In: Computer Science
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM).
Discuss the networking services that can be used to build a VPC for the company.
Answer:
Cloud technology we are using the virtual space and the internet. Some persons thinks that cloud is the internet. It is not an internet,its just a virtual space that is present on the internet.
Security in the cloud using the Shared Responsibility Model:
Shared Responsibility Model is a model that defines the responsibility of security in the cloud by cloud provider and its users.
When an organization or company works the security of the data is a sole responsibility of an enterprise.But when an enterprise divides its storage using cloud then not whole but a few part of security becomes a responsibility of a cloud provider also.So the security depends upon the both the cloud provider and the enterprise that are using it.
* Security of the cloud:
According to the Shared Responsibility Model ,The security of the cloud is the main responsibility of the cloud service provider.
* Security in the cloud:
According to the Shared Responsibility Model, The security in the cloud is the main responsibility of the enterprise that are using it.The enterprise manages the security controls for the OS(Operating Systems).
The workload mainly depends upon the way the workload is
hosted.There are many ways to hosted the workload such as:
i.SaaS: Software as a Service.
ii.PaaS: Platform as a Service.
iii.IaaS: Infrastructure as a Service.
Security in the cloud using Identify and Access Management:
Identify and Access Management defines that who can access the particular information in the cloud.It identifies the person who can access the particular information in the cloud.Such as if you go to the club and instructions are written on the door that who is allowed or not allowed in the club.IAM provides security for the cloud systems.IAM provides the security of the identities and attributes of the cloud by permitting only the right persons in the cloud.
Advantages of using IAM for cloud security:
•It provides the whole security to identities,attributes and data
in the cloud.
•It ensures that the right persons with the right privileges are
accessing the cloud.
•It provides security to the sensitive information that is present
in the cloud.
•At present it is used by many organizations for the security of
the cloud's sensitive information.
Networking services that can be used to build VPC for a company
VPC( Virtual Private Cloud.)
A VPC enables the company to establish its own private cloud on a shared public cloud infrastructure.
By VPC the company can control that who can see and access their information.
The company can put many restrictions by using VPC.VPC is a private cloud space of the enterprise and it is very beneficial.
•The development of a VPC for an enterprise includes the
advanced software.
•Virtual private network is required to develop VPC for an
enterprise.
•It requires an inventory management system.
•It requires an orchestration to make sure that the tasks are
executed in the correct order.
•It requires a server with one CPU,1-3 GB RAM,250-500GB hard
drive.
•It also requires Red Hat Enterprise Linux.
•They required automation layer,because it is not provided by the
cloud vendor.
•The software must include the hypervisor and network
management.
•The numbers of servers and software requires to provide the
security in the cloud.
•VMOps has created a turnkey software that helps in building a
private cloud.
•VPC can be build by using AWS also.
Advantages of VPC :
• Here the customers get their own private cloud where they can
control that who can see and use their information that is stored
on the cloud.
• VPC provides data security.You have your own isolated
network.Because of this your information will not mixed up with the
other customers.So data security is there.
•VPC has all the features that a normal cloud have.So VPC is
affordable also.
*************End***********