Eliminate the following 10 kinds of applications, must not be put on the public cloud
Source: Internet
Author: User
KeywordsCloud computing public cloud cloud computing
Cloud computing, from development to the present, has let more and more enterprises feel his good, but also there are some more or less problems, now, put aside the cloud computing controversy does not talk about, if Enterprises do not balance the various factors, then the risk will be very large. Public cloud not only provides users with Low-cost computing resources, fast application software configuration, flexible bandwidth allocation, but also brings a series of security issues. But the risk is not what the public cloud providers are facing, but what the user must face.
When you're overloaded with work on the cloud, it means you're exposing yourself to the eyes of the world, but every member of the world is not friendly. There are people who steal your information while you are unprepared and use it to blackmail you or sell it to peers or anyone who needs it.
If you don't believe in the problem with public cloud products, stay tuned for the latest warnings from EU members. You should not allocate more than 10% of your workload to the public cloud unless you intend to bring legal action and economic impact on the damage caused by the commitment.
Please note that the focus of our discussion is on our own configuration of applications and services, not on cloud software and services that are sold by cloud software companies or hosting providers.
1. The database
Databases are inherently safe, but applications that access the database can be risky and potentially have catastrophic consequences for your data. It is possible to add protection to your data from practice, such as by connecting the application software to the database, purifying the data before connecting to the database, and using secure protocols and validation to process the data.
2. E-Mail
Using e-mail services on the Internet is equivalent to leaving behind your house a sign that "we are not at home, we are not locked in the door". If you think it will help you through ambiguous security, give up the idea. Changing the port serial number does not work. If you want your private emails to be tours the world, you can set up your email service on the cloud. Unlike databases, email protocols are inherently insecure. However, it is possible to make e-mail more secure by using security protocols and identity authentication.
3. Monitoring and performance
The data generated by the monitoring and performance software seems generic and not accessible to everyone except the IT specialist for a particular group. But this data contains a variety of valuable information about system names, system types, system flaws, and architectures. If this information is exposed to a wide range of exposures, it is tantamount to opening yourself and your system under attack, such as hacking. The best solution is to keep your monitoring and performance data secret within the internal firewall.
4. User Relations Tools
There are many excellent cloud user relationship management tools available at a very low price for users at present. These tools can be used to replace the user's own solution. Unless you have a dedicated programmer in your company to develop this tool. Leave the complexity of those systems to the professional providers. If your user base and information are stolen by intruders, there is no other way than to pass the law.
5. Login System
Why should your login system and data remain in your own network? The login system exposes software vulnerabilities that you don't want the public to know about. In the case of a system database within the network, the firewall or other security measures proved to be difficult for the attackers who attempted to do so.
6. System Management application software
Configure the system administration tools on the public cloud. Firewalls will play their part. Most of the time your system will be able to discover the behavior of their spam engines or hackers trying to exploit the Internet. Keep the system management tools on your local system. Don't worry, you can still use local tools to manage remote systems.
7. User Handling
If you set up your own network user processing system and configure it through a cloud provider, I hope you don't store the data in a cloud-based database system. The solution can securely process credit card information and destroy it when the transaction is complete. It is not necessary for you to store credit card information. If you do have this requirement, store these numbers in a secure database system network.
8. Marketing application Software
Self-research and marketing applications installed on public cloud servers are often used by friendly and friendly hacker attackers to make their results readily available to rivals. Leave this application and security to the team of developers and members of the security team who can ensure the security of such data and provide appropriate protection. While this approach is not 100% effective against malicious attacks, you'd better let other professionals deal with the pressure. You can choose to run the application on your own internal system.
9. Business Intelligence
Business intelligence includes a variety of corporate information, such as internal workloads, user groups, profitability, project information, statistics, inventory, and anything you want to include. Don't you really want this information exposed to the risk of a public cloud? If you do, you should know that your own system will be under pressure from all sides. If you use cloud infrastructure and software, you can try commercial solutions yourself. Otherwise, it is safer to configure the business intelligence system internally. Or use paper and pens.
10. Configure Services
New system configuration services, such as Windows Deployment Services (WDS), require very high levels of security and cannot be configured on the cloud unless you meet this requirement. As with other services in the past, the commercial configuration and support versions exist. Competitive pricing and convenience can be factored in and you can pass on security concerns to providers.
"Edit Recommendation"
How does a WAN integrate with cloud computing services? In-depth analysis of Eucalyptus 3.1 open source cloud computing Red Hat Greater China general manager Zhang Xianmin: The Open and control of cloud computing is the best: cloud computing enterprises to invest in Uinx "responsible editor: Xiao Yun TEL: (010) 68476606"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.