top of page

Cloud Security: Flexing Services and Security

Provides virtualized infrastructure components that are normally deployed in a data center including routers, switches, servers, storage, VPN gateways, etc.  Example: Rackspace, Amazon Web Services (AWS), Microsoft Azure, Google Computer Engine

Provides the software and infrastructure tools needed for a customer to develop and/or deploy a web-based solution or enterprise application service or suite of services.  Example: AWS Elastic Beanstalk, Microsoft Azure

Provides the delivery and maintenance of an online software solutions using a subscription and licensing model.  Example: MS Office 365, HubSpot, Salesforce

Cloud Services come in three major services: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS); all of which are designed to leverage a host providers resources for the use of a customer at the cost of a subscription.  Choosing the right host provider comes at the cost of conducting research to identify if they can meet business objectives and requirements.  Although we will not go into detail into what each cloud service type encompasses, we do want to ensure that you have a basic understanding of what each service type is.  (Note that some of the examples provided below may cross services.)

While the host providers of each service may provide a baseline level of security, it is our responsibility to tailor those security controls, take advantage of additional security controls provided outside of standard deployed services, introduce additional security measures either through requests or acquisition, and to educate leadership and end users.  Below are some of the security considerations when using cloud services:

IaaS

PaaS

SaaS

bottom of page