How To Secure Your Cloud Hosting? Part 2

Practically Speaking About Cloud Computing

Before getting into the nitty gritty of what we did in our projects for hardening the cloud servers hosted by us, we would like to emphasize the following, so that these can be firmly embedded in the mind set of readers.

  • First, the way cloud computing is attracting attention is mind boggling. Enterprises have started adopting to cloud concept where in they go for sharing public infrastructure. Having started this trend, it will go without any stopping in future. Traditional Security measures practiced in-house are not enough in the new trend.
  • Second, the inherent nature of elasticity multiplies the security need. Servers that we are talking about here are not servers as we saw them in the past as boxes. With virtualization, the servers we mention here are only files; instances as they may be called. System administrators should be aware of this fact.
  • Third, Organizations those turn in to IaaS, PaaS and SaaS, seems to be always in a hurry. They want the server to be up yesterday! There is no time given to do network and system administration jobs. As such there is a serious need to look at all the aspects of cloud servers starting from operating system, application security, to implementation of ISMS.
  • Fourth, the cyber criminals out there are even more sophisticated than what we could figure out every time! An entire underground business is running there parallel. There is economy working there, too. New servers coming up in cloud en-masse is aiding their activities. It is just that the forces that have nothing to do with our business may be encountered.
  • Fifth, the implication of security breach is severe nowadays. Reputation of businesses built over years and decades can go shambles in minutes! Just remember the recent news on the down times and outages of global services. Overnight businesses can go to bankruptcy if there is an attack.

Traditionally, system security is approached with Authentication/Access Control Methods, Input Handling and Denial of Service attacks.

Authentication:

We started with RDP in the first part. Remote Desktop Connection is a required feature for server administration. Initially closing this is just like closing the house door. We did that. We need to do it in the initial days of server gone live. Because everyone is trying to hack the password and try to enter through Remote Connection, as soon as the cloud server is hosted! Then create a Secondary Administrator. The secondary Administrator user name should be very difficult to guess and figure out. The password for the same should be strongest.

Tip:

In case we resort to complete disable or deletion of Administrator, as an extreme security measure, we can still log in through console. But, for resetting the password there will not be a way. Hence, as resetting the password may be required in future in the chance of us forgetting the credentials, better not to disable the Administrator access.

-Screen shot of new user (Alternate user / Secondary Admin) creation in Windows Server.

(To be continued in Part 3)

By Malick Md

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

One Response to How To Secure Your Cloud Hosting? Part 2

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving