Cloud Computing Resources for Small and Midsize Businesses

Cloud Computing for SMBs

Subscribe to Cloud Computing for SMBs: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Computing for SMBs: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

SMB Cloud Authors: Pat Romanski, Yeshim Deniz, Harry Trott, Breaking News, Breaking New

Related Topics: Cloud Computing, Infrastructure On Demand, Infrastructure 2.0 Journal, Cloud Security Journal , Amazon Cloud Journal, Cloud Computing for SMBs

Amazon Cloud Journal: Article

Cloud Monitoring Essentials | Part 2: Security

Three Key Security Actions

The cloud offers users agility and flexibility at, potentially, a far lower cost than a traditional data center model. However, with these benefits come risks from cost sprawl, security holes, and availability management. Part 1 of Cloud Monitoring Essentials focused on cost concerns. This second part looks at security.

The dynamic nature of the cloud, with ever-changing security groups and rules, makes security difficult.
New instances, auto scaling groups, and buckets are created and terminated daily.  Resources that were ‘secure' yesterday may be altered today and your security posture may be compromised.

The distributed and centralized nature of the cloud creates security headaches. Not only is the deployment regularly changing, but the people changing it are across groups and departments.

To address security, you need to take these three steps:

  1. Track Deployment Changes: A large deployment is difficult to maintain in a timely manner. Tracking changes ensures that your valuable time is spent identifying new and evolving issues.
  2. Perform Daily Best Practice Checks: You should create a comprehensive best practice checklist and zealously employ it. Coverage should include issues ranging from security group rules to password policies to IP addresses to bucket permissioning.
  3. Create a Mitigation Strategy: Issues can quickly multiply and security mitigation needs to be performed daily. A solid strategy which prioritizes issues will help you efficiently manage this responsibility.

These three steps can help you avoid common problems (see 5 Common Issues) and dramatically improve your security (see study).

Unfortunately, however, implementation of these processes is neither easy nor quick. Identification alone could quickly become a full time job. Performing manual detection creates the risks of missed issues.

Employing an automated solution that performs these tasks and delivers customizable alerts solves that problem. For as little as $49 per month, solutions provide full identification scans, customized alerts, and complete mitigation instructions. Plainly, they offer a much better alternative to devoting hundreds of man hours and performing the tasks manually.

Stay tuned for Part 3 of Cloud Monitoring Essentials: Availability.

More Stories By Aaron Klein

Aaron Klein is Co-Founder and COO of CloudCheckr Inc. CloudCheckr Inc. provides a comprehensive solution (CloudCheckr Pro) that addresses the infrastructure reporting, monitoring, and control needs of AWS users through automated and customizable reports, alerts, and recommendations. Its cost, security, resource, best practice, and change monitoring analytics and features allow users otherwise unavailable insight into their deployments and usage. CloudCheckr Pro is designed to help users optimize their deployment.