Question

In: Computer Science

Discuss security in the cloud using the shared responsibility model and identity and access management (IAM)....

Discuss security in the cloud using the shared responsibility model and identity and access management (IAM).

Discuss the networking services that can be used to build a VPC for the company.

Solutions

Expert Solution

Answer:

Cloud technology we are using the virtual space and the internet. Some persons thinks that cloud is the internet. It is not an internet,its just a virtual space that is present on the internet.

Security in the cloud using the Shared Responsibility Model:

Shared Responsibility Model is a model that defines the responsibility of security in the cloud by cloud provider and its users.

When an organization or company works the security of the data is a sole responsibility of an enterprise.But when an enterprise divides its storage using cloud then not whole but a few part of security becomes a responsibility of a cloud provider also.So the security depends upon the both the cloud provider and the enterprise that are using it.

* Security of the cloud:

According to the Shared Responsibility Model ,The security of the cloud is the main responsibility of the cloud service provider.

* Security in the cloud:

According to the Shared Responsibility Model, The security in the cloud is the main responsibility of the enterprise that are using it.The enterprise manages the security controls for the OS(Operating Systems).

The workload mainly depends upon the way the workload is hosted.There are many ways to hosted the workload such as:
i.SaaS: Software as a Service.
ii.PaaS: Platform as a Service.
iii.IaaS: Infrastructure as a Service.

Security in the cloud using Identify and Access Management:

Identify and Access Management defines that who can access the particular information in the cloud.It identifies the person who can access the particular information in the cloud.Such as if you go to the club and instructions are written on the door that who is allowed or not allowed in the club.IAM provides security for the cloud systems.IAM provides the security of the identities and attributes of the cloud by permitting only the right persons in the cloud.

Advantages of using IAM for cloud security:
•It provides the whole security to identities,attributes and data in the cloud.
•It ensures that the right persons with the right privileges are accessing the cloud.
•It provides security to the sensitive information that is present in the cloud.
•At present it is used by many organizations for the security of the cloud's sensitive information.

Networking services that can be used to build VPC for a company

   VPC( Virtual Private Cloud.)

A VPC enables the company to establish its own private cloud on a shared public cloud infrastructure.

By VPC the company can control that who can see and access their information.

The company can put many restrictions by using VPC.VPC is a private cloud space of the enterprise and it is very beneficial.

•The development of a VPC for an enterprise includes the advanced software.
•Virtual private network is required to develop VPC for an enterprise.
•It requires an inventory management system.
•It requires an orchestration to make sure that the tasks are executed in the correct order.
•It requires a server with one CPU,1-3 GB RAM,250-500GB hard drive.
•It also requires Red Hat Enterprise Linux.
•They required automation layer,because it is not provided by the cloud vendor.
•The software must include the hypervisor and network management.
•The numbers of servers and software requires to provide the security in the cloud.
•VMOps has created a turnkey software that helps in building a private cloud.
•VPC can be build by using AWS also.

Advantages of VPC :
• Here the customers get their own private cloud where they can control that who can see and use their information that is stored on the cloud.
• VPC provides data security.You have your own isolated network.Because of this your information will not mixed up with the other customers.So data security is there.
•VPC has all the features that a normal cloud have.So VPC is affordable also.

*************End***********


Related Solutions

Describe in 500 words the shared security responsibility model that a dba must be aware of...
Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud. Note-Check in chegg writing before you submit it should be 100% unique and don't submit the existing chegg answers,and submit in text format Provide References
Discuss the advantages of teamwork and shared risk management responsibility in achieving risk management objectives. How...
Discuss the advantages of teamwork and shared risk management responsibility in achieving risk management objectives. How would a risk manager build a cohesive team that promotes a culture of patient safety through effective risk management in the health organization?
Explain briefly the below products of cloud platform using your own words. Security, Identity and Compliance...
Explain briefly the below products of cloud platform using your own words. Security, Identity and Compliance Internet of things Machine learning Mobile services Developer tools Cloud storage Networking Blockchain Databases Private Cloud
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
- Discuss in details (2-3 pages) using your own words about Cloud Security Concerns, Risk Issues,...
- Discuss in details (2-3 pages) using your own words about Cloud Security Concerns, Risk Issues, and Legal Aspects (use at least 3 books as a references ) .
Discuss adolescent identity development in relation to Bronfenbrenner’s ecological model.
Discuss adolescent identity development in relation to Bronfenbrenner’s ecological model.
Setup an AWS Instance for a fake business with billing alerts, compliance (document), server, Identity/Access Management,...
Setup an AWS Instance for a fake business with billing alerts, compliance (document), server, Identity/Access Management, S3, monitoring, and services that match your business requirements (need to define). Take at least one screenshots per service. Simple explanation and requirement of the fake business.
Discuss the concept of cloud cost management, its application and other related issues.
Discuss the concept of cloud cost management, its application and other related issues.
discuss the concept of cloud cost management, its application and other related issues
discuss the concept of cloud cost management, its application and other related issues
Discuss the concept of corporate financial management using the simple balance sheet model framework.
Discuss the concept of corporate financial management using the simple balance sheet model framework.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT