Zscalerpdf
Zscalerpdf
On
ZERO TRUST CLOUD SECURITY
Submitted In accordance with the requirement for the degree of
BACHELOR OF TECHNOLOGY
CSE - (ARTIFICIAL INTELLIGENCE & MACHINE LEARNING)
Submitted by
NERIYANURU VEDA PRIYA(228X1A4291)
Signature of student
I profoundly express my gratitude and respect towards our honourable chairman SRI
KALLAM MOHAN REDDY, Chairman, KHIT for his precious support in the
college.
I would like to thank Dr. B. S. B. REDDY M.Tech., Ph.D. Principal, KHIT for
providing a great support and for giving us the opportunity of doing the Internship.
I want to thank Dr. B. Prakash M.Tech., Ph.D. Head of the Department, CSE-
(Artificial Intelligence & Machine Learning) KHIT for inspiring us all the way and
for arranging all the facilities and resources needed for our internship.
I would also like to thank the Directors of AICTE for giving me the opportunity to do
an internship. I would like to thank our internship mentors who has guided us a lot and
encouraged us in every step of the intern project work. I also would like all the people
that worked along with me in Zero Trust Cloud Security Virtual Internship.
CONTENTS
1. EXECUTIVE SUMMARY..........................................................................................01-09
3. INTERNSHIP PART...................................................................................................12-22
4. ACTIVITY LOG...........................................................................................................23-42
6. CONCLUSION..............................................................................................................45-46
8
CHAPTER 1: EXECUTIVE SUMMARY
The Zero Trust Cloud Security virtual internship provides participants with hands-on experience in
implementing and managing modern cybersecurity principles in cloud environments. Zero Trust is
a security framework that assumes no implicit trust within or outside an organization’s network,
requiring strict identity verification for every user and device attempting to access resources.
3. Hands-on Experience:
Practical labs and simulations focused on implementing Zero Trust in cloud platforms like AWS,
Azure, and Google Cloud.
Working with security tools such as VPNs, firewalls, and security information and event management
(SIEM) systems.
Outcomes:
• A virtual internship was an opportunity to practice flexibility and develop collaboration.
• Practice our communication skills.
• Time management skills in a completely virtual environment.
• Widen our world and connections.
• Prepare for the future of work.
• Develop how to work.
• Enhance our employability
CHAPTER 2: OVERVIEW OF THE ORGANIZATION
Introduction of the Organization:
EduSkills is a not-for-profit organization focused on empowering and upskilling students,
educators, and institutions in the field of education, particularly in the areas of digital literacy,
employability skills, and industry-aligned training. EduSkills partners with educational
institutions, industry leaders, and government bodies to bridge the skill gap between academia and
industry, aiming to enhance the quality of education and equip learners with the necessary tools to
succeed in the modern workforce.
Employability and Job Readiness: The organization helps students develop skills that enhance
their employability. This includes not only technical skills but also soft skills like communication,
problem-solving, and teamwork, which are critical for career success.
Collaboration with Academia and Industry: EduSkills works closely with schools, colleges,
universities, and companies to create a seamless pathway for students from education to
employment. Their initiatives often include practical training, internships, and mentorship
opportunities.
Mission of EduSkills:
EduSkills aims to democratize education and skill development by making quality learning
accessible to students from all backgrounds, regardless of geography or socio-economic
conditions. By doing so, the organization strives to create a future-ready workforce capable of
meeting the demands of the rapidly changing job market.
Partnerships:
EduSkills has established strong partnerships with leading global companies and educational
platforms, leveraging these connections to provide students with opportunities to learn cutting-
edge technologies. These partners often provide curriculum, certification, and tools necessary for
real- world application.
In summary, EduSkills serves as a bridge between academia and industry, fostering a collaborative
environment where students, educators, and professionals can gain the skills necessary to thrive in
an increasingly digital world.
Mission:
EduSkills’ mission is to empower students, educators, and institutions through innovative training
programs and resources that enhance digital literacy and employability. By collaborating with
industry leaders and educational institutions, EduSkills strives to bridge the skill gap between
academia and the workforce, ensuring that learners are prepared for the challenges of the modern
job market.
Goals:
Empower Educators:
Offer professional development opportunities for teachers to integrate technology and innovative
teaching methods into their classrooms.
Promote Employability:
Equip students with both technical and soft skills necessary for career success, increasing their
employability in the competitive job market.
Continuous Improvement:
Regularly assess and adapt programs to meet the evolving needs of students and the job market,
enduring that EduSkills remains relevant and effective in its mission.
CHAPTER 3: INTERNSHIP PART
The Cyber security Intern provides an opportunity to gain professional experience in a real-world
setting
Modules:
Fundamental of cyber security
• Cyber security and attack surface
• Types of cyber security
• Importances of cyber security for business
• Cyber security framework and compliance
• Cyber threats, cyber-attacks and cyber attackers
• Various types of cyber attacks
• Cyber safety and its measures
• Perimeter based and zero trust security models
• Zscaler zero trust exchange
Attack Surface
The attack surface refers to the total number of points (attack vectors) in a system that an attacker
can exploit to gain unauthorized access. A larger attack surface typically means more potential
vulnerabilities.
15
Components of the Attack Surface:
User Interfaces: Any point where users interact with a system, such as web applications and
APIs. Network Interfaces: All the entry points to a network, including open ports and
communication protocols.
Software Applications: Programs that might contain vulnerabilities or be misconfigured.
Third-party Services: Any external services or components integrated into your system that could
introduce vulnerabilities.
Cybersecurity is vital for several reasons, each addressing different aspects of technology, business,
and personal safety. Here are some key types of cybersecurity importance:
1. Data Protection
Confidentiality: Safeguarding sensitive data from unauthorized access.
Integrity: Ensuring that data is accurate and unaltered during transmission and storage.
Availability: Making sure data and systems are accessible when needed.
2. Business Continuity
Disaster Recovery: Establishing protocols to restore operations after a cyber incident.
Minimizing Downtime: Reducing the impact of attacks to maintain productivity and service delivery.
3. Regulatory Compliance
Adhering to Laws: Meeting industry regulations (e.g., GDPR, HIPAA) to avoid legal penalties.
Building Trust: Demonstrating a commitment to security to customers and partners.
4. Reputation Management
Brand Protection: Preventing breaches that can harm a company’s reputation.
Customer Loyalty: Ensuring trust by safeguarding customer data and privacy.
7. Employee Safety
Awareness and Training: Educating employees about cybersecurity threats to reduce
risks of breaches.
Creating a Safe Work Environment: Ensuring that internal systems are secure from
attacks.
8. National Security
Protecting Critical Infrastructure: Securing systems that support essential services like
power, healthcare, and transportation.
3.3 Importances of cyber security for business
Security can be categorized into various types, each focusing on different areas of protection.
Here’s an overview of the main types of security:
1. Physical Security
Protection of Physical Assets: Involves safeguarding physical locations, such as buildings and
equipment, from unauthorized access, theft, and natural disasters.
Components: Access controls (locks, badges), surveillance (CCTV), security personnel, and
environmental controls (fire alarms, climate controls).
2. Cybersecurity
Protection of Digital Information: Focuses on protecting computer systems, networks, and data
from cyber-attacks and unauthorized access.
Components: Firewalls, encryption, intrusion detection systems, antivirus software, and security
policies.
3. Network Security
Securing Network Infrastructure: Involves protecting the integrity and usability of networks from
intrusions and attacks.
Components: VPNs, firewalls, intrusion prevention systems, and secure configurations.
4. Application Security
Securing Software Applications: Ensures that applications are designed and maintained to prevent
vulnerabilities.
Components: Secure coding practices, application testing, vulnerability assessments, and patch
management.
5. Information Security
Protecting Data Integrity: Focuses on protecting data from unauthorized access and corruption.
Components: Access controls, encryption, data classification, and secure data storage.
6. Operational Security (OpSec)
Protecting Processes and Information: Involves processes that protect sensitive information and
operational capabilities.
Components: Risk assessments, security policies, and employee training.
7. Cloud Security
Securing Cloud Environments: Focuses on protecting data and applications hosted in cloud services.
Components: Identity management, access controls, encryption, and compliance monitoring.
8. Physical Security
Protection of Physical Assets: Involves safeguarding physical locations, such as buildings and
equipment, from unauthorized access, theft, and natural disasters.
Components: Access controls (locks, badges), surveillance (CCTV), security personnel, and
environmental controls (fire alarms, climate controls).
9. Cybersecurity
Protection of Digital Information: Focuses on protecting computer systems, networks, and data
from cyber-attacks and unauthorized access.
Components: Firewalls, encryption, intrusion detection systems, antivirus software, and security
policies.
Core Functions:
Identify: Understanding organizational risks and resources.
Protect: Implementing safeguards to limit the impact of potential events.
Detect: Developing and implementing activities to identify the occurrence of a cybersecurity event.
Respond: Taking action regarding a detected cybersecurity incident.
Recover: Maintaining plans for resilience and restoring services affected by cybersecurity incidents.
ISO/IEC 27001
An international standard for managing information security. It provides requirements for
establishing, implementing, maintaining, and continually improving an information security
management system (ISMS).
Key Components: Risk management, security controls, and continuous improvement.
CIS Controls
Developed by the Center for Internet Security, these are a set of best practices for securing IT
systems and data. The controls provide actionable guidance on protecting against the most
common cyber threats.
Categories: Basic, foundational, and organizational controls, with a focus on risk management and
security hygiene.
COBIT (Control Objectives for Information and Related Technologies)
A framework for developing, implementing, monitoring, and improving IT governance and
management practices. It helps organizations align IT goals with business objectives and manage
risks effectively.
Risk Management
Implementing a risk management process to identify, assess, and mitigate cybersecurity risks is
fundamental for both compliance and effective security.
3. Cyber Attackers
Cyber attackers (hackers) are individuals or groups who perform cyber-attacks. They may have
different motivations, such as financial gain, political goals, espionage, or simply causing
disruption. Types of cyber attackers include:
Hacktivists: Individuals or groups that attack systems to promote political or social agendas (e.g.,
Anonymous).
Cybercriminals: Individuals or organized groups that engage in cybercrime for financial gain, often
through phishing, fraud, or ransomware.
State-Sponsored Hackers: Hackers employed or supported by nation-states, usually involved in
espionage, sabotage, or political warfare.
Insider Threats: Employees or partners with legitimate access to systems who turn malicious.
Script Kiddies: Inexperienced hackers who use pre-made tools and scripts to launch attacks,
typically without fully understanding the complexities.
Advanced Persistent Threats (APT): Sophisticated and often state-sponsored groups that infiltrate
systems and remain undetected for long periods to steal data or cause harm over time.
1. Malware Attacks
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to
systems. Types of malware include:
Viruses: Spread by attaching themselves to legitimate programs, capable of self-replicating and
spreading to other files.
Trojans: Disguised as legitimate software, but open backdoors to allow unauthorized access to a
system.
Ransomware: Encrypts a victim’s data and demands payment for decryption.
Spyware: Secretly gathers information from a system and transmits it to an attacker.
Worms: Self-replicating programs that spread across networks without user intervention.
2. Phishing Attacks
Phishing is a social engineering technique where attackers impersonate trustworthy entities to trick
users into revealing sensitive information, such as passwords or credit card numbers. Types of
phishing include:
Spear Phishing: Targeted phishing aimed at specific individuals or organizations, often customized
for higher success rates.
Whaling: Phishing attempts targeted at high-profile individuals like CEOs or executives.
Clone Phishing: Creating a copy of a legitimate email but replacing its attachments or links with
malicious ones.
8. Password Attacks
In these attacks, cybercriminals attempt to gain access to systems by stealing or guessing passwords.
Common techniques include:
Keylogging: Recording keystrokes to steal sensitive information.
Password Spraying: Attempting commonly used passwords across many accounts without triggering
account lockout mechanisms.
9. Cryptojacking
This attack involves secretly using a victim’s computer resources to mine cryptocurrency. It typically
happens via infected websites, malicious scripts, or compromised software.
4. Encryption
Encrypt sensitive data: Encryption converts data into unreadable formats without a decryption
key. Encrypt important files and communications, especially when transmitting them over the
internet. Use end-to-end encryption for communication: Messaging apps and email services that
offer end- to-end encryption (like Signal or encrypted email services) ensure that only the sender
and recipient can read the message.
International technology
Online Cyber security organizations often sponsor works
Day-6 Communities hops and conferences. These
organizations often keep cyber
13-07-2024 security professionals inspired and
motivated
ACTIVITY LOG FOR THE SECOND WEEK : (15-07-2024 to 20-07-2024)
Day & Date Brief Description of Daily Activity Learning Outcome Signature of
student
Project Setup Describe the steps
taken to Set up
Day-1 the project
environment.
15-07-2024
16-07-2024
Summarize the
Exploits Targeting Remote Work data collected
Day-3 17- Infrastructure for the project.
07-2024
07-2024
22-07-2024
29-08-2024
31-08-2024
06-08-2024
07-08-2024
Summarize any
Client or Stakeholder Presentation presentations or
Day-5 demonstrations made
to clients or
09-08-2024 stakeholders during
the week.
Lessons Learned Share insights gained
from the project,
Day-6 including challenges
faced and lessons learned.
10-08-2024
ACTIVITY LOG FOR THE SIXTH WEEK: (12-08-2024 to 17-08-2024)
16-08-2024
13-08-2024
16-08-2024
If applicable, discuss
User Feedback and Improvements additional user feedback
Day-2 received and the iterations.
20-08-2024
Day & Date Brief Description of Daily Activity Learning Outcome Signature
of student
Summarize ongoing
Continued Monitoring and Analysis monitoring and analysis
Day-1 of the model's
performance in the
26-08-2024 production environment.
29-08-2024
Detailed Report:
• Ability to collect user data contributed by the ourselves
• How to became cyber security specialists to help defeat the cyber criminals that threaten
the cyber world Threats are particularly dangerous to certain industries and the records they
must maintain.
• Greater attention to detection and isolation of cyber-attacks, cyber criminals must be
more careful Security provisioning, operate, collect and analyses etc., Inspired and motivated
by cyber security professionals.
WEEK–2 (From Dt:15-01-2024 To Dt:21-01-2024)
Objective of the Activity Done: Project Setup, Data Cleaning and Preprocessing, Data
Analysis (EDA), Model Selection
Detailed Report:
Describe the steps taken to set up the project environment, including tools, libraries, and data
sources.
Summarize the keyinsights gained from the initial EDA. Includevisualizations and trends identified
in the data.
WEEK–3 (From Dt:21/01/2024 to Dt:26/01/2024)
Detailed Report:
• Objective of the
Detail any Activity
further stepsDone: Data
taken in Refinement,
data Feature
cleaning and Engineering,
preprocessing. Model
Address specific
Development,
challenges Validation
encountered Strategythe decisions made.
and describe
• Outline any feature engineering performed during Week 2 and the rationalebehind
those choices.
• Summarize progress in model development. Include insights gained, initialmodel
training results, and any adjustments made.
Describe the chosen validation strategyand anyinsights gained from validation results.
WEEK–4 (From Dt:27/01/2024 to Dt:01/02/2024)
Objective of the Activity Done: Model Tuning and Optimization, Validation Results,
Feedback Incorporation, Model Interpretability
Detailed Report:
Summarize the final steps in model development, including any additionaloptimizations or
adjustments made based on feedback and validation results.
Present the final evaluation metrics for the model. Discuss how well the modelperforms against
the project objectives and success criteria.
Outline the plan for deploying the model into a production environment.Include considerations for
scalability, monitoring, and maintenance.
WEEK–5 (From Dt:02/02/2024 to Dt:07/02/2024)
Objective of the Activity Done: Final Model Development, Model Evaluation, Model
Deployment Plan, Documentation Finalization.
Detailed Report:
Summarize the final steps in model development, including any additionaloptimizations or
adjustments made based on feedback and validation results.
Present the final evaluation metrics for the model. Discuss how well the modelperforms against
the project objectives and success criteria.
Outline the plan for deploying the model into a production environment.Include considerations for
scalability, monitoring, and maintenance.
WEEK–6 (From Dt:08/02/2024 to Dt:13/02/2024)
Detailed Report:
Confirm that all project documentation is finalized and comprehensive. Ensurethat it includes
deployment instructions, model monitoring procedures, and any other relevant details.
Summarize any additional communications with clients or stakeholders Discuss any feedback
received and actions taken.
WEEK–7(FromDt:14/02/2024 to Dt:19/02/2024)
Detailed Report:
Summarize the analysis of the model's performance in the productionenvironment.
If applicable, discuss any user feedback received after the model's deployment.Detail any iterations
or improvements made based on this feedback.
Provide a final evaluation of the project's success against the initial goals andobjectives. Discuss
any key insights, achievements, or areas for improvement.
WEEK–8(FromDt:20/02/2024 to Dt:25/02/2024)
Objective of the Activity Done: Continued Monitoring and Analysis,User Feedback and Final
Iterations, Knowledge Transfer Confirmation, Final ProjectEvaluation.
Detailed Report:
Summarize ongoing monitoring and analysis of the model's performance in theproduction
environment.
If applicable, discuss any final user feedback received and the last iterations orimprovements made
to the model or system.
Revisit the project's initial goals and objectives. Provide a final evaluation ofthe project's overall
success and discuss any lessons learned.
WEEK–09(FromDt:26/02/2024 Dt:02/03/2024)
Revisit the project's initial goals and objectives. Provide a final evaluation of
the project's overall success and discuss any valuable insights gained.
WEEK–10(FromDt:03/03/2024 to Dt:08/03/2024)
Detailed Report:
Summarize ongoing analyses of the model's performance in the production environment. Discuss
any optimizations or adjustments made based on continued monitoring.
If applicable, discuss any additional user feedback received and the iterations or improvements
made to the model or system.
If applicable, confirm the completion of any knowledge transfer activities Ensure that team
members
Revisit the project's initial goals and objectives. Provide a final evaluation of
the project's overall success and discuss any valuable insights gained.
CHAPTER 5: OUTCOMES DESCRIPTION
Technical Skills:
Programming Languages:
Python: Widely used for data manipulation, analysis, and machine learning. Libraries likeNumPy,
Pandas, and sickie - learn are commonly employed.
R: Used for statistical modeling and analysis. Popular in academia and certain industries.
Data Visualization:
Matplotlib: A 2D plotting library for Python.
Seaborn: Built on top of Matplotlib, Seaborn provides a high-level interface for drawingattractive
and informative statistical graphics.
Platy: An interactive graphing library for Python.
Machine Learning:
Sickie-learn: A machine learning library for classical algorithms and tools for data mining anddata
analysis.
Tensor Flow and Porch: Deep learning frameworks widely used for neural networkdevelopment.
Statistical Analysis:
Statistics: A solid understanding of statistical concepts is crucial for hypothesis testing,confidence
intervals, and data interpretation.
Database Management:
SQL: Proficiency in querying relational databases using SQL is essential.
NoSQL databases: Understanding and working with non-relational databases like MongoDBor
Cassandra.
Business Skills:
Domain Knowledge:
Industry Understanding: Familiarity with the specific industry or domain the organization
operates in is crucial for interpreting data in a meaningful business context.
Communication Skills:
Data Storytelling: The ability to convey complex findings in a clear and compellingmanner to non-
technical stakeholders.
Visualization Communication: Effectively using visualizations to convey insights toboth technical
and non-technical audiences.
Problem-Solving:
Critical Thinking: The capacity to approach problems with a logical and analyticalmindset.
Decision-Making: Contributing to decision-making processes by providing data-driveninsights.
Collaboration:
Interdisciplinary Collaboration: Working effectively with professionals from diverse fields,
including business analysts, executives, and IT teams.
Teamwork: Collaborating with cross-functional teams to achieve common goals.
Project Management:
Project Planning: Effectively planning and organizing data science projects.
Zero Trust Cloud Security is a modern security framework that ensures secure access to cloud
environments by eliminating the notion of inherent trust within a network. Unlike traditional
security models that rely on a strong perimeter, Zero Trust treats all users, devices, and
applications as potential threats, requiring verification and continuous monitoring at every access
point.
Continuous Verification ("Never Trust, Always Verify"): Every request to access data or
resources must be verified, regardless of whether it originates from inside or outside the network.
This includes robust identity verification through multi-factor authentication (MFA), device
health checks, and user context analysis.
1. Least Privilege Access: Users are granted the minimal level of access necessary to
perform their tasks. This principle ensures that even if a user or device is compromised, they
cannot access more than what is required, reducing the potential impact of an attack.
2. Micro-Segmentation: Instead of securing the entire cloud network with a single
perimeter, micro-segmentation breaks the network into smaller zones, each with its own access
policies. This prevents lateral movement within the cloud, containing threats to one part of the
network if an attack occurs.
3. Endpoint Security and Device Trust: In a Zero Trust model, every device accessing the
cloud is treated as untrusted until proven otherwise. Endpoint detection and response (EDR)
tools, alongside device health checks, ensure that only secure and compliant devices can connect
to the network.
4. Real-Time Monitoring and Analytics: Zero Trust requires ongoing monitoring of
network traffic, user behavior, and system logs. Anomalous activity, such as unusual login
attempts or unauthorized access requests, can be flagged and responded to in real time, ensuring
threats are quickly addressed.
5. Encryption and Secure Access: Data is encrypted both in transit and at rest to protect it
from unauthorized access or exposure during transmission across cloud environments. All
communications are secured through encryption protocols like TLS and VPNs for remote access.
6. Assume Breach Mentality: Zero Trust operates with the mindset that breaches are inevitable.
This means preparing for the worst-case scenario and focusing on minimizing the impact of any
compromise. Regularly auditing systems, improving detection capabilities, and having an incident
response plan in place are critical to reducing breach effects.
Challenges:
Complex Implementation: Transitioning from a traditional security model to a Zero Trust
architecture requires significant planning, resource investment, and a clear strategy for integrating
existing infrastructure.
Continuous Management: Zero Trust is not a "set it and forget it" solution. It demands ongoing
monitoring, updates, and adjustments to policies as users and devices change.
Initial Costs: Adopting a Zero Trust approach can involve substantial upfront costs related to
upgrading systems, purchasing new security tools, and training personnel.
1) Oral Communication 1 2 3 4 5
2) Written Communication 1 2 3 4 5
3) Initiative 1 2 3 4 5
5) Attitude 1 2 3 4 5
6) Dependability 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
12) Productivity 1 2 3 4 5
15) OVERALLPERFORMANCE 1 2 3 4 5
Evaluation By the Person in Charge:-
Student Name NERIYANURU VEDA PRIYA
: 228X1A4291
Registration No
Date of Evaluation :
Please note that your evaluation shall be done independent of the student’s self- evaluation
Rating Scale: 1 is lowest and 5 is highest rank.
1) Oral Communication 1 2 3 4 5
2) Written Communication 1 2 3 4 5
3) Initiative 1 2 3 4 5
4) Interaction with staff 1 2 3 4 5
5) Attitude 1 2 3 4 5
6) Dependability 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
8) Planning and organization 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
11) Quality of work 1 2 3 4 5
12) Productivity 1 2 3 4 5
13) Progress of learning 1 2 3 4 5
14)Adaptability to the 1 2 3 4 5
organization’s culture/policies
15) OVERALLPERFORMANCE 1 2 3 4 5