Notes From The Field: 01 Cloud+ Concepts Models
Notes From The Field: 01 Cloud+ Concepts Models
Grid technology
Service-oriented Architectures
Old names
Distributed Computing
Browser as a platform
Abstraction
4 Expanding Security experience
9 We migrated everything to the cloud. Layering
A demystified definition
4 We had to change vendors a few times. Notes from the field Definition Large, optimized, organizations rent you their extra CPU cycles
Contracted
6 We had vendors change contracts. Large, well connected, empty telcos rent you their extra space
1 We had vendors migrate to the cloud without informing us. a pay-per-use model for enabling available,
convenient, on-demand network access to a shared
pool of configurable computing resources that can be
3 Where is the line between SaaS, PaaS, and XaaS? rapidly provisioned and released with minimal
management effort or service provider interaction
4 What effect does outsourcing have on the company? Problems
five key characteristics
4 What do the contracts look like?
This model promotes availability and is comprised three delivery models
Working Definition
four deployment models
Where most of us live
_
7 Hybrid cloud - example 1
1 Public – renting in the same building as you enemies Elasticity Cloud designed infrastructure 4
Public Vs Private Cloud
1 Private – Owning Cloud Native application 4
1 _ Migration Timeline
Cloud system that is scalable and reliable by construction. 1
Cloud native
Must be able to autonomously detect and mitigate 2
6 Buy
Only Exports Software as a service
Security Reference Model _ 1
No External backups
Shared Responsibility
99+ Platform as a Service
Layers of Management AWS
STAMP ON MARKET
_ 1
Tiered Storage
mount a drive
Operating system fields do not neatly fit into tables, rows, and columns
Before Format Data Classification XML - extensible markup language,
semi-structured
Application data JSON - JavaScript Object Notation
Provides a definition for the naming convention for data files and the logical file and directory/folder organization on the physical hard disk. YAML -YAML Ain’t Markup Language
Knows this inside a VM
Operating system unstructured delivered in files, such as photos or videos
Format a drive File Systems
adds logical data elements required by file
system to allocate and manage disk. Speed only
FORMATTING
applies disk striping only
RAID 0
Inverse fault tolerance
_
1
Enterprise network looks like
Standard network
_
1
Cloud looks like
one version of which was also known as
Common Internet File System
creates a map of Layer 2 physical addresses (Media
communication protocol for providing Access Control addresses) of nodes located on network
Server Message Block
shared access to files, printers, and serial segment attached to each of its interface ports
ports between nodes on a Local network Network Switching Device examines network traffic and forwards it only to
FTP is one of the common Internet Switching segment of the intended destination
protocols that transfer files from one
network host to another using TCP nodes of a virtual network are virtual machines (VMs)
File Transfer Protocol
Virtual Environments each of which sends and receives data to and from the network
Cloud Switch
client / server support VMkernel network access for VMotion, iSCSI, and NFS
VNIC
Way to abstract applications and their underlying
Virtual Switches components away from the hardware
Virtual Machine
Virtual Memory Supporting them and present a logical or virtual view of these resources
What Is Virtualization
Storage Virtualization _
1
Network function
Guest Tools _ 3
3
_ 05 Cloud+ deployed on a bare metal installation
allow hypervisor to host more virtual Host loaded on top of an already existing
machines than physically possible operating system
CPU usage often decreases significantly
with occasional increases due to Cannot boot until main operating system is
Overcommitment Ratio loaded and operational
utilization.
Type 2
works as long as the actual consumption Oracle Virtual Box
remains lower than physical memory
Hypervisor Vmware: Fusion / Workstation
Virtual machines often require more
memory when starting up or when loading
Hyper-V, vSphere, OVM, and vSphere
processes for the first time. Memory Ballooning Proprietary
Paging to disk
(c) Dean Bushmiller 2021 Memory Compression 4
A very bad thing in virtual world
an organization must fully understand the
impact they will have on existing business
processes
Budget
return on investment organization’s financial processes
profitability Culture and Business Changes
vendor services and facilities and monitoring Remediation and liability (or lack thereof)
for service disruption
included in contracts and SLAs
Dispute resolution procedures
Audits
multitenancy issues
A mechanism for reviewing and updating
penetration testing and scanning the SLA, including a change control
process
Service-Level Agreements
organization must include changes to
infrastructure, service, financial, and service-level targets, are quality-of-service
vendor/partner management practices as measurements used to measure service
well. provider performance.
Service-level objectives (SLOs)
Contractual protection
Insurance 06 Cloud+ Physical to Virtual
P2V
When negotiating
Data loss Cloud Migration Migration types
Virtual to Cloud
Data location V2C
Data ownership
The complexity of your infrastructure.
Certifiable code of practice for the cloud industry. Identifying vendor roles and responsibilities The skills of your team.
Widespread adoption based upon the trust Strategy depends on
and assurance that can be achieved Stage of the application development cycle.
through the code of practice. Cloudindustryforum.org
Information security levels
To support other appropriate cloud-based
initiatives that complement the purpose of Go fast
the code of practice
Push the boundaries
Choice of law
Make data-driven decisions (Microservices design and Messaging)
Data control Cloud Migration Principles
Service availability best practices for negotiating a cloud service contract Simplify
Liabilities and indemnities
Communicate to succeed
Deletion of data
Rehost – Lift and shift
Customer may not be required to maintain
expertise on the technology used to create Refactor – repackage your app with no major code changes
and maintain SaaS applications
Approaches Rearchitect – modernizing your code, breaking
Must understand how the applications monoliths into microservices
work and their limitations.
Rebuild – completely rebuild your application for cloud-native
Technical
Project management
Software as a Service (saas) skills Cloud service rollout Virtual Machine Templates
Vendor management
Manage expectations for changes in the system Date at which support ends
Transformation of physical into vms organized based on
On power consumption.
Using solution for service desk and Physical to Virtual (P2V) Migration will take four weeks
training purposes
Ensure the SaaS solution is accessible to end users Monitoring skills Technical skills Platespin migrate for P2V migration Instead of vmware converter
Identifying organizational skill requirements
Migrate data Virtual to Virtual (V2V)
Typical IR
IR with vendor
IR cloud multi-vendor
service description
Preparing for incident management
service-level agreement Define clearly with each vendor
support agreement maintained Incident management for cloud
who is responsible for each line of support
(c) Dean Bushmiller 2021 Must specify 5
how data is to be integrated between systems
input/output operations per second, are
the standard measurement for disk
IOPS performance.
Disk
how quickly files and directories can be
Metadata Performance created, removed, or checked.
9 Cloud+
Systems Management
Where customers have their identity Architectures for interfacing to Identity providers Assigning at least two physical NICs to a virtual switch
Virtual Switches Redundancy
capability of cloud service Each NIC connecting to a different physical switch
based on
capability of enterprise to provide
assertion based identity and attributes Network Isolation Security tools…
link to human resources
Asset management system with configuration management
Provisioning of Identity and Attributes
Provisioning other entities
Baselines to enforce configuration management
Any authentication service implemented
Server Threats
by the cloud provider should be OATH Robust change management system
compliant. With an OATH-compliant
solution, companies can avoid becoming Exception reporting system
locked into one vendor’s authentication
credentials.
Current best practices for selecting authentication services Service can move
Serverless
Encryption mechanisms should reflect the
business/usage requirements. B Cloud+
Ephemeral everything
Enable secure access and collaboration Goal Security How have these changed in cloud?
while protecting against unauthorized Configuration stored on device?
access.
Configuration part of CSP?
Unprotected information may trigger an enforcement
action to encrypt the data. Traditional Devices VPN
Encryption
WAF
Interoperable encryption
Firewall
Encryption keys should be held by the data owners
IPS
Data should be encrypted before it moves to the cloud IDS
and attached with appropriate usage permissions.
DLP
Securing the Client
Client-side Encryption FIM
refers to data while it is being transferred Controls put in place by an organization to ensure that
from one data repository to another. Data data (structured and unstructured ) of value to remains
in transit includes data sent by back-end under authorized use and care.
servers, applications and databases over
the network. Data in transit As it resides, moves and departs
Where?
from a cloud service provider offering a security as a
Concept
service (SecaaS) solution.
data while it is inside persistent storage Data at Rest
is an important element of a broader security strategy
Data in Transit around data protection.
Information classification
Change management only faster
What is the nature of the information?
Vulnerability detection and evaluation Data Loss Prevention
Who is allowed to access this information?
Subscription mechanism to vendor patch notifications
Where is this information allowed to be used/sent?
Settings matches Policy
Internal severity assessment of patch
What is the severity of exposure?
Applicability assessment of patch on target systems
Notification and alerts
Opening of tracking records in case of patch applicability
Patch Management Process
System Integrity
Detection of policy violation
Customer notification of applicable patches
Alert, Log, Reroute & Pass
Successful patch application verification
Block / Quarantine
Actions
Issue and risk management due to conflicting actions
Delete
Closure of tracking records with all auditable artifacts
(c) Dean Bushmiller 2021 8
Problem VM Suspension / Snapshot / Rollback on patch
bathtub curve life cycle
Effect
Once you identify the root cause of a failure total time allowed for making a repair / replacement
Reliability Availability Serviceability RTO whatever needs to be done to get the
it's best to isolate the failing component from the rest Component Availability
component or system back up and running
Isolation
of the system to avoid causing a chain reaction of
failures
is commonly at the point of a failure
an entire subsystem must be isolated from the system RPO
to contain the effect of the failure time needed to restore the system
Containment
ease and speed of repairing or
passive fault tolerance maintaining a system
uses fault masking to mitigate the occurrence of a Static Recovery
fault by hiding the fault from the system diagnostic time to troubleshoot and
Serviceability
determine the cause and location of a
failure and to affect its correction
active fault tolerance
uses detection and diagnostics to Dynamic Recovery Will work properly when it is required
identify a fault and affect a recovery Availability
Not downtime
Step 1: Identify the initiators of operations Process rolling back failed changes
whether the appointed service capacity Elasticity manual scalability if a failure is discovered users can be instantly redirected back to blue
scales with the service load
Peering
Incorrect subnet
Incorrect IP address
Step 1: Identify the problem.
Incorrect IP space Step 2: Establish a theory of probable causes.
Methods Storage
Capacity
Headers Network bandwidth
Protocols Performance
Load balancers Network latency
Encryption
Replication
Back ends
Front ends Connectivity Scaling
Application
DNS records
Memory management
VLAN/VXLAN/GENEVE
Service overload
Proxy Incorrectly configured or failed load balancing
tracert/traceroute Keys
E Cloud+ Trou-
flushdns bleshooting Privilege
Authentication
ipconfig/ifconfig/ip Authorization
Network troubleshooting tools
nslookup/dig Security groups
arp Expired
Curl Revoked
Packet capture
Trust
Keys and certificates
Packet analyzer
Compromised
OpenSSL client
Security
Misconfigured
Connectivity issues Misconfigured or misapplied policies