{"id":5734,"date":"2015-03-06T08:14:01","date_gmt":"2015-03-06T08:14:01","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=5734"},"modified":"2018-06-02T10:15:36","modified_gmt":"2018-06-02T10:15:36","slug":"different-cloud-models-that-defy-security-professionals","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/different-cloud-models-that-defy-security-professionals\/","title":{"rendered":"Different Cloud Models That Defy Security Professionals"},"content":{"rendered":"<p><a href=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/03\/cloud-models-defy-security.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5735\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/03\/cloud-models-defy-security.jpg\" alt=\"cloud-models-defy-security\" width=\"675\" height=\"374\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/03\/cloud-models-defy-security.jpg 675w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/03\/cloud-models-defy-security-300x166.jpg 300w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><\/a><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/different-cloud-models-that-defy-security-professionals\/#Challenge_1\" >Challenge # 1:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/different-cloud-models-that-defy-security-professionals\/#Challenge_2\" >Challenge # 2:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/different-cloud-models-that-defy-security-professionals\/#Challenge_3\" >Challenge # 3:<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>More and more companies migrate to the cloud computing model. For the most part, seek to generate savings for organizations. In part, too, are concerned to have more efficient processes.<\/p>\n<p>Just so, the different models of cloud, need to be evaluated carefully. When defining the cloud model to be adopted, the organization must be familiar with the differences and similarities between them, especially with regard to security aspect.<\/p>\n<p>For example, the model <strong>SaaS (Software as a Service)<\/strong>, designed to provide access to applications, groups and user policies which can only be used to ensure that certain users have access to selected information on organization&#8217;s CRM database.<\/p>\n<p>In relation to the <strong>PaaS (Platform as a Service)<\/strong>, whose main objective is data protection, is magnified when used in conjunction with virtual data storage, and in cases of unavailability of other cloud, it plans and calculate safety for balanced distribution of services for the platform at the time of any outages, and study of the appropriate encryption mode for account safety.<\/p>\n<p>In the case of\u00a0<strong>IaaS (Infrastructure as a Service) <\/strong>model, the <strong>CSO (Chief Security Officer)<\/strong> have to worry about arranging a corporate governance framework within which the transactions occur.<\/p>\n<p>To assist CSOs to how to deal with different models, the following list enumerates challenges linked to each form of work in the cloud:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Challenge_1\"><\/span><strong>Challenge # 1:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Protect personal information before transmitting them to the cloud. There are many laws and many policies that prevent sensitive data which is transmitted to third-party systems &#8211; such as the cloud case. So the very<a href=\"https:\/\/www.esds.co.in\/enlight-cloud-hosting\"><strong> cloud providers<\/strong><\/a> suggest that packages with sensitive information is sent in encrypted form or is removed. At that time, the question arises on how to perform encryption or deletion of data before sending them to the provider.<\/p>\n<p>It is known that the encryption process is an operation that consumes valuable CPU resources. An alternative for this is to hire a broker to do the encryption of data between workstations and the provider. Optimize confidential data identification process at the time of shipment.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Challenge_2\"><\/span><strong>Challenge # 2:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>No need to create hundreds of mirrors of sites in the cloud. There is no need to duplicate the data unnecessarily, large companies with thousands of employees all over the place have a dilemma that they need to create hundreds of mirrors of sites in the cloud.<\/p>\n<p>The ability to allow access is based only on local platforms logins to ensure connection to the cloud-hosted services, eliminates this need. The problem increases when there are multiple credentials \/ passwords for each user. This situation generates significant costs and risks for companies and can thwart the organization. Just calculate the work involved in managing passwords for ten thousand different employees and anticipate that each of them forget the password at least once a year.<\/p>\n<p>Enable single sign for local systems and the<a href=\"https:\/\/www.esds.co.in\/enlight-cloud-hosting\"><strong> cloud platform<\/strong><\/a> can help you to mitigate associated risks and costs. After all, it is easier to remember just one password. It also generates less work for IT in time to stop a user from access &#8211; an operation will only make it impossible to login with such credentials in local platform and cloud.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Challenge_3\"><\/span><strong>Challenge # 3:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Conduct audits and take cloud platform with on-demand contracts <strong>(<a href=\"https:\/\/www.esds.co.in\/enlight-cloud-hosting.php\" target=\"_blank\" rel=\"noopener\">pay as the cloud platform is used<\/a>)<\/strong> means to deliver financial executives a form of control of investments. This tool is usually provided by the provider itself, but in cases of external audits or disputes with service providers, it is worth keeping monitoring indoors.<\/p>\n<p>To account monitoring, companies can hire an intermediary, as proposed in the matter of data encryption <strong>(above)<\/strong>. The service should actively monitor the allocation of resources and aid organizations to stay within the rules and regulations of governance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More and more companies migrate to the cloud computing model. For the most part, seek to generate savings for organizations. In part, too, are concerned to have more efficient processes. Just so, the different models of cloud, need to be evaluated carefully. When defining the cloud model to be adopted, the organization must be familiar&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/different-cloud-models-that-defy-security-professionals\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":5,"featured_media":5735,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-5734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/5734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=5734"}],"version-history":[{"count":4,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/5734\/revisions"}],"predecessor-version":[{"id":9138,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/5734\/revisions\/9138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/5735"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=5734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=5734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=5734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}