columns

Cloud computing security

Maintaining data privacy and security across Internet-based infrastructure, applications, and platforms. Securing these systems requires the efforts of cloud providers and the customers who use them, whether they are individual users or small and large businesses.

Cloud service providers host services on their servers through always-on Internet connections. Since their business depends on customer trust, cloud security methods are used to keep customer data private and stored securely. However, cloud security also partly lies in the hands of the customer as well. Understanding both aspects is pivotal to the right cloud security solution.

At its core, cloud security consists of the following categories:

Data security

Identity and access management

Governance (threat prevention, detection and mitigation policies)

Data retention and business continuity planning

Legal compliance

Cloud security may sound like IT security

What is cloud security?

Cloud security is the entire set of technology, protocols, and best practices that protect computing environments

The cloud, applications running in the cloud, and data in the cloud Securing cloud services starts with understanding exactly what is being secured as well as what aspects of the system need to be managed.

As a general overview, backend development against vulnerabilities is largely in the hands of cloud providers. Apart from choosing a security conscious provider customers should mostly focus on proper service configuration and safe usage habits. In addition, customers must ensure that end-user devices and networks are properly secured.

The full scope of cloud security is designed to protect the following

Physical networks Routers, electrical power, cables, climate controls etc.

Cloud security is a discipline of cybersecurity dedicated to securing cloud computing systems. This includesData storage hard drives etc.

Data servers – basic network computing hardware and software

Computer simulation and virtualization frameworks Virtual machine programs, host machines, and guest machines

Operating systems (OS) programs that contain

API management

Runtime environments – Executing and maintaining a running program

Data – all information stored, modified and accessed

Applications – traditional software services

E-mail

User devices

Final – Computers, mobile devices, Internet of Things (IoT) devices, etc.

With cloud computing, ownership of these components can vary widely. This can make the scope of a customer’s security responsibilities unclear. Because cloud security can look different based on who has authority over each component, it’s important to understand how it’s generally put together.

To simplify, cloud computing components are secured from two main points of view:

Cloud service types are provided by third-party providers as modules used to create a cloud environment. Depending on the type of service,

You can manage different degree of components within the service:

The core of any third-party cloud service involves the provider managing the physical network, data storage, data servers, and computer virtualization frameworks. The service is stored on the provider’s servers and virtualized over their internally managed network to be delivered to customers to be accessed remotely. This offloads hardware and infrastructure costs. The other is to give customers access to their computing needs from anywhere via an Internet connection.

SaaS cloud services provide customers with access to applications that are hosted and run on the provider’s servers. Providers manage applications, data, runtime, middleware, and operating system

Back to top button