fbpx Skip to content

Knowledge Byte: Security at Every Layer When Developing For the Cloud

Photo

Paulo Guimarães

PCD-222

In network security, de-perimeterization is a strategy for protecting a company’s data on multiple levels by using encryption and dynamic data-level authentication. Network administrators commonly use a castle analogy to explain their security strategy. Network devices are placed behind a firewall and security efforts are focused on keeping intruders out. Thus, company data is protected on the perimeter. With the advent of web services, ubiquitous connectivity, and a mobile workforce, however, some administrators are beginning to question whether the traditional border model of IT security is practical.

The term de-perimeterization was coined by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to “the development of open standards to enable secure, boundaryless information flows across organizations.” Simmonds says that a hardened perimeter security strategy is impossible to sustain and is fundamentally at odds with an agile business model.

The Jericho Forum has identified the following four dimensions to differentiate cloud formations from each other:

● Internal/External

● Proprietary/Open

● Perimeterized/De-perimeterized

● Insourced/Outsourced

The following figure depicts the security features for each layer of the enterprise perimeter:

The hardware-enhanced security provides layered protection for every perimeter of a business, including:

Network: Use authentication technologies to provide access only to known, trusted users.

Platform: Stop attacks and protect online transactions with added protection below the operating system.

Application: Guard against escalation-of-privilege attacks and secure virtualized models.

Data: Protect sensitive business data with faster full-disk encryption and anti-theft capabilities.

Response: Remotely diagnose, isolate, and repair infected clients in any operational state.

Related products to help you upskill

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning

A Massive Influx Into Remote Work Creates an Opportunity for Hackers

A Massive Influx Into Remote Work Creates an Opportunity for Hackers

While the coronavirus pandemic has infected millions of people worldwide, sending people back to work and study from home, these new habits could benefit cybercriminals....
jurian article

ITIL® 4, Why Should You? What’s New?

By 2019, when ITIL® 4 was finally launched, ITIL had been the leading guidance for IT Service Management for the past three decades. Millions of...
PCD-444

Knowledge Byte: Designing the Cloud to Expect Failure

Designing software for failure is an extra barrier to overcome but isn’t too hard, and it certainly pays off. Largely, it boils down to make...
Scroll To Top
Tweet
Share
Share