fbpx Skip to content

Knowledge Byte: Security at Every Layer When Developing For the Cloud

84057392_3382513485109192_2570936499621068800_n

Cloud Credential Council (CCC)

PCD-222

In network security, de-perimeterization is a strategy for protecting a company’s data on multiple levels by using encryption and dynamic data-level authentication. Network administrators commonly use a castle analogy to explain their security strategy. Network devices are placed behind a firewall and security efforts are focused on keeping intruders out. Thus, company data is protected on the perimeter. With the advent of web services, ubiquitous connectivity, and a mobile workforce, however, some administrators are beginning to question whether the traditional border model of IT security is practical.

The term de-perimeterization was coined by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to “the development of open standards to enable secure, boundaryless information flows across organizations.” Simmonds says that a hardened perimeter security strategy is impossible to sustain and is fundamentally at odds with an agile business model.

The Jericho Forum has identified the following four dimensions to differentiate cloud formations from each other:

● Internal/External

● Proprietary/Open

● Perimeterized/De-perimeterized

● Insourced/Outsourced

The following figure depicts the security features for each layer of the enterprise perimeter:

The hardware-enhanced security provides layered protection for every perimeter of a business, including:

Network: Use authentication technologies to provide access only to known, trusted users.

Platform: Stop attacks and protect online transactions with added protection below the operating system.

Application: Guard against escalation-of-privilege attacks and secure virtualized models.

Data: Protect sensitive business data with faster full-disk encryption and anti-theft capabilities.

Response: Remotely diagnose, isolate, and repair infected clients in any operational state.

Related products to help you upskill

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning

PCSA-666

Knowledge Byte: Moving Legacy IT to Cloud Computing

The question of how cloud impacts legacy IT is one that is brought up numerous times, yet often gets little to no clarification. The following...
PCSM-cover2

Knowledge Byte: 5 Key Cloud Management Roles

Cloud service management roles are not fully defined in a single framework or standard. In addition, the crossover among service management, the organization and cloud...
A Massive Influx Into Remote Work Creates an Opportunity for Hackers

A Massive Influx Into Remote Work Creates an Opportunity for Hackers

While the coronavirus pandemic has infected millions of people worldwide, sending people back to work and study from home, these new habits could benefit cybercriminals....
Scroll To Top
Tweet
Share
Share