Secure Your Cloud Building Blocks: Overview and a Few Tips
The cloud enables great agility and can reduce costs if used right. But does it also manage risk? In fact, the cloud contains the same traditional hosting risks as well as specific related risks to your production environment running on the cloud.
With IaaS dynamic environment you pay only for what you use enabling alignment with actual real-time demand. The cloud instance is a temporary resource that is created from a gold master image automatically and on demand. This basic cloud automation capability makes traditional patching redundant and fast provisioning extremely easy. It is an important consideration that changes some basic security deployment perceptions when moving from traditional infrastructure to the cloud.
Cloud security acts against the traditional IT users expectations. The system is not static, there is no access to the hypervisor and the hybrid environment assembled from multiple IT environments should be treated differently. New adopters of the public cloud find that deployments are pretty easy however, when it comes to secure deployments, there is still great knowledge gap.
In the cloud, responsibility is shared. While the infrastructure and virtualization layers are in the hands of the IaaS vendor, IaaS users are responsible for utilizing the “building blocks” – the virtual compute resources to deploy and maintain best practice architectures that support HA and DR. Service Architecture must solve security problems in public, private, and hybrid cloud deployments, specifically with regards to:
- Perimeter & Access Control
- Server Integrity & Intrusion Detection
The Cloud Firewall
Traditional data centers enjoyed the transparency of a static capacity and secure deployment and configuration was comparatively simpler (as opposed to in the cloud). In traditional DC’s, the firewall served as the gate for groups of servers or clusters. Each group included servers that held the security appliances.
Moving to a cloud environment and deploying in the same static manner is an option as an initial phase. In order to enhance and enjoy the dynamic features of the cloud however, the security configuration should be replicated automatically taking into consideration the deep granularity of the cloud environment. That supports the dynamic cloud benefits, such as cost and agility that were mentioned above. In the public cloud, each server can have its own firewall and security configuration. The multi-tenant SaaS architecture standard best practice consists of 3 three layers – the Load balancers and front-end/webservers, the app and middle tier servers and DB servers. In this case the connection and data transfer between layers and servers generates an extreme complexity with regards to access control and server protection.
A Few Important Tips
- Whatever ﬁrewall options you have, use them and make sure your ﬁrewall rules are updated quickly.
- Secure your server integrity by keeping images up-to-date and monitoring them closely for changes.
- You will be a multi-cloud, so architect for multi-cloud availability, including the “least common denominator”.
- Embrace the ﬂexibility of the cloud; re-think operations – understand, embrace, and secure the new cloud operational model.
- It’s possible to meet regulatory compliance requirements in the cloud, just know what you’re responsible for. Know exactly what your cloud provider takes responsibility for and what they don’t.
- Automate management and monitoring – Monitor your businesses application and support ﬁles for subtle changes which could indicate tampering by an intruder.
- Ensure software packages are up-to-date and have no known remote exploit vulnerabilities.
- Avoid OS and application mis-conﬁgurations that can lead to remote compromise.
The picture above were taken from a live Newvem account. Newvem scans and identifies the status of your security group configurations, continuously monitors their status, and alerts you of vulnerabilities. It is also automatically recognizes your database servers,analyzes their vulnerability, and provides you with drill downs covering insights on specific instances for a quick fix turnaround.
(Note: Opinions expressed in this article and its replies are the opinions of their respective authors and not those of DZone, Inc.)