated to groups to present and demonstrate the outcome of their projects for evaluation and assessment.

The process of communication and collaboration is integral to exercise innovation in selecting best cloud security solutions. Through discussions, interactions, and activities in and out of lecture, lab-tutorial times, students will gain knowledge to guide their written report, group design and demonstration. Use a log book to record the activity and its outcome related to the plan and aim of your project during the session which will be used to inform the reflection.

Content (topics)

1. Fundamental of cloud computing

2. Essentials of cloud security

3. Infrastructure and platform security in the cloud

4. Cloud security risk management

5. Compliance with policy, regulation and governance related to cloud security

6. Application security in the cloud

7. Data security and privacy in cloud systems

8. Identity and Access Management in Cloud

9. Implications of Big Data, Internet of Things and Social Computing to cloud security

10. Secure cloud application project

Assessment

Assessment task 1: Report

Intent:

To build competency in the legal and regulatory compliance requirements and the analysis of security risks and threats for cloud computing.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1

Type: Report
Groupwork: Individual
Weight: 40%
Length:

2000-3000 words

Assessment task 2: Project - Design

Intent:

As a designer, consider all security mechanisms from the role of each stakeholder, to safeguard the service.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

2

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

C.1

Type: Project
Groupwork: Group, individually assessed
Weight: 30%

Assessment task 3: Project- Realisation

Intent:

To be able to realise a design and demonstrate the working of the solution.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

3

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

D.1

Type: Project
Groupwork: Group, group and individually assessed
Weight: 30%

Minimum requirements

In order to pass the subject, a student must achieve an overall mark of 50% or more.

Required texts

  1. John R. Vacca (Editor), Cloud Computing Security - Foundations and Challenges, 2017, CRC Press
  2. Daniel Carter, CCSP Certified Cloud Security Professional, Second Edition, 2020, MaGraw-Hill Education