How To Secure Your Cloud Hosting? Part 1

How to secure your cloud hosting? Part 1

So having completed the migration of your application or site to the cloud, say to AWS or RS, be prepared to get surprised by the initial hacker attack attempts on your site! Recently, we had the experience of handling two projects, one with AWS and another with RS. We were surprised to take note of our system event viewer logs.

(See the screen shot).

RDP- Remote Desktop Protocol

To start the hardening process first we disabled the RDP service in the server. This will have its own effects as something like closing our own house door. We started using the console provided.

We found that a several hundred attempts to login in to our account from the hackers worldwide within two days of launch. Bad guys from all around the world… from Iran, China, Korea and so many other countries. It seems that they are never going to stop trying to get in. So the so called hardening work started. Hardening the cloud system. Let me explain what we did to harden the cloud servers.

It is told that ‘ a ship in harbor is safe. But that is not what ships are for.’

Similarly the objective of cloud hosted site or application is to give ease of access to the intended worldwide varied audience. At the same time, we should have ease of access too for doing the admin works, adding content, making changes to the code etc., One of the oldest ways practiced by hackers is cracking the Administrator password. If our id can be taken, an outsider becomes insider. In the cloud computing model, every one including System Admin is an outsider! The cloud eco system throws open an added list of vulnerabilities. In the initial days immediately after the launch, we have to make an approach wherein we systematically close down ways of outsider intruding in to our system.

To be continued in Part 2

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Find out more
View All Articles

Sorry, comments are closed for this post.

From Illusion To Reality: Up Personal On Cloud Computing Privacy

From Illusion To Reality: Up Personal On Cloud Computing Privacy

Cloud Computing Privacy We are under an illusion around the cloud computing. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how…

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

On-Premise VoIP vs The Cloud

On-Premise VoIP vs The Cloud

Modern Day Phone Systems The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if we cut through all the strange wording and focus on the features that make each system unique, we can develop enough of an understanding to make a well-informed decision for…

Working With Hybrid And Multiclouds: Use Cases For Multicloud Computing

Working With Hybrid And Multiclouds: Use Cases For Multicloud Computing

Working with Hybrid and Multiclouds A multicloud strategy can deliver real gains in IT flexibility, cost savings, and can increase an organization’s responsiveness to changes in the market or internal developments in the business itself. But the migration of apps and services to a multicloud system isn’t without its challenges. Most IT managers I talk…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

Hot Emerging Trends – The Pizza Delivery Drone

Hot Emerging Trends – The Pizza Delivery Drone

The Pizza Delivery Drone Recently, drone delivery systems have been discussed as future state plans for many vendors. I personally think the traceable IoT-based pizza delivery drone is the next big thing. If you think about it, your pizza makes it to your house much faster. Since the drone carries both a temperature and a…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising