Topic 6A Flashcards
Cloud deployment Model
classifies how the service is owned and provisioned.
Public (multi tenant) is a service offered by CSPs (cloud service providers). This can be ascription based or pay as you go. As a shared resource, there are risks regarding performance and security. Multi-cloud architectures are where an organization uses services from multiple CSPs.
Hosted Private—is hosted by a third party for the exclusive use of the organization. This is more secure and can guarantee better performance but is correspondingly more expensive.
Private—cloud infrastructure
is completely private to and owned by the organization. In this case, there is likely to be one business unit dedicated to managing the cloud while other business units make use of it.
cloud computing
organizations exercise greater control over the privacy and security of their services. This type of delivery method is geared more toward banking and governmental services that require strict access control in their operations.
Community Cloud
where several organizations share the costs of either a hosted private or fully private cloud. This is usually done in order to pool resources for a common concern, like standardization and security policies.
Single-tenant architecture
provides dedicated infrastructure to a single customer, only the customer can access the infrastructure. Offers the highest level of security. Customer has complete control over the infrastructure. It can be more expensive than multi-tenant architecture.
Multi-tenant architecture
when multiple customers share the same infrastructure, with each customer’s data and applications separated logically from other customers. This model is cost-effective but can increase the risk of unauthorized access or data leakage if not properly secured.
Hybrid architecture
uses public and private cloud infrastructure. This model provides greater flexibility and control over sensitive data and applications by allowing customers to store sensitive data on private cloud infrastructure while using public cloud infrastructure for less sensitive workloads. However, it also requires careful management to ensure proper integration and security between the public and private clouds.
Serverless architecture
when the cloud provider manages the infrastructure and automatically scales resources up or down based on demand. This model can be more secure than traditional architectures because the cloud provider manages and secures the infrastructure. However, customers must still take steps to secure access to their applications and data.
hybrid cloud
describes a computing environment combining public and private cloud infrastructures, although any combination of cloud infrastructures constitutes a hybrid cloud. In a hybrid cloud, companies can store data in a private cloud but also leverage the resources of a public cloud when needed.
Hybrid cloud issues
The complexity of managing multiple cloud environments and integrating them with on-premises infrastructure, which can create security gaps and increase the risk of data breaches.
Another concern is the potential for unauthorized access to data and applications, particularly when sensitive information is stored in the public cloud.
Using multiple cloud providers can make it challenging to enforce consistent security policies across all environments.
can also lead to issues with data consistency stemming from synchronization problems among multiple locations.
Legal compliance is difficult to mandate is complex.
monitoring the hybrid environment can be more complex due to the requirement for specialized expertise and tools.
potential for increased network latency due to large data transfer volumes between on-premises and cloud environments that impact application performance
service-level agreements (SLAs)
formally outline all performance, availability, and support expectations between the cloud service provider and the organization
Guaranteeing expected levels of service can be challenging when dealing with the integration of different cloud and on-premises systems.
anything as a service (XaaS)
The concept that most types of IT requirements can be deployed as a cloud service model.
Most common implementations are infrastructure, software, and platform
Software as a service (SaaS)
model of provisioning software applications.
Rather than purchasing software licenses for a given number of seats, a business accesses software hosted on a supplier’s servers on a pay-as-you-go or lease arrangement (on-demand).
allows developers to provision on-demand applications much more quickly than previously.
applications are developed and tested in the cloud without the need to test and deploy on client computers.
Platform as a service (PaaS)
provides resources somewhere between SaaS and IaaS.
A typical PaaS solution would provide servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top.
This platform could be based on Oracle and MS SQL or PHP and MySQL. Examples include Oracle Database (oracle.com/database)
Infrastructure as a service (IaaS)
a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components quickly.
Rather than purchase these components and the Internet links they require, you rent them as needed from the service provider’s datacenter.
shared responsibility model
describes the balance of responsibility between a customer and a cloud service provider (CSP) for implementing security in a cloud platform.
The division of responsibility becomes more or less complicated based on whether the service model is SaaS, PaaS, or IaaS
A responsibility matrix sets outs these duties in a clear, tabular format
Cloud service provider responisibilites
Physical security of the infrastructure
Securing computer, storage, and network equipment
Securing foundational elements of networking, such as DDoS protection
Cloud storage backup and recovery
Security of cloud infrastructure resource isolation among tenants
Tenant resource identity and access control
Security, monitoring, and incident response for the infrastructure
Securing and managing the datacenters located in multiple geographic regions