Académique Documents
Professionnel Documents
Culture Documents
Jamia Yant
Amazon S3
Amazon S3 is simply storage for the Internet. It is designed to make Web-scale computing easier
for developers. It provides a simple Web services interface that can be used to store and retrieve
Jamia Yant
any amount of data, at any time, from anywhere on the Internet. It gives any developer access to
the same highly scalable, reliable, fast, inexpensive data storage infrastructure that Amazon uses
to run its own global network of Web sites. The service aims to maximize benefits of scale and to
pass those benefits on to developers. Amazon S3 is built to be flexible so that protocol or
functional layers can easily be added. Reliability is backed with the Amazon S3 Service Level
Agreement. As with most cloud services, you pay for what you use. (Amazon Web Services,
2012)
Rightscale
Rightscale acts as the bridge between your applications and your cloud infrastructure.
Rightscale cloud management enables organizations to easily deploy and manage businesscritical applications across public, private, and hybrid clouds. Right Scale provides efficient
configuration, monitoring, automation, and governance of cloud computing infrastructure and
applications. (Crunch Base, 2012) One of its features enables the user to monitor, scale, and
manage entire server deployments efficiently and reliably. (Rightscale Cloud Management,
2012) Right Scale offers automation during the entire deployment lifecycle. There is also
complete visibility into each level of the deployment. Managing, monitoring, testing,
troubleshooting and re-launching applications all offer complete control. It offers the freedom
and flexibility to keep a business from getting locked into a single provider because it is portable.
(Amazon Web Services, 2012)
Jamia Yant
Privileged user access. Because the vendor is controlling the cloud, the
organization should ask for detailed information concerning vendor employees and
administrators who have access to the organizations data. The organization should
know the number of vendor employees with data access, as well as their level of
training and expertise, degree of authority, and overall responsibility within the
vendor setting.
vendor will provide for specific external audits and security certifications.
Data location. It is possible that the organization will not know the physical
location of the cloud. In all actuality it could be in another country, far from the
organizations location. Therefore, the organization may want to specify acceptable
location(s) whenever possible, and ensure the vendor agrees to commit, by contract,
Jamia Yant
change such information. Access to metadata can confirm the unaltered state of the
information.
Long-term viability. The vendor chosen by the organization should have long-term
viability and experience in cloud computing. In addition, there should be a specific
contract-based understanding of the consequences should a vendor participate in a
merger and/or routine, day-to-day functioning of the cloud.
One security methodology that can be used for cloud security is known as the layered
approach. It works to insure the vendor and the organization both have multiple levels of
protection for all data and physical assets. This method offers several layers of protection so the
company is not dependent on a single countermeasure, but relies on multiple defenses at various
levels. These levels would include:
Level 2 network security: The vendor should have 24-hour trained security and
network personnel monitoring and managing network filters, which are placed at
various network locations. The competence and skill sets of the personnel managing
Jamia Yant
It is important to consider that confidential and sensitive material will be transmitted to the
cloud. It is imperative that the proper and appropriate level of security is provided and
maintained by the vendor, per the organizations requirements and specifications. (Arma
International, 2010)
Jamia Yant
what it would take to implement such a system can reduce the shock of the actual cost of
implementation. Investigate the number of service interruptions your service provider has
experienced. Look at the security concerns and remember to scrutinize the contracts for any
additional costs that could arise. Systems such as these can be implemented in phases to bring
certain departments and processes on line in their order of importance. Most of the benefits
outweigh any issue and issues will arise with any system. Like service interruptions, it is just a
matter of time. Being able to stay on top of change in this age of business is essential for success.
Platforms like the one Amazon offers has allowed many businesss like Ericsson thrive.
Resources:
http://aws.amazon.com/ec2/
Amazon Web Services (2012) Amazon Simple Storage
Servicehttp://aws.amazon.com/s3/
Rightscale Cloud Management (2012) A Bridge Between Your Apps and
Infrastructure, http://www.rightscale.com/products/
Crunch Base (2012) http://www.crunchbase.com/company/rightscale
Jamia Yant
basedinformation.aspx
Chantry, D. (2009) Mapping Applications to the Cloud,
http://msdn.microsoft.com/en-us/library/dd430340.aspx
Gottlieb, A. (2011) Cloud Computing Journal: Beware the Network Cost Gotchas of
providers/isv/rightscale
Amazon Web Services (2012) http://aws.amazon.com/solutions/case-studies/ericsson/