1.7 - Cloud concepts Flashcards
What is IaaS?
Infrastructure as a Service. Places the responsibility of application installation and management as well as backups and data management on the customer. The customer may opt for Hosted Virtual Desktops (HVD).
What is PaaS?
Platform as a Service. Places the responsibility of application installation, backups, and data management on the customer. The vendor provides the hardware, OS, and related support software. I.e, Amazon Web services, Google Cloud, and Microsoft Azure.
What is SaaS?
Software as a service. The most accessible and complete solution as it only requires a Web browser interface. Applications, data management, and storage are provided by the vendor. I.e, Google Docs and Microsoft 365.
Explain Public Clouds
Available to any party. The internet is the best example and this service is the least secure.
Explain Private Clouds
Hosted by an organization for its own internal use or for its users through remote access over WAN links.
Explain Hybrid Clouds
Uses whichever mix of cloud delivery modes necessary to create a single model. I.e, Private for some services and Public for others, choice of the deployer.
Describe cloud connectivity via internet
Comparatively inexpensive and simple, but highly insecure.
Describe cloud connectivity remote access
Offer increased security by creating a secure tunnel but is still subject to connectivity issues of the internet.
Describe cloud connectivity leased line
This option reserves a predetermined bandwidth allocation between the customer and cloud service provider, usually over a private WAN.
Describe cloud connectivity dedicated connection
The most expensive connection method. Here, it is possible to connect from the customer location directly to the cloud provider. Majority of cloud providers use Point of Presence (PoP) so connectivity is assured.
What are security considerations/implementations for cloud services?
Always get the most securely SLA structure from the cloud provider.
Ensure your link to the cloud is equally secure.
Use strong encryption.