The Security Components Of A Cloud Computing System
The different components that contribute to the security of a cloud computing system have the following characteristics:
Management Console Service (Provisioning)
The startup and reconfiguration of system components are very fast. Multiple instances can be provisioned at multiple data centers around the world in minutes. Network reconfigurations are facilitated. On the other hand, the security of use of the management console becomes imperative (multi-factor authentication, encrypted connection, etc.)
Data Storage Service
The benefits of data storage in the cloud depend on the providers, but in general, they fragment and distribute the data. These are also often copied in different treatment centers. These operations greatly improve data security. If their content is to remain confidential, it should be encrypted before storage.
One of the big benefits of cloud for application development and operation is virtualization. It allows you to prepare safe master configurations that just need to be duplicated to deploy. The challenges remain the securing of data in shared applications and the security between instances guaranteed by hypervisors.
The main feature of the Cloud is the implementation a priori enhanced security and auditable (authentication, logs, firewalls, etc. ..). It remains to deal with the risks associated with integration with users’ applications as well as the always delicate processes of updates.
Cloud network perimeter security
These largely shared infrastructures provide means of protection beyond the capabilities of a normal enterprise, such as Distributed Denial of Service (DDOS) protection. Perimeter security mechanisms are generally well-designed (identity provider, authentication, firewall, etc.). On the other hand, it remains to treat the subjects related to the mobility.
The economic benefits of the cloud
Estimates of the economic benefits of cloud solutions vary significantly. It is indeed easy to measure the cost of a cloud solution, just look at the bill. On the other hand, it is less simple to obtain equivalent significant figures on the costs of an application in a company. However, we can distinguish several cases where the comparison is simple to make.
The benefits are at many levels. First, the supply of development machines and network equipment is immediate without any investment. It is an essential element of any agile approach. Machine cloning and snapshots allow simple implementations and rewinds. Configurations required for maintenance operations or load tests are put online only when necessary and no longer immobilize expensive configurations. We pay for the use. Development infrastructure costs are usually divided by factors of 10 to 100.
Applications in SaaS mode
Pay-as-you-go, immediate availability and gains on infrastructure and associated technical means generally lead to a 10-fold cost splitting while improving the quality of service. This is easy to see, for example, from a local office managed to a SaaS solution like Google Apps.
In other cases, the comparison is less easy. However, in large companies where internal hosting costs are billed back to the user services, there are often reports of 1 for cloud solutions versus 3 to 10 for internal hosting.
Another interesting indicator is the use of these cloud solutions by companies that are successful on the Internet. Most of them use these public infrastructures which allow fast climbs with no prior investment.Tags: wireless