IaaS Cloud Security: How much does user responsibility know

Source: Internet
Author: User
Keywords Middot Cloud Security
Tags access basic basic network cloud cloud environment cloud security cloud vendor continue

As companies continue to enter the cloud, it is important to define responsibility by choosing a cloud vendor and signing a contract with the manufacturer. Most cloud environments are characterized by shared security responsibilities and form a continuum. For SaaS environments, SaaS providers assume most of the responsibility. For an infrastructure that is a service (IaaS) or a platform that is a service (PaaS) environment, the vendor's responsibilities are smaller and the customer's is larger.

In the IaaS cloud environment (for simplicity, this article will combine IaaS and PAAs), vendors provide the core infrastructure. This means the underlying network, process, and storage services. The customer is responsible for granular network management, server management, and data storage management. Most of the major cloud security considerations are in the hands of customers, and customer responsibilities include:

• Control network access (open and close ports and protocols)

• Authorize or deny server and service layer access (customer is responsible for server and service configuration)

• Design, implement, maintain, and check access control within applications

• Implementation of recovery and other redundant solutions

• Continuous monitoring of access, security, and availability

Through the primary control of design, configuration, and operation, customers are responsible for ensuring that the IAAS environment is secure by ensuring that the vendor (through technology or policy control) cannot access the server or data. It is more appropriate for vendors to implement technical controls rather than rely on policies. It is important to understand the vendor's monitoring methods as an IaaS client of a vendor that restricts technology control and relies heavily on policies and procedures. Be sure that the vendor can and will monitor unauthorized attempts to access your resources. Remember: The goal is to limit your vendors ' data and service access while they can affect your service availability.

With the new development of data encryption, the vendor access sensitive information can be controlled through the unreadable data without the encryption key. The key consideration in this case is to maintain the displacement control of the encryption key. A large number of IaaS vendors will agree to the "No access" scenario, and if your vendor is pressuring key access, you should seriously reconsider your relationship. Implementing data encryption, remember that relying on database encryption increases the risk. Application can successfully query the data in the database server, it will defeat the encryption work. For this reason, it is best to implement encryption and decryption in the application tier investment.

When signing a contract with an IaaS manufacturer, your duties include:

• Select vendors with strong technology controls to prevent access or data and service outages

• Strengthen the contractual relationship in the right place, strengthen part of the largest demand control, minimize the control of the manufacturer

• Develop and implement technical controls, strengthen contractual relationships, and monitor potential service terminals and unauthorized access attempts

• Design and implement evaluation procedures to validate vendor operations on contract and technical boundaries

In short, your IAAS environment goal is to limit the risk of a vendor's security incident, increase your likelihood of discovering inadequate technology and policy control in your assessment, and minimize the likelihood of discovering a security incident when an event occurs.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.