Managing The Cloud 11 and 12
Managing The Cloud 11 and 12
Agility
Capability
Cost
Quality
Risk
Security
Securing the Cloud
Areas of cloud computing that were uniquely troublesome:
• Auditing
• Data integrity
• e-Discovery for legal compliance
• Privacy
• Recovery
• Regulatory compliance
In order to evaluate your risks, you need
to
perform the following analysis:
• 1. Determine which resources (data, services, or
applications) you are planning to move to the cloud.
• 2. Determine the sensitivity of the resource to risk. Risks
that need to be evaluated are loss of privacy, unauthorized
access by others, loss of data, and interruptions in
availability.
• 3. Determine the risk associated with the particular cloud
type for a resource. Cloud types include public, private
(both external and internal), hybrid, and shared community
types. With each type, you need to consider where data and
functionality will be maintained.
• . Take into account the particular cloud service model that
you will be using. Different models such as IaaS, SaaS, and
PaaS require their customers to be responsible for security
at different levels of the service stack.
• 5. If you have selected a particular cloud service provider,
you need to evaluate its system to understand how data is
transferred, where it is stored, and how to move data both
in and out of the cloud.
The security boundary
Security service boundary
Securing Data
These are the key mechanisms for protecting data
mechanisms:
• Access control
• Auditing
• Authentication
• Authorization
Brokered cloud storage access
Under this system, when a client makes a request for
data, here's what happens:
1. The request goes to the external service interface (or
endpoint) of the proxy, which has only a partial trust.
2. The proxy, using its internal interface, forwards the
request to the broker.
3. The broker requests the data from the cloud storage
system.
4. The storage system returns the results to the broker.
5. The broker returns the results to the proxy.
6. The proxy completes the response by sending the data
requested to the client.
Establishing Identity and Presence