Ensuring security: Five characteristics of a secure cloud service
Source: Internet
Author: User
KeywordsSecurity security cloud availability availability through
Security Cloud service is a kind of technology and business model of http://www.aliyun.com/zixun/aggregation/13422.html "> Cloud Computing Technology Application and expansion in Network security field to realize network security, namely service. It will enhance network security capabilities, including access control, DDoS protection, virus and malicious code detection and processing, network traffic security detection and filtering, e-mail applications such as security filtering, network scanning, web-specific applications such as security detection, network anomaly flow detection, etc., such as resource clustering and pooling, Enables users to obtain convenient, on-demand, scalable network security protection services through the Internet without having to maintain their own security facilities and minimize the cost of services to interact with business providers.
Based on the above definition, the security cloud service has five features as well.
1, security cloud services to network security resources cluster and pool into the foundation
These security resources include various security capabilities to meet the security needs of various types of customers, included in the definition of access control, DDoS protection, virus and malicious code detection and processing, network traffic security detection and filtering, e-mail applications such as security filtering, network scanning, web and other specific applications of security detection, Network anomaly traffic detection and so on, and in the process of these security resources will be due to its security features and security Cloud service model is different. This section will be discussed in detail in Section 7.2.2.
2, security cloud services to the Internet as the center, the Internet for its services to provide the only way
According to this feature, traditional security services, such as managed security Services (Consolidator) (including traditional security event monitoring, secure access, anti-virus, Trojan killing, content security monitoring, intrusion detection, DDoS attack protection, Security scans and other security services), network security management (twist CENTER,SOC) business through the appropriate transformation, will be a key component of security cloud services. Some traditional security services, such as security outsourcing, which do not provide access to the network, will not be included in the security cloud services. Due to the characteristics of network security itself, it is doomed that some of the security services will not be able to provide the network with the desired advantages, especially when the telecom operators are not involved in the security cloud services market, this situation is particularly obvious. This section will be discussed in detail in 7.2.3 and section 7.3.
3, the security cloud service should have on-demand scalable services
This feature of security cloud services comes from two aspects. First of all, the security cloud service system in the design has a variety of security protection capabilities of the separation and on-demand delivery capabilities, customers can flexibly according to their business characteristics and security requirements to choose the appropriate security services. Second, the secure cloud service provides scalable business capabilities on capacity, which can be scalable depending on the type of security capability, either network bandwidth or the corresponding number of IP addresses. This section will be focused on in section 7.2.1.
4. Transparency of security cloud services
The security Cloud service system according to the reasonable design enables the user to enjoy the corresponding security protection ability without having to understand the internal deployment way, the security cloud service realizes the customer in the business use 0 maintenance, 0 management, Through the development of the security Cloud service self-service system, the Customer Self service and the customer and the service provider are minimized. This section will be focused on in Section 7.2.4.
5, the service of the Security Cloud service
Instead of investing, owning, and maintaining the capabilities of the security cloud to provide the right equipment, the user directly buys the various businesses offered by the security cloud, so providing reasonable billing and SLA service metrics in a secure cloud service is an important part of their business offerings.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.