Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    When Protecting the Cloud, Start by Building Walls

    Written by

    Sean Michael Kerner
    Published November 1, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      TOKYO—Time and again, organizations cite security as the biggest barrier to cloud adoption. At the OpenStack Summit that concluded Oct. 30 here, I had a lot of time to think about all aspects of the cloud and especially security, even while sightseeing at the Tokyo Imperial Palace.

      Security isn’t just something I write about—it’s a passion and it’s also a lifestyle. I’ve heard more than one vendor say that in the modern IT world, it’s not possible to build a castle wall around applications. It’s a euphemism that I too had believed and often restated. But no longer.

      When not at the OpenStack Summit, I had the (very) brief opportunity to play tourist and spent one day walking around the perimeter of the Tokyo Imperial Palace, home to the Emperor of Japan. The palace was built in the feudal era of Japan, complete with a moat, castle walls and reinforced large gates.

      Today, there are guards at every gate, in addition to lights all around the perimeter and other surveillance mechanisms. There is even a no-fly zone rule, extending even to drones, that protects all the airspace above and around the Imperial Place.

      The only way into—or out of—the Imperial Palace is via one of the gates. Even when passing through one of the gates, visitors are required to sign in and out. At all times, security knows who is on the palace grounds.

      While the idea of building a castle wall and moat seems anachronistic in the modern world, the simple truth is it works for the Emperor of Japan. No one gets into that palace, as the ancient perimeter is reinforced with modern technology to make a security cordon that works in 2015.

      The same basic approach works with OpenStack and, to be sure, any application or IT workflow. The idea of having a moat and castle, in modern IT terms, is the same as segmentation, creating barriers around different elements. At the OpenStack Summit, I saw multiple presentations and spoke with multiple vendors about creating walls around applications using software-defined networking (SDN) methodologies.

      In the cloud, micro-segmentation can be enabled by virtual LANs (VLANs) or better yet, by way of some form of (SDN) construct. In that way, each application gets its own “moat,” creating a logical separation between it and everything else.

      Next up is the wall. For an application or IT deployment, that wall is the next-generation firewall or an intrusion prevention system (IPS).

      The IT equivalent of the human guard at the gate checking people in and out is role-based access control. Security Information and Event Manager (SIEM) is the same basic idea as the list the guards keep so if something goes wrong, log analysis can be performed.

      The idea that IT security in the cloud is a new problem that needs to be solved is not entirely accurate. The lessons of the past about how to protect, isolate, audit and control a perimeter hold true in 2015, just as they have for thousands of years of human history. Although the tools differ, the basic idea is the same: You can’t protect what you can’t defend, and defense often starts with a good wall.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×