Security And Management In The Cloud

Security And Management In The Cloud

Though there are various challenges involved in maintaining a cloud service, one of the major challenges that organizations face is security management. The advent of global computing represents cloud computing in totality. This has transcended boundaries, not just nationally, but also internationally.

This same globalization is another challenge that has emerged for cloud technology, because traditional security models do not apply in the cloud infrastructure. Let us take, for example, firewall infrastructure. The very invention of firewalls in traditional systems was meant to provide “blocking-security” for single hardware devices. However, with cloud computing models, the very definition of this is thrown out of the window. The cloud itself is outside these defined perimeters, and there need to be device-separated regimes for cloud security management. Traditional IT regimes work less on this kind of infrastructure and are not quite practical. Since we are making massive changes in the infrastructure, changes are also needed in security management.

Why is it difficult to maintain security on the cloud?

Security is made difficult by the fact that the infrastructure is not owned by the party itself – it is somebody else who owns the entire infrastructure. Hence, it is difficult to get changes in security implemented as you try to scale the rest of your IT infrastructure. If these two growths are not in complete synchronization with each other, there are bound to be holes in the coverage and gaps that are difficult to seal down.

Automating firewall management clouds

This is not just a possibility; it is essential. There is a high degree of elasticity associated with cloud infrastructure – be it public, private or hybrid. As a result, security is essential and must be deployed on the basic cloud server. If you are taking a third-party cloud, you must insist on a security check at the cloud server level. Time-based controls, which close ports such as RDP, etc. and open only when there is a demand, are a good option. This ensures that your servers are always secured, and since you have the security server on your own side, the policies can be easily coupled with your infrastructure.

Should one take a hybrid approach to security solutions?

There are various reasons why the hybrid approach is perhaps not a good one. Most traditional security methods do not exist for the cloud. Also, the entire process of securing your cloud infrastructure is quite different from securing traditional IT infrastructure. Many server admin ports such as SSH, etc., are left open in traditional infrastructure. This is because the server sits behind the corporate infrastructure, and there is abundant security and less risk.

However, this is not possible with the cloud, as everything is so elastic that there are no fixed perimeters. In this case, therefore, admin ports cannot be left open as they were in the traditional case. There needs to be a custom solution for this which is different for every different cloud. The need of the hour, however, is to realize the importance of these custom security management systems to the cloud.

By Kaamil Nakhasi

0 Responses to Security And Management In The Cloud

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

IBM and SAP Announce Industry’s Largest Cloud Deal

IBM and SAP Announce Industry’s Largest Cloud Deal

IBM and SAP Announce Industry’s Largest Cloud Deal IBM and SAP have shaken the cloud computing world this afternoon with the announcement of one of the largest cloud deals in the industry’s history – bringing together two of the largest technology companies in a bid to offer a more holistic service to their clients. SAP…

Featured Sponsors

Salesforce Service Cloud: Air Traffic Control For Your Customer

Salesforce Service Cloud: Air Traffic Control For Your Customer

Salesforce Service Cloud One of the greatest benefits of the increasingly reliable and ubiquitous state of cloud technology is the removal of business silos and the consolidation of information flow, both in-house and on the road. This is of particular importance to the many different types of professionals whose work involves customer relationship management (CRM).…

Sponsors

Can You Run Your Business Entirely From A Mobile Device?

Can You Run Your Business Entirely From A Mobile Device?

Can You Run Your Business Entirely From A Mobile Device? You know the feeling. It’s 8:00 a.m. Your bus is stuck in traffic, so you pull out your phone and start answering work emails. While you may rely on your mobile device’s apps for everything from an alarm clock to a fitness tracker to a…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter