Powered By Blogger

Oct 3, 2012


Cloud Computing - Network Security Practices


This blog post gives a basic idea about the best practices of Network security for Cloud Computing.

Good security practices cover every aspect of system design, implementation and deployment. Applications should secure by design. That is interfaces should only contain the appropriate data to authorized users. When concerning the Implementation developers should avoid using coding which could result in vulnerability to techniques such as buffer overflow or SQL injection. When deployed, operating systems should be hardened and every layer of software should kept up to date with the most recent security patches.

When concerning about Cloud Computing all applications are deployed in a shared network environment and there are security techniques such as VLANs and port filtering. These techniques help to protect various layers of application deployment architecture.

There are some approaches available to Network Security. Using a security domain is one of them. Security domains can be use to group virtual machines together and then can control access to the domain through the cloud provider’s port filtering capabilities. For an example create a security domain for front-end Web Servers and open only the HTTP and HTTPS ports to the outside world and then filter traffic from the Web server security domain to the one containing back-end data base.  

Another approach is control the traffic using the cloud provider’s port-based filtering or using more stateful packet filtering by inserting content switches or firewall appliances. The concept of Immutable Service Containers (ISCs) can be used to have more fine-grained control over traffic. This allows multiple layers of software to be deployed in a single virtual machine and there is a network which is internal to the virtual machine. This technology uses Solaris Zones to support multiple secure virtual environments on a shared OS platform and this is available in both the Solaris and Open Solaris Operating Systems.



No comments:

Post a Comment