So far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surfaceāthe area exposed to the outside worldāof your application. Now it’s time to add the next layer of controls to you application, starting with a host-based…
Read MoreLast week, JustinĀ covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best PracticesĀ [PDF] and AWS Risk and…
Read MoreHow difficult is it to run a public cloud service? As all of us know, Amazon Web Services (AWS) experienced an outage on 21-Apr-2011 and that lasted for almost 4 days. Quite a lot of companies were affected and you can find the list here. The Internet was flooded with articles speculating what went wrong,…
Read MoreLast Thursday, April 21, 2011 Amazon Web Services Elastic Compute Cloud (EC2) had an outage that impacted multiple Availability Zones. Thursday morning, Amazon issued a status update indicating that the outage was based on problems with replication mirroring: āThis re-mirroring created a shortage of capacity in one of the US-EAST-1 Availability Zones, which impacted new EBS volume creation as well as the pace with which we could re-mirror and recover affected EBS volumes. Additionally, one of our internal control planes for EBS has become inundated such that it’s difficult to create new EBS volumes and EBS backed instances.ā
Read MoreThe Small Business Journey to the Cloud is Actually a Round Trip Ā Ā Ā Ā By Greg Boyle, Trend Micro Global Product Marketing Manager Many small businesses are still uncertain about cloud computing. They wonder if it can help with their profitability without being extremely risky. Letās start by defining cloud computing in small business terms. There…
Read MoreNot long ago, we set out on a mission to perform a full scalability test on one of our products (Trend Micro Deep Security). After some quick, back-of-the-napkin calculations we discovered that we needed somewhere in the order of 35 Dell 710’s with virtualization to complete our test. Finding that many available servers is a…
Read MoreDedicated Instances are Amazon EC2 instances launched within your Amazon Virtual Private Cloud (Amazon VPC) that run hardware dedicated to a single customer.
Of course, the humor here is that Amazon didn’t explain which hardware it was referring to. If you compare it to an enterprise server in a private data center, it’s clearly less secure (unless you applied cloud specific security and encryption tools perhaps). But if you compare it to existing hosting offering, itās no less secure than enterprise grade hosting has been for a decade.
Read MoreSurveys indicate that security is the number 1 challenge about the cloud.Ā Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues.Ā Dave Asprey, VP-Cloud Security for Trend Micro,Ā presented to the SD Forum theseĀ 16 valuable points of advice regarding data privacy in the cloud.Ā PLEASE CLICK ON THE “READ MORE” BUTTON TO ADVANCE DIRECTLY TO THE PRESENTATION….
Read MoreDo you know what cloudbursting is? It is a concept where when you run out of your computing resources in your internal data center, you āburstā the additional workload to an external cloud on an on-demand basis.
Read More