How To Secure Your Cloud Hosting? Part 3

How To Secure Your Cloud Hosting? Part III

Authentication 

For signing in to the cloud account AWS goes with mail id and password as the usual credentials. Rackspace goes with user id and password. AWS introduced Multi Factor Authentication long time back. Multi Factor Authentication involves an authentication device. Gemalto provides the compatible device. (See image of Gemalto device) When we sign in to our AWS Portal or AWS Console, access is granted when we give the authentication credentials of email id and password. When we opt in for AWS MFA (Amazon Web Service – Multi Factor Authentication) feature, access will be granted only when the precise code from the authentication device is provided additionally. This is an extra protection. This protection given to AWS Management Console can be extended to EC2 Instances, CloudFront and S3 Versioning.

Securing Instances

In the case of AWS EC2, it is not that Quick Start Images are there but also community AMIs (Amazon Machine Instances),  a several thousands of them. We found some of them already hardened with security features. These cover Windows and other Unix distros.  When creating AWS instance, Key Pair and Security Zone are the two items required. Key Pair has to be named and downloaded to the computer.

Tip: Save the key pair in a secure place so that you can remember.

Only once can we get a Private Key. For the first time you access an instance this will be used.

In the case of Rackspace, the root password will be shown on the screen. Also, Rackspace sent an email containing an IP address and Password.

AWS Security Zone can be assumed as a firewall.

Tip: Security Zone settings are the ultimate decider that will over rule the other settings that we give in instances.

It is customary to choose default zone, when we are working on the first time. To harden the system, better to go for specific protocols and ip addresses specifically. If we name the security zones uniquely, we can use it for future instances.

We have done projects in the past one year with Gogrid, Microsoft Windows Azure, Amazon Web Services and Rackspace. The cloud services are continuously evolving with new features. We find that issues are being resolved continuously by service providers. Just for an example: We covered the issues involved in sending email from cloud.

On 25th Jan 2011, AWS announced the introduction of Simple Email Service. We can cover more on the security of cloud services related to SSH access, application/ code etc., in future posts.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Find out more
View All Articles

Sorry, comments are closed for this post.

The Implication Of Consumers Not Having Their Heads In The Cloud

The Implication Of Consumers Not Having Their Heads In The Cloud

Customers CAN Better Protect Themselves The majority of cloud consumers don’t understand what cloud is let alone what the implications of transacting in the cloud or of having their data and digital assets stored in the cloud. As a result most consumers are their own worst enemy when it comes to putting themselves at risk…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

What Should SMEs Do To Prevent Common Mistakes?

What Should SMEs Do To Prevent Common Mistakes?

Spending And Planning Wisely Overview – Billions of pounds from valuable IT and communication (ICT) budgets are wasted each year due to common mistakes in the market. These are some of the pitfalls you should avoid. With small businesses (especially start-ups with online ambitions) relying more and more on their understanding and utilisation of ICT, it’s…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor