Cloud Computing - Chapter 3
Cloud Computing - Chapter 3
Overview
Cloud infrastructure is a term used to describe the components needed for cloud
computing, which includes hardware, abstracted resources, storage, and network
resources. Think of cloud infrastructure as the tools needed to build a cloud. In order
to host services and applications in the cloud, you need cloud infrastructure.
Virtualization
Virtualization is technology that separates IT services and functions from hardware.
Software called a hypervisor sits on top of physical hardware and abstracts the
machine's resources, such as memory, computing power, and storage.
Once these virtual resources are allocated into centralized pools they’re considered
clouds.
With clouds, you get the benefits of self-service access, automated infrastructure
scaling, and dynamic resource pools.
Storage
Within a single datacentre, data may be stored across many disks in a single storage
array. Storage management ensures data is correctly being backed up, that
outdated backups are removed regularly, and that data is indexed for retrieval in
case any storage component fails.
When storage is turned into a cloud resource, you can add or remove drives,
repurpose hardware, and respond to change without manually provisioning separate
storage servers for every new initiative.
Network
The network is composed of physical wires, switches, routers, and other equipment.
Virtual networks are created on top of these physical resources.
The cloud resources are delivered to users over a network, such as the internet or an
intranet, so you can access cloud services or apps remotely on demand.
Public, private, and hybrid cloud infrastructure
The basic elements of cloud infrastructure are the same whether you have a private
cloud, public cloud, or a combination.
To get started with any of the cloud computing types, you need a cloud infrastructure.
You can create a private cloud by building it yourself using resources dedicated solely
to you, or you can use a public cloud by renting the cloud infrastructure from a cloud
provider so you don’t have to set it up yourself.
Network element vendors make their performance data available to NMS software
either through APIs or through protocols like NetFlow, a de facto industry standard
originally developed by Cisco that lets NetFlow-enabled routers transmit traffic and
performance information.
NMS functions
b. Device detection. NMSes detect devices on the network and ensures the
network recognizes devices and configures them correctly.
Types of NMSes
Enterprises can install NMS software on premises on a dedicated server and managed
on site, or they can access NMSes as a service. Vendors supply tools for the enterprise
to administer and monitor its network. NMS software can manage a wide variety of
network components, manufactured by multiple vendors.
Early versions of NMS software sometimes worked only with hardware manufactured
by the same vendor. But those limitations have largely disappeared as networks have
migrated to architectures based on equipment from multiple suppliers.
On-premises NMS installation can enable better control and customization of the
software to meet specific goals. Managing the software internally can require
additional IT staff and resources, however. As the software ages, the organization
must upgrade or replace it. A vendor-based NMS can enable a quicker return on
investment, but access to the software can be compromised if an outage occurs at
the provider's data centre.
NMSes can monitor both wired and wireless network elements. In the past, a separate
NMS would be required for each kind of element. However, as wireless networking
becomes more prevalent, unified NMSes, which enable a network engineer to track
both wired components and wireless network elements through a single
management console, become available.
NMS software can also enable companies to track performance throughout their own
networks, as well as through external networks, such as those operated by cloud and
as-a-service providers. Visibility is enabled through APIs and other means through
which an enterprise can access performance flow data, or logs, to analyze security
or performance.
NMS trends
As network hardware vendors continue to make their systems more open, NMS
software is enabling interoperability as enterprises use NMS tools to control and add
features across a wider variety of devices. NMSes also serve as the framework
for intent-based networking, a developing methodology that automates network
oversight, configuration and troubleshooting.
6. Azure tenant: Monitor Microsoft Entra ID, audit, and sign-in logs.
Monitoring Tools
Azure Monitor
Operations Manager
Best Practices
2. Define clear monitoring goals: Establish specific monitoring objectives and metrics
to measure performance and health.
3. Configure alerts and notifications: Set up alerts and notifications to trigger actions
based on monitoring data.
4. Integrate with existing tools and processes: Integrate monitoring data with existing
IT tools and processes to ensure seamless integration.
5. Continuously review and refine monitoring: Regularly review and refine monitoring
configurations to ensure they remain effective and efficient.
1. Azure Monitor: Offers comprehensive monitoring and analytics for Azure resources.
2. New Relic: Provides full-stack monitoring for cloud, web, and on-premises
environments.
4. Sumo Logic: Provides log analysis and monitoring for cloud and on-premises
environments.
Cloud Computing is the booming industry of the present time and will continue to
grow by many folds in the near future. Nowadays, it’s really hard to find a safe, secure,
and yet cost-effective place to store your data and business-critical ideas. But, with
the rise of cloud computing, this problem is vanishing exponentially. Cloud provides us
with a place where your data can not only be stored but can also be accessed easily
over the internet. Using Cloud Computing you can also host and manage your
applications.
By using Cloud Computing Solution, we get various benefits, some of which are as
follows-
1. Improved software and hardware performance– through cloud computing
solution one can easily make out what will be the best software and hardware
specification for the better performance of the application running on the cloud.
2. Flexibility and affordability– Cloud Computing provides its users with a wide variety
of deployment models and functions through which they can choose the best
options for their applications. Cloud services are much more affordable.
3. Increased uptime and availability– it is highly available and has a great uptime
which help’s in managing more amount of traffic at a particular time.
4. Better collaboration with real-time sharing– cloud computing has great real-time
sharing.
Cloud Computing is available for every kind of users who want to deploy their
applications onto the cloud service.
To create such a cloud platform, it takes a long number of steps and dedicated time.
Let’s now look at the steps involved or the lifecycle of cloud computing solutions.
Step 1: Define the Purpose
The first and foremost step is to define the purpose for which you want to create a
cloud. For this, you have first to understand your business requirement and what type
of application you want to run on the cloud. After this, you have to decide whether
you want your cloud to be public, private, or hybrid.
Step 2: Define the Hardware
Deciding what type of hardware, you will need is the most thought after the process.
One needs to be very precise in making the decision. For this, you will have to choose
the compute service that will provide the right support when you resize your compute
capacity to maintain your application running.
Step 3: Define the Storage
Every application needs a good amount of storage where it’s data can be stored
safely. For any application storage type that should be chosen carefully for this one
should choose the storage service where they can back up and archive their data
over the internet.
Step 4: Define the Network
Networking is the key that will deliver your data to the end-users. So, the network must
be configured sincerely and should be flawless so that intruders can not break into
the network. One should define the network that securely delivers data, videos, and
applications with low latency and high transfer speed.
Step 5: Define the Security
Security is a key aspect of any application. Set up your security service which enables
services for user authentication or limiting access to a certain set of users on your
resources.
Step 6: Define the Management Process and Tools
The developer should have complete control over there resource and to configure
these you should define some management tools which monitor your cloud
environment, resources used, and the customer application running on it.
Step 7: Testing the Process
Testing is yet another important thing in the life cycle of deploying any application. All
the faults can figure out only through the testing process involved in it. During testing,
you should verify your application using various developer tools where you build, test,
and deploy your code quickly.
Step 8: Analytics
Finally, analyze and visualize data using analytics service where you can start querying
data instantly and get results then and there only. Once analyzing is done complete,
your application becomes ready you deploying.
Advantages
1. Cost Saving- It helps you to save substantial capital costs as it does not need any
physical hardware investments.
2. High Speed- Cloud computing allows you to deploy your service quickly in fewer
clicks.
3. Backup and restore of data- Back-up and restore of data is easy in cloud
computing.
4. Reliability- It is highly reliable to use cloud computing solutions.
Disadvantages
1. Performance can vary- Its performance depends on the speed and quality of the
internet
2. Downtime- Cloud Computing Solutions has a great span of downtime.
Cloud computing has become the technology of choice for companies looking to
gain the agility and flexibility needed to accelerate innovation and meet the
expectations of today’s modern consumers. But migrating to more dynamic cloud
environments requires new approaches to security to ensure that data remains secure
across online infrastructure, applications, and platforms.
Cloud service providers (CSPs) typically follow a shared responsibility model, which
means implementing cloud computing security is both the responsibility of the cloud
provider and you—the customer. Think of it as a responsibility framework that defines
which security tasks belong to the cloud provider and which are the duty of the
customer. Understanding where your provider’s security responsibilities end and yours
begin is critical for building a resilient cloud security strategy.
Broadly speaking, the CSP is always responsible for the cloud and its core
infrastructure, while the customer is expected to secure anything that runs “in” the
cloud, such as network controls, identity and access management, data, and
applications.
Shared responsibility models vary depending on the service provider and the cloud
computing service model you use—the more the provider manages, the more they
can protect.
Cloud computing has revolutionized the way organizations store and manage data,
offering flexibility, scalability, and cost-effectiveness. However, with the benefits come
concerns about data security. Here are key considerations for ensuring the security of
data in the cloud:
In the cloud, security responsibilities are shared between the cloud provider and the
customer. The cloud provider is responsible for securing the infrastructure, while the
customer is responsible for securing the data stored on that infrastructure.
Classify data based on its sensitivity and implement appropriate access controls,
encryption, and retention policies. This ensures that data is protected according to its
level of sensitivity.
Implement robust identity and access management (IAM) systems to control who has
access to data and applications. Use multi-factor authentication, role-based access
control, and least privilege access to minimize the attack surface.
4. Data Encryption
Encrypt data both in transit (using SSL/TLS) and at rest (using encryption algorithms like
AES). This ensures that even if data is intercepted or accessed by unauthorized parties,
it remains unreadable.
5. Monitoring and Auditing
Regularly monitor cloud activity and audit logs to detect and respond to security
incidents. Implement tools to track user activity, data access, and changes to
configurations.
Understand and comply with relevant regulations, such as GDPR, HIPAA, and PCI-DSS,
which govern data protection and security in the cloud.
Implement a robust backup and recovery strategy to ensure business continuity in the
event of data loss or corruption.
9. Incident Response
Regularly assess and improve your cloud security posture through ongoing monitoring,
vulnerability assessments, and penetration testing.
By following these best practices, organizations can effectively secure their data in
the cloud and minimize the risks associated with cloud computing.
cloud computing environments. It includes policies, processes, and tools that protect
applications and data. It guarantees employees have access to the assets they need
to carry out their work. It also improves security by preventing employees from
can process permissions across multiple environments and devices automatically. This
makes it more flexible than most on-premises solutions, which require manual controls.
As organizations move more workloads into the cloud, the number of users accessing
Security teams that do not have robust, automated identity management solutions
have to manually grant and revoke permissions to cloud assets. This leads to one of
two situations:
This can also get in the way of remote work. Employees who try to log into the
company network from abroad may be shut out by traditional access management
policies. Before they can start working, they must wait for someone to approve their
connection.
Cloud identity management resolves these issues by providing a scalable, unified set
of tools and processes for automating access control. It gives organizations a robust
allowing the policies to follow employees across multiple devices and locations.
Not all cloud identity management tools produce the same results. The best solutions
address obstacles to identity and access management security with the following
features:
Full-featured cloud IAM solutions enable security teams to overcome some of the