The Lighter Side Of The Cloud – Education
The Lighter Side Of The Cloud – Growing Up
The Lighter Side Of The Cloud – Server Management

How To Secure Your Cloud Hosting? Part 3

How To Secure Your Cloud Hosting? Part III

Authentication 

For signing in to the cloud account AWS goes with mail id and password as the usual credentials. Rackspace goes with user id and password. AWS introduced Multi Factor Authentication long time back. Multi Factor Authentication involves an authentication device. Gemalto provides the compatible device. (See image of Gemalto device) When we sign in to our AWS Portal or AWS Console, access is granted when we give the authentication credentials of email id and password. When we opt in for AWS MFA (Amazon Web Service – Multi Factor Authentication) feature, access will be granted only when the precise code from the authentication device is provided additionally. This is an extra protection. This protection given to AWS Management Console can be extended to EC2 Instances, CloudFront and S3 Versioning.

Securing Instances

In the case of AWS EC2, it is not that Quick Start Images are there but also community AMIs (Amazon Machine Instances),  a several thousands of them. We found some of them already hardened with security features. These cover Windows and other Unix distros.  When creating AWS instance, Key Pair and Security Zone are the two items required. Key Pair has to be named and downloaded to the computer.

Tip: Save the key pair in a secure place so that you can remember.

Only once can we get a Private Key. For the first time you access an instance this will be used.

In the case of Rackspace, the root password will be shown on the screen. Also, Rackspace sent an email containing an IP address and Password.

AWS Security Zone can be assumed as a firewall.

Tip: Security Zone settings are the ultimate decider that will over rule the other settings that we give in instances.

It is customary to choose default zone, when we are working on the first time. To harden the system, better to go for specific protocols and ip addresses specifically. If we name the security zones uniquely, we can use it for future instances.

We have done projects in the past one year with Gogrid, Microsoft Windows Azure, Amazon Web Services and Rackspace. The cloud services are continuously evolving with new features. We find that issues are being resolved continuously by service providers. Just for an example: We covered the issues involved in sending email from cloud.

On 25th Jan 2011, AWS announced the introduction of Simple Email Service. We can cover more on the security of cloud services related to SSH access, application/ code etc., in future posts.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us

Latest posts by Glenn Blake (see all)

One Response to How To Secure Your Cloud Hosting? Part 3

Support

Recent

Beyond Gaming: Three Practical Applications For Oculus Rift

Beyond Gaming: Three Practical Applications For Oculus Rift

Three Practical Applications For Oculus Rift  Since the announcement of the Oculus Rift in 2012 gamers and game developers alike have been frenzied trying to both get their hands on the unit or build their own proprietary VR machine. The VR gold rush has since lead to the announcement of Project Morpheus from Sony and…

The Lighter Side Of The Cloud – Due Diligence

The Lighter Side Of The Cloud – Due Diligence

By David Fletcher Please support our comics by sharing, licensing or visiting our cloud sponsors (Below). Your support goes a long way in allowing us to continue to produce our lighthearted comics each week.   About Latest Posts Follow UsGlenn BlakeGlenn Blake is a writer for CloudTweaks and has been writing about technology trends for…

Popular

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Sponsored Posts

From C:\Prompt To CYOD – The Timely Shift To Desktop as a Service

From C:\Prompt To CYOD – The Timely Shift To Desktop as a Service

The Timely Shift to Desktop as a Service There may be some colleagues lurking within any given workforce who remember what a C:\> prompt meant. Much like the ring from Middle Earth, it had the power to make things happen. Desktop computers at that time were large grey beasts, with their only wired connection being…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising