Cloud strategy and security considerations and suggestions
Cloud strategy and security considerations and suggestions
Li wanhong, a real person in Ziwei
1. Strengthen investment and implement the cloud strategy.
The company has established three cloud platforms in Beijing, Shanghai, and Shenzhen within three years, backing up each other and providing support for internal R & D, testing, production, and office work, cloud hosts and cloud storage can also be rented out to realize cloud commercialization and create value for the company.
The establishment of cloud platforms has many advantages, which can not only save more than 80% of the cost, but also improve the utilization rate of devices, using the elastic and automatic functions of Cloud technology, it is easy to build O2O education websites for millions and tens of millions of users, as well as financial websites, to ensure high concurrency and high availability of websites and to build the most advanced education and financial networks. To this end, we need to invest more to purchase servers, storage devices, networks, and other devices to build the tai'an education finance cloud platform.
The cloud platform is the foundation of big data. hadoop requires a large number of virtual machines to store and process big data, which is inseparable from the support of the cloud platform. Cloud computing and big data are a revolution that has changed the software model and has an unlimitedly promising future. We must seize this technology trend and advance the layout to do a good job in cloud platforms and big data development-related businesses, create value for companies and customers.
2. Recruit cloud computing and Big Data talents.
To achieve cloud and big data strategies, You need to recruit high-end talents, including doctors and masters. You need to recruit a large number of related talents from the computer Major. You can use big data to recruit doctors from some mathematics departments, however, it is necessary to take the computer Major as the computer major students are more familiar with programming and more practical.
3. Strengthen O & M and system security management.
Ctrip's official website and APP on the 1949th were paralyzed in a large area and could not be used normally until, But it lost 5.28 and its share price fell by more than 1 million.
This incident was caused by incorrect operations by employees. Due to the wide range of businesses, applications and services involved by Ctrip, it took a long time to verify whether the functions between applications and services were running normally.
This is a lesson. It has sounded the alarm of computer system security. We must take it as a precaution to strengthen system O & M and security to ensure that everything is safe.
To this end, a centralized host O & M Security Management and Control Platform is required to implement unified identity authentication, authorization, and security audit to prevent unauthorized operations, resource abuse, and unauthorized operations, this effectively avoids personnel security risks and automated and tool-Based O & M, ensures pre-defense, In-process blocking, and post-event auditing, backs up application systems and databases, and conducts fault recovery drills every month, improve Fault Handling and recovery capabilities to be prepared. When a large number of systems run on virtual machines, the company should strengthen security research on the cloud platform to prevent internal and external damages, take effective measures and tools such as anti-virus, Trojan, hacker and vulnerability attacks, SQL injection attacks, and application-layer Denial of Service (DDOS) attacks to improve the security of the system.
Currently, the company uses a cracked version of the VMWARE cloud operating system. We recommend that you purchase a genuine version to improve security. You also need to purchase VMWARE-compatible anti-virus software, such as Symantec.
Inspur's server ranks first in China, and its security equipment is also quite good. inspur's big enterprise data center security solution meets the national information security level Protection Level 3 technical requirements and is recommended.
Inspur provides an integrated solution for WEB Application Security Protection and load balancing, provides the best WEB application vulnerability and unknown threat defense capabilities, and comprehensively analyzes HTTP/HTTPS and compressed data streams, prevents SQL injection and cross-site attacks; (XSS), buffer overflow, and DDOS attacks to effectively protect the security of data center WEB servers. At the same time, it improves the performance of business applications, improve the efficiency of basic equipment in the data center.
The host system layer uses host reinforcement technology to ensure the security of servers and terminal devices from the operating system layer, and uses whitelist reinforcement policies to prevent known and unknown virus Trojans and Backdoor attacks, this effectively improves the security level of the operating system and protects the WEB Services of large enterprises, core databases, and other servers.
By establishing an internal O & M Security Management and Control Platform, the system effectively reduces Potential personnel security risks during internal O & M and prevents internal leaks or misoperations, comprehensively monitors the business assets of the data center from the business perspective, and provides security situation awareness for the data center to ensure the efficiency and security of the data center.