Cloud Security Providers Employ a Hierarchy of Containment Strategies Cloud Computing

The inherent efficiencies of public clouds are hard to dispute; therefore the only reasons to employ a private cloud are the related concerns of privacy and security. Over the years, a hierarchy of containment strategies have been developed. Let’s look at an extreme case.

The data in this case is so sensitive that it must be contained within a single secure room. Physical access is restricted by complex layers of physical access control and sally ports. The computer itself is unconnected to the Internet, may be protected from eavesdropping by expensive shielding, and log-in restrictions may include fingerprints, retina scans, and/or password control.

A sally port to restrict access.

A sally port to restrict access.

CIA Headquarters, Langley, Virginia.

CIA Headquarters, Langley, Virginia.

In this example, the data is pretty well protected, but the operation is costly, and access is both limited and extremely inconvenient. At the other extreme consider a site hosting public data that is accessible by all (such as a public Web site) but where the concerns relate to unauthorized changes to the data (hacking) or DoS attacks (massive high-speed pinging of the Securing the Cloud: Reliability, Availability, and Security server in an attempt to make a computer resource unavailable to its intended users).

These are real concerns, and they are not always limited to high-profile (well-known) sites; some hackers systematically troll the Internet seeking out vulnerable sites that are ripe for attack.



Face Book Twitter Google Plus Instagram Youtube Linkedin Myspace Pinterest Soundcloud Wikipedia

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Cloud Computing Topics