Quantcast
Viewing all articles
Browse latest Browse all 10

Understanding Cloud Security Models

When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach to software-as-a-service and can have different security implications.

  • The public cloud — Public cloud service is delivered over the Internet, typically on a pay-per-use model, meaning a business is charged only for the storage it needs. Public cloud models are ideal for small- or medium-sized organizations that prioritize collaboration. Because public cloud service providers rely on existing infrastructure and architecture, migrating services is easy — however, businesses with special regulatory or other requirements may not find the necessary flexibility to meet their unique needs.
  • Private clouds — Private cloud networks feature an architecture that is used exclusively by a single organization. A private cloud can be administered internally or by a third party that offers dedicated use of its resources. Private clouds feature greater potential for customization, particularly for businesses that have specific security or availability needs that can’t be met by a public provider. For this reason, use of private cloud networks is typically restricted to large organizations that can invest the capital required to build a dedicated system.
  • Hybrid clouds — As the name implies, hybrid cloud systems mix public and private networks to provide greater flexibility. Typically, in a hybrid system, most services will be run on the private network with use of the public cloud limited to peak periods when additional capacity is necessary. Alternatively, hybrid systems can be used to run multiple security platforms, such as a public network for interaction with clients and a private one for internal operations.

Security Considerations

Your organization’s security requirements will play a large role in determining which type of cloud service is right for you. Ultimately, a private cloud system will be best for any organization requiring full control over their security posture. However, the high cost of implementing such a system makes it out of reach for most businesses.

To ensure the safety of your data and applications when using a public or hybrid cloud system, make sure you partner with a service provider that can clearly demonstrate their security posture. Businesses can also invest in SIEM data logging solutions to monitor network activity and respond to threats as they develop.

Moving your data and applications to a cloud system — whether public, private or hybrid — shouldn’t mean compromising security. Being aware of your needs and taking steps to manage risks can allow you to take advantage of all the benefits of cloud computing without jeopardizing key assets.

The post Understanding Cloud Security Models appeared first on .


Viewing all articles
Browse latest Browse all 10

Trending Articles