What is cloud security and why is it becoming a trend today? Let’s get to know these concepts!
To what extent, at what point can cloud service secure your business data? Although cloud computing has been trending for years, so far it is still a new technology that varies from concept to reality in the enterprise.
In this article, as we said before, we want to discuss more about cloud security.
Cloud computing security is an area of research that covers policy, technology, and control issues to protect the data and architecture of cloud computing.
Behind each compute cloud is a set of security resources to ensure a safer cloud environment than the compute environment that the customer owns.
There are three types of cloud: private, public and hybrid.
At the server level, the hypervisor is used to create logical servers on physical servers. Logical servers called virtual machines (VMs) are isolated and placed on Virtual Local Area Networks (VLANs). Storage is separated by zone and data store or logical unit for each virtual machine. By default, virtual machines and VLANs do not allow virtual machines to communicate with anything. This will not create value if the virtual machines are completely isolated, so the client (not the provider), including the security team, determines the VLAN that each VM should allocate. It also contains the rules for protocols, ports and firewalls which can be used.
The service provider establishes typical administrative access through a separate network interface card and an administrative VM. But the access to services needed by service providers will be limited. IBM Cloud Managed Services provides individual tasks for administrators to ensure the security of the support team, support system team, network support team.
The expansion uses virtualization technology to build the infrastructure of cloud computing, which generates specific security issues for customers (cloud service users). Virtualization technology changes the link between the operating system and hardware architectures such as computing, storage, and networking. This creates a new layer - virtualization - that needs to be configured, managed, and secured. The issues to consider are virtualization software (also known as hypervisor). For example, when a security problem occurs in managed workstations with virtualized software management software, it can crash the entire system.
Last but not least, be fast but not too fast. Cloud is required to compete effectively in the digital economy, but there are still a lot of new things. Make sure that you understand how the cloud is different; the responsibility and position of the business leader in the decision-making process, knowledge and skills that your team needs to operate effectively. Just do not sit still as your opponent gains the ability and flexibility by moving to the cloud. Good luck to you!
To what extent, at what point can cloud service secure your business data? Although cloud computing has been trending for years, so far it is still a new technology that varies from concept to reality in the enterprise.
In this article, as we said before, we want to discuss more about cloud security.
What is Cloud Security?
Everyone agrees that customers’ requirements are well suited to cloud computing solutions. |
Behind each compute cloud is a set of security resources to ensure a safer cloud environment than the compute environment that the customer owns.
There are three types of cloud: private, public and hybrid.
Three types of cloud security: private, public and hybrid |
Private
Private compute cloud can be located at the customer's data center or at the service provider premise. Client workloads run on separate physical servers, separate physical repositories, and the level of individual physical connection devices, aggregated into a shared network, possibly a local backbone area network or shared Internet. Customers can choose to connect to the Internet, private network connection for external access or connect to both.Public
Public compute cloud is located in customer data centers and is available in many geographic locations. The workloads of clients run on physical servers as other clients. Physical repositories and physical connections are shared between clients. However, even with the level of physical sharing, this does not mean that a customer can access another customer's system.At the server level, the hypervisor is used to create logical servers on physical servers. Logical servers called virtual machines (VMs) are isolated and placed on Virtual Local Area Networks (VLANs). Storage is separated by zone and data store or logical unit for each virtual machine. By default, virtual machines and VLANs do not allow virtual machines to communicate with anything. This will not create value if the virtual machines are completely isolated, so the client (not the provider), including the security team, determines the VLAN that each VM should allocate. It also contains the rules for protocols, ports and firewalls which can be used.
The service provider establishes typical administrative access through a separate network interface card and an administrative VM. But the access to services needed by service providers will be limited. IBM Cloud Managed Services provides individual tasks for administrators to ensure the security of the support team, support system team, network support team.
Hybrid
Hybrid cloud is simply part of the customer's computing infrastructure, located between the private cloud and the public cloud. IBM Cloud Managed Services involves placing virtual machines on a network extension, called an extended premises (EP) network. Many customers connected to the EP network have returned to the traditional IT infrastructure or private cloud data center, and customers have full control over any firewall rules they want to set up for the public cloud VM.The security issues related to Cloud Security
Cloud security is twofold: the security issues faced by cloud providers (software vendors, platforms and infrastructure), and customers’ security issues encountered. Cloud providers must ensure that the infrastructure they provide is secure, meaning that their data and applications are protected. At the same time, the customer must ensure that the provider has taken appropriate security measures to protect their information.The expansion uses virtualization technology to build the infrastructure of cloud computing, which generates specific security issues for customers (cloud service users). Virtualization technology changes the link between the operating system and hardware architectures such as computing, storage, and networking. This creates a new layer - virtualization - that needs to be configured, managed, and secured. The issues to consider are virtualization software (also known as hypervisor). For example, when a security problem occurs in managed workstations with virtualized software management software, it can crash the entire system.
Cloud security controls
The security architecture of cloud computing is only effective if appropriate defense methods are deployed. An effective cloud security architecture should recognize the emerging security implications. The management of security issues involves control and security controls. These controls are designed to protect weak points in the system and reduce the impact of an attack. While there are many ways to control cloud computing security, there are several common ways.Preventing
This control is set up to prevent targeted attacks on the cloud. Relatively similar to a warning sign on the fence or property, these controls do not reduce the likelihood of a real compromise.Protecting
The controls enhance the power of the system by managing vulnerabilities. Precautionary controls will protect the system's vulnerabilities. If an attack occurs, preventive controls are in place to ensure minimal damage and system intrusion.Repairing
Adjustment controls, repairs are used to reduce the impact of attacks. Unlike preventive controls, repair controls are implemented when attacks occur.Error detecting
Metering controls are used to detect any possible attack on the system. In the event of an attack, the detection control will signal the precautionary control or remedy to solve the problem.Last but not least, be fast but not too fast. Cloud is required to compete effectively in the digital economy, but there are still a lot of new things. Make sure that you understand how the cloud is different; the responsibility and position of the business leader in the decision-making process, knowledge and skills that your team needs to operate effectively. Just do not sit still as your opponent gains the ability and flexibility by moving to the cloud. Good luck to you!
Why Cloud Security Is Convenient And Necessary For Businesses?
Reviewed by thanhcongabc
on
December 26, 2017
Rating:
No comments: