Reader small image

You're reading from  Information Security Handbook

Product typeBook
Published inDec 2017
Publisher
ISBN-139781788478830
Edition1st Edition
Right arrow
Author (1)
Darren Death
Darren Death
author image
Darren Death

Darren Death is ASRC Federal's Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security. He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Read more about Darren Death

Right arrow

Chapter 11. Cloud Security Consideration

Cloud computing enables on-demand and ubiquitous access to a shared pool of configurable, outsourced computing resources, such as:

  • Networks
  • Servers
  • Storage
  • Applications

These services can be rapidly provisioned and released with little effort from the organization or cloud service provider.

Cloud computing characteristics


  • Rapid elasticity: Cloud computing resources can be elastically provisioned and released. They can be scaled in the following ways:
    • Manual scaling: This is where the organization's operations team anticipates future workloads in the cloud environment and adds resources manually to support the organization's mission.
    • Semi-automated scaling: This type of scaling still requires forecasting to ensure that resources exist and are built to support an organization's information system. Based on system events, new services, such as virtual servers to take the application's load, will be initialized.
    • Fully-automated (elastic) scaling: This type of scaling allows an organization to increase or reduce capacity without the need to perform the manual labor and configuration necessary to establish the infrastructure ahead of time.

The organization has the capability of controlling the elasticity of the system so that the system does not grow out of control, causing a great...

Cloud computing service models


There are three main cloud computing service models that we will be covering in this chapter. These three models provide the basis for the services provided by cloud computing service providers.

Infrastructure as a Service – IaaS

Infrastructure as a Service (IaaS) is a cloud computing service model where a provider delivers virtualized IT infrastructure resources over the internet:

The organization manages:

  • Server operating systems
  • Data storage
  • Applications deployed to servers, such as:
    • Web-based enterprise applications
    • Database servers
    • Management agents, such as host intrusion prevention

The cloud computing service manages the underlying cloud infrastructure, which includes:

  • Processing
  • Physical storage
  • Networks

Platform as a Service – PaaS

Platform as a Service (PaaS) is a cloud computing service model where a provider delivers hardware and software typically with the goal of supporting an organization's application development and hosting needs over the internet:

The organization...

Cloud computing deployment models


The cloud computing deployment model will vary depending on your organization's unique business and mission requirements. The various deployment models bring their unique advantages, disadvantages, and information security challenges.

Public cloud

In this model, the cloud computing infrastructure is utilized by the public in a multitenant environment over the internet:

The service provider makes resources available, such as:

  • Virtual machines (VMs)
  • Applications
  • Storage
  • And so on

The cloud computing provider may be owned, managed, and operated by a business, academic, or government organization, or a combination of the three.

Private cloud

In this model, the cloud computing infrastructure is provisioned for exclusive use by a single organization, as illustrated in the following image:

The cloud computing provider may be:

  • Owned, managed, and operated by the organization, a third party, or a combination of the two
  • It may exist on or off premises

Community cloud

In this model...

Cloud computing management models


The mechanism that you use to manage your cloud infrastructure must be well thought out and planned in order for your cloud implementation to be successful.

Managed service provider

A managed service provider (MSP) ensures that an organization's IT assets are operated and maintained. Some examples of these assets are:

  • IT infrastructure (servers, network gear)
  • Enterprise applications (e-commerce, databases)
  • End user computing (workstations, management infrastructure)
  • Security operations (SIEM, vulnerability scanning)

In the case of a cloud service, an MSP will ensure that services like these are maintained if they exist in a cloud environment, as well as provide services to manage the cloud infrastructure itself. If an organization lacks the experience or personnel to manage a cloud service, an MSP can be contracted to manage the cloud environment for the organization.

Cloud service provider

A cloud service provider (CSP) is the actual service provider of the cloud...

Cloud computing special consideration


While the prevalent marketing hype that surrounds cloud technologies can make it sound easy to move to the cloud, the reality is that moving to the cloud can be very difficult from a business, technical and security perspective. It is easy to become complacent as you move to the cloud, but you must resist this temptation.

Cloud computing data security

The security of your organization's data is a key concern for your organization and the information security program. This does not change as you move your organization's data into the cloud. Moving your organization's IT infrastructure to the cloud will present you with many decisions around how to best secure your organization's information, such as those detailed in the following sections.

Data location

There are multiple concerns in data location that you need to consider when you approach your cloud computing services architecture. Some considerations include:

  • Do your compliance requirements require your...

Summary


In this chapter, you learned about cloud architecture and the considerations that go into planning out an effective and secure cloud implementation for your organization. Additionally, we discussed:

  • Characteristics related to cloud computing
  • Service, deployment, and management models utilized by cloud service providers
  • Special considerations related to cloud data security

In the next chapter, we will be discussing information and data security best practices, and we will provide you with an understanding of many of the best practices needed to support effective IT hygiene in your organization's enterprise network

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Information Security Handbook
Published in: Dec 2017Publisher: ISBN-13: 9781788478830
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Darren Death

Darren Death is ASRC Federal's Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security. He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Read more about Darren Death