Understanding The Different Roles In A Cloud Computing Setup

Understanding The Different Roles In A Cloud Computing Setup

A Cloud Computing Setup

If you are migrating from enterprise to a cloud based solution, it is necessary to understand the different roles in cloud computing. In this post, I will cover the 6 major roles in the cloud setup.

Cloud Service Provider

This is the entity that provides the cloud service. The cloud service provider owns and controls the cloud computing platform. The services include SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) and IpaaS (Integration Platform as a Service).

CloudTweaks Comic

Based on the services provided, the CSPs can be broadly categorised into 3 types:

  • Application provider – These are providers that directly provide you access to an application without you having to worry about the layers underneath. Thus, if you are running a mail application with Google, you don’t need to worry much about the server infrastructure, resources such as RAM or platforms. Examples include Dropbox, Salesforce.com, Google Apps and Microsoft Office 365.

  • Resource provider – These provide virtualization systems on top of their servers and lets you buy resources such as RAM, computing cycles and disc space. Offerings from providers such as Rackspace Cloud and Amazon Web Services (AWS) typically fall under this category.

  • Infrastructure provider – These lease servers and associated infrastructure from their datacenters. The infrastructure includes servers, storage, bandwidth and the datacenter (with power, space and personnel to man them). Companies such as Rightscale provide you the complete infrastructure to set up your cloud service.

Cloud Consumer

This is the user that is consuming the cloud services. The “Cloud Consumer” could be one of the following:

  • Developers in your enterprise who are building the apps using the cloud infrastructure.

  • Office workers and end consumers who are accessing the storage and productivity applications.

  • IT support team that uses the cloud services such as cloud backups to supplement their resources.

Cloud Service Brokerage

Cloud Service Brokerage (CSB) provides intermediation services between the consumer and the provider.

They provide three major services:

  • Aggregation services – integration service different cloud service providers,

  • Intermediation services – help you identify the right service provide, consistent billing and support

  • Arbitrage services – getting good deals on what you pay for different cloud services.

Cloud Architects

These are the guys who will help you design your cloud solution and develop the right cloud architecture that suits your needs. The architecture should incorporate your storage, security, computing and compliance needs and build the right design that satisfies these needs.

Cloud Auditor

Security is a very critical aspect in any cloud setup. Since you might be storing confidential enterprise data on a server over which you have less control, it is important to put in place the right auditing and regulatory processes. Cloud Auditors are a third party who will provide independent assessments on your cloud setup and point out to the security vulnerabilities, data leaks and performance issues.

There are 5 major types of audits that these companies might offer:

  • Data security audit – making sure that your enterprise data and those of your customers are not leaked out.

  • Regulatory compliance audit – these are audits that make sure your cloud installation satisfies all the major regulations from federal (Sarbanes-Oxley, HIPAA), state level (California’s data breach law, Massachusetts’ data protection law) to industry body level.

  • Performance and Reliability audit – this audit measures how good is your setup for various performance tests. These could include stress testing and manual testing to find out bottlenecks.

  • DR/BC (Disaster Recovery and Business Continuity) Audit – finds out how fast can you recover from disasters and how much of the data can you salvage.

  • ROI (Return on Investment) audit – this checks the business justifications of the cloud setup and make sure it makes accounting sense.

Cloud Carrier

This is the provider of transport level infrastructure to the cloud and connects cloud service provider and the customers. Although the telecom companies providing these services are assumed to operate in the lowest part of the stack, these days the carriers are getting more aggressive in growing up the value chain by providing transport solutions tailored to the needs of various cloud providers and consumers.

By Balaji Viswanathan

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…