Skip to content

Knowledge Byte: Security at Every Layer When Developing For the Cloud


Cloud Credential Council (CCC)


In network security, de-perimeterization is a strategy for protecting a company’s data on multiple levels by using encryption and dynamic data-level authentication. Network administrators commonly use a castle analogy to explain their security strategy. Network devices are placed behind a firewall and security efforts are focused on keeping intruders out. Thus, company data is protected on the perimeter. With the advent of web services, ubiquitous connectivity, and a mobile workforce, however, some administrators are beginning to question whether the traditional border model of IT security is practical.

The term de-perimeterization was coined by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to “the development of open standards to enable secure, boundaryless information flows across organizations.” Simmonds says that a hardened perimeter security strategy is impossible to sustain and is fundamentally at odds with an agile business model.

The Jericho Forum has identified the following four dimensions to differentiate cloud formations from each other:

● Internal/External

● Proprietary/Open

● Perimeterized/De-perimeterized

● Insourced/Outsourced

The following figure depicts the security features for each layer of the enterprise perimeter:

The hardware-enhanced security provides layered protection for every perimeter of a business, including:

Network: Use authentication technologies to provide access only to known, trusted users.

Platform: Stop attacks and protect online transactions with added protection below the operating system.

Application: Guard against escalation-of-privilege attacks and secure virtualized models.

Data: Protect sensitive business data with faster full-disk encryption and anti-theft capabilities.

Response: Remotely diagnose, isolate, and repair infected clients in any operational state.

Courses to help you get
results with

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning


Is Digital Transformation Transforming?

Is Digital Transformation Transforming? 52% believe that, within the next three years, some part of their organization will have fundamentally changed the way it operates...

Pros and cons of working from home: how can we boost productivity?

The COVID-19 crisis gave us no choice in the Spring of 2020: it pushed us out of the offices and transformed our homes into working...

Knowledge Byte: Moving Legacy IT to Cloud Computing

The question of how cloud impacts legacy IT is one that is brought up numerous times, yet often gets little to no clarification. The following...
Scroll To Top