Secure Cloud Computing—Building the Transparent Cloud

Expedient expands to the cloud with a focus on auditability and security

Lo sentimos, este PDF sólo está disponible en formato para descarga

Secure Cloud Computing: Expedient Case Study

If you’re like a lot of enterprise IT teams, you’re interested in getting the benefits of cloud com-putting but have questions about the confidentiality, integrity, and availability of the cloud. Given highly publicized service failures and data breaches, I can’t blame you. If you’re going to get out of the hardware ownership business and focus on the IT elements that really matter to your business, you need to be able to count on consistently reliable and transparent cloud services.

My company, Expedient Communications, provides cloud computing, managed services, and network connectivity. As such, my team is working to extend or replace the technical foundation for many of our customers’ businesses. The lessons we’re learning might help your team as you build private clouds and evaluate external cloud services.

As a starting point for a secure and highly available cloud service, you need a redundant system architecture that builds security throughout the technology stack. My team created self-contained pods that include compute, storage, and I/O. We chose the Intel® Xeon® processor X5650 as the pod building block, since it gives us a good balance of compute and memory capacity. You can replicate this type of modular architecture across the organization to give you a solid base for high availability.

To secure the cloud, you need to integrate security components at every layer of the Open Systems Interconnection (OSI) model, from the physical through the application layer. It’s also important to ensure that each component has a robust reporting capability, so you can monitor and track potential issues and threats and respond quickly to address them.

Read the full Secure Cloud Computing Expedient Case Study.