Question

In: Computer Science

Summarize the built-in security features and tools used in modern cloud infrastructures. You may select among...

Summarize the built-in security features and tools used in modern cloud infrastructures. You may select among Amazon AWS, Microsoft Azure and Google Cloud. Use internet resources to answer this question.

Solutions

Expert Solution

Some of the modern cloud infrastructure are Amazon AWS, Microsoft Azure, Google Cloud. Amazon designed their cloud platform infrastructure to be highly available and scalable and also comply with industry standards. Google Cloud Platform security features are among the best on the market, including traditional network security.Azure’s infrastructure is designed from facility to applications for hosting millions of customers simultaneously.

Common Built in security features and tools used in modern cloud infrastructure are-

1. In AWS and Google Cloud, Using Identity and Access Management (IAM), you can create users, groups, and roles, and use permissions to allow and deny their access to AWS resources .24/7/365 operations are performed as device security detection and response from both internal and external threats.Cloud Identity, Cloud Identity-Aware Proxy, and Security Keys are used for IAM in google cloud.

2.Virtual Private Cloud give you complete control over all inbound and outbound network traffic. You can use AWS Direct Connect to establish a private virtual interface between your on-premise network and your Amazon Virtual Private Cloud. In Azure, Mandatory Security training, background checks are performed .

3. AWS provides Data encryption for EBS volumes, S3 buckets, and Relational Database Service (RDS) and Glacier data stores. Data in-transit encrypted communication to and from Google’s public cloud, including layered defense redundancies to protect customers from denial-of-service (DoS) attacks. Also in Microsoft azure Penetration testing, intrusion detection, DDoS, Audits & logging plays a major role. Access Control Lists (ACLs) in AWS work at the network subnet level. Network ACLs can be especially useful in the prevention of DDOS attacks when you have a particular need to blacklist traffic from specific IP addresses.


Related Solutions

Security auditors deploy many of the tools routinely used by penetration testers of an organization’s security...
Security auditors deploy many of the tools routinely used by penetration testers of an organization’s security staff during their security assessments. The key difference is that they are performed by an independent auditor. Auditors provide an impartial and unbiased view of the state the security landscape of an organization. Using credible sources, outline the rules of engagement (best practices) that a security auditor would follow as an ethical practicing professional. (minimum 450 words)
1. Decision trees are often used to select features to be used as inputs to another...
1. Decision trees are often used to select features to be used as inputs to another modeling technique. Discuss how this can be done.
Discuss and compare the group summations and consolidation tools used with Excel. You may need to...
Discuss and compare the group summations and consolidation tools used with Excel. You may need to look up (research) the group summations. Under what circumstances would you use each of these features? Do they both serve the same purpose, or is each one used under different scenarios? Give examples of how each can be used.
Among the tools (e.g., graphics tools, knowledge-based tools, etc.), determine the type of tool that you...
Among the tools (e.g., graphics tools, knowledge-based tools, etc.), determine the type of tool that you would use for process improvement framework. Next, determine the type of tool you would use for problem solving framework. Justify your response.
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
(a) Taxes are primary revenue yielding tools of the Government of modern ages. You are required...
(a) Taxes are primary revenue yielding tools of the Government of modern ages. You are required to state any three non-revenue objectives which the Government achieves by imposing taxation. (05) (b) List any five taxes which can be imposed by the Federal Government. (solve in the context of pakistan)
1. List the tools of fiscal policy and discuss how they may be used to avert a...
1. List the tools of fiscal policy and discuss how they may be used to avert a recession.   2. What are the main arguments put forward by supply-side economics and the limitations of this arguments?  include examples
Prepare a logical design for a process used by your organization (any healthcare). You may select...
Prepare a logical design for a process used by your organization (any healthcare). You may select something that you work with directly, or a hypothetical process. Your logical design should cover the three aspects of the database management system. Compare and contrast this with the physical design of the process and describe how the logical design and physical design affect one anther.
1. List and define any five epidemiologic measures used to quantify features of disease transmission among...
1. List and define any five epidemiologic measures used to quantify features of disease transmission among populations and/or individual organisms, themselves. You may give an example of how to use the measure if it is too difficult to define on its own. 2. Discuss the process of clonal selection. Select an auto-immune disorder and discuss how that auto-immune disorder causes disease, what cell(s) are involved in the auto-immune response (specific to the disease you have selected), and how the clonal...
State and explain the tools of monetary policy that may be used by a government to reduce excess money in circulation.
State and explain the tools of monetary policy that may be used by a government to reduce excess money in circulation. 
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT