cloud computing overview
DESCRIPTION
TRANSCRIPT
Manju Srinivas/@manjusrinivas
What are we discussing today?
◊ Introduction to Cloud Computing◊ Security and Compliance◊ Evaluating Cloud computing◊ Business Cases◊ Amazon Web Service (AWS) Lab
Introduction toCloud Computing
What’s this Cloud computing?
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (networks, servers, storage, applications, services…) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
- NIST Special Publication
Private CloudPublic / External
On-Premises / Internal Off-Premises / External
Hybrid
Community
Deployment Models
Service Models & Cloud Vendors
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Why are customers adopting cloud computing?
Variable expense Replace capital expenditure with variable expense
Economies of scale Lower variable expense than companies can achieve themselves
Elastic capacity No need to guess capacity requirements and over- provision
Speed and agility Infrastructure in minutes, not weeks and months!
Focus on business Not undifferentiated heavy IT lifting
Global Reach Go global in minutes and reach global audience
Benefits & Limitations
* Cost (pay per use, reduced hosting cost…)* Automated (updates, backups…) * Flexibility (On demand, scalable…)* Multi tenant (shared resources, green comp)* Mobility (Access from any Web device)
* Security* Location of data* Compliance and Privacy (regulations…)* Internet Dependency / Speed* Service Levels* Migration / Vendor Lock-in
Security & Compliance
Cloud Architecture Example
What should be secured in Cloud?
• All the components in the Cloud – Network, Storage, Database, Operating System, virtualization, load balancing – everything should be secured.
• Cloud computing security is no different than regular security.
Security Risks and Mitigations
Risk• Data loss / leakage• Shared technology /
vulnerabilities• Insecure application
interfaces• Malicious insiders• Unknown risk profile /
accounts• Account, service and
traffic hijacking
Mitigation• Strong Authentication,
auditing etc.• Operations procedure,
security practices etc.• Secured design
(Firewalls…)• Staff vetting• Validation of
credentials, active monitoring of traffic
Compliance
• Numerous regulations pertain to storage and use of data - PCI DSS, HIPAA and Sarbanes–Oxley (SOX) Act
• Business continuity and data recovery• Logs and audit trails• Data or Datacenter location jurisdiction• Legal and contractual issues
EvaluatingCloud Computing (Service) Provider
Evaluating Cloud Computing Implementation
Cost
Benefits
Business
SLA
Business Cases
Service Supplier Evaluation
Things to check/ask before implementing
• How good is the security of Cloud DC?• How much will I save? (CapEx, Software licensing…)• Time to build new system• Maintenance strategies (outages, patches…)• Latency comparison between Cloud and own DC• Comparative study of various cloud providers• Demand for trial period• Compliance (ISO standards etc.)• Service Levels (Uptime, time to resolution…)
Cloud Provider – Tenant Responsibility Matrix
SaaS PaaS IaaS Data Center
Data Provider Tenant Tenant Tenant
Application Provider Tenant Tenant Tenant
OS Provider Provider Tenant Tenant
Virtualization Provider Provider Provider Tenant / NA
Network Provider Provider Provider Tenant
Physical Provider Provider Provider Tenant
Business Case Studies
Business Case #1 on Elasticity – Amazon.com
Contd…
Contd…
Contd…
Contd…
Provisioned capacity Real capacity
Time for AWS Hands-on
Thank you