4 things you must know about hybrid cloud security

As with any major IT change, adopting a hybrid cloud model requires companies to re-examine their security practices. If implemented well, the hybrid cloud should help companies improve security. The flexibility brought by multiple cloud computing environments (each environment has its own advantages and incidental costs) can enable IT leaders to retain certain types of sensitive or critical data in on-premises data centers, and It has great potential for both private and public clouds.

However, security must become a visible part of the overall hybrid cloud strategy of the enterprise, otherwise it may bring new risks without taking appropriate measures to mitigate the risks.

4 things you must know about hybrid cloud security

"There is no denying that hybrid cloud infrastructure is part of the reality facing new businesses." Guy Peer, vice president of R & D and co-founder of Unbound, said, "Therefore, enterprise IT leaders must make hybrid cloud security a priority if they If it has not been implemented yet. "

The following are the core issues that enterprise IT leaders should know about hybrid cloud security, and can explain it to others in the organization as "hybrid cloud security 101". It also introduces the strategic issues of managing these issues and how to strengthen the hybrid cloud security posture of the enterprise.

Four key hybrid cloud security issues facing enterprises:

1. Insufficient security measures around

In short, when enterprises adopt a hybrid model that may include private and public cloud environments and on-premises or traditional data center infrastructure, the use of traditional tools and strategies to protect the boundaries of the enterprise network no longer apply.

"IT leaders need to understand that their carefully defined and maintained network scope is not enough." David Emerson, vice president and chief information security officer of Cyxtera, said, "Hybrid cloud is becoming the new normal of enterprise infrastructure. Companies must adapt, not resist change, and insist on traditional security measures. "

As hybrid cloud architectures become more and more common, IT professionals will need to restart their perimeter security-oriented approach, as their perimeter has greatly expanded and changed.

Unbound ’s Peer said: “Most enterprises use a combination of on-premises and multiple cloud computing workloads on different public or private clouds. With this type of environment, it is possible to secure the surrounding borders.”

2. The threat surface of enterprises is now widely distributed

A fundamental reason why traditional perimeter security cannot be satisfied in a hybrid cloud infrastructure is that enterprises now run workloads in different environments, spanning traditional local infrastructure, private clouds, and public clouds. Given that flexibility is one of the strong attractions of hybrid clouds, companies may also move data between these different environments based on changing business and technology needs.

Brajesh Goyal, vice president of engineering at Cavirin, said: "The attack surface is now widespread, unlimited, and constantly changing."

This means new methods and best practices are needed to ensure data security across different environments. Even if enterprises adopt traditional processes (such as security patches and updates), they need to be reviewed. As Matt Smith, chief architect at Red Hat, recently pointed out, automation plays a key role in businesses that want to handle updates wisely in the hybrid era.

Each type of environment (even every potential provider) in a hybrid architecture has different security considerations and risks. There is no unified hybrid cloud security method because enterprises no longer use a unified infrastructure.

"IT leaders should know that they have different security needs, depending on what the workload is and the environment in which it is located." FlexenTIal Chief Product Officer Michael Fuhrman said, "It is appropriate to adopt a" one size fits all "strategy Protecting the workload of an enterprise will not be effective. "

This is essentially a cost-effective compromise that will again be accompanied by any major IT changes.

The following is a simple example cited by Laurence Pitt, Juniper Networks ’global security strategy director. "The scale and flexibility provided by the hybrid cloud means that users can access multiple environments, but it also poses a risk for departments to form" shadow IT "servers on IaaS, which are not visible to enterprise IT. Or an unmanageable security strategy. "He explained.

When aligning the overall corporate security strategy with the hybrid cloud strategy, put these considerations first.

3. Think about new tools, processes and policies

In short, adopting a hybrid cloud model requires new security tools and practices. Enterprises should not abandon their entire security strategy, but need to revise it.

Goyal said: "Organizations need to embrace new tools, strategies, and ways of thinking in order to achieve a healthy and secure posture for all infrastructure investments on premise and in the cloud."

For example, in the era of hybrid deployments, unified management of various infrastructures and resource sharing become key, Red Hat ’s technical missionary Gordon Haff writes, “Even if an organization has not used public cloud resources, they may already be running multiple foundations. Facilities platforms (such as virtualization) are hybrid in the sense that hybrid cloud management can help unify these under one management interface. "He pointed out," Unified management can also provide IT departments with virtualized resources distributed in different geographic locations Unified view for allocation, capacity planning and billing. "

Perhaps companies are already adjusting their security processes to suit the way DevOps works, and they have begun to focus on security early in the development process: it is often referred to as DevSecOps.

The increasing adoption of hybrid clouds and related trends such as containers and microservices are the key reasons for the growing interest in DevSecOps.

This is the logical evolution of the DevOps culture, because IT leaders realize that in an era of continuous delivery and continuous integration and increasingly distributed environments and architectures, new security methods are needed.

4. Beware of providing a "turnaround" way of thinking

For small businesses with limited or limited IT resources, blind trust in cloud computing providers may be a concern.

On the other hand, the company ’s CIO and other IT leaders must avoid the temptation to confuse distributed or shared risks and completely offload risks.

"The biggest risk of using a hybrid cloud is that companies see this as a safe turnaround. I believe that cloud computing providers will have security standards to ensure continued protection and compliance." Juniper Networks' Pitt said.

The services provided by an enterprise's cloud computing provider to mitigate some risks do not mean that the enterprise has actually taken any measures to address this risk. "This means that companies need to work hard to hold their suppliers accountable for their control." Brian Wilson, chief information security officer at SAS, said, "How can companies know that suppliers will never be able to access unencrypted data? Can they confirm that Is it feasible without additional payment or requiring the enterprise to access the security agent (CASB) through the cloud? The enterprise should ensure that these details are specified in the contract and regularly review these contracts and supplier policies. "

This may be a relatively easy to ignore foundation for hybrid cloud security, so pay attention to it and know how to explain it to others in your organization, which will have many problems down to the application level.

"You must maintain supervision over how data and applications are protected in different cloud computing environments." Pitt said, "Even in hybrid cloud and multi-cloud environments, there are still some risks."

USB Countdown Timer

Function description

The socket is ordinary converter,with two output 5V2A power USB power supply at the same time,can be very convenient in use electrical appliances and recharge the equipment at the same time,such as digital products like Iphone Ipad,MP3,MP4 etc.The charge apply to full range of international AC output,no-load power consumption less than 0.3W,with short circuit,overload,over-voltage protection,can be convenient for your life and save more energy

Timer Control Time Adgustment

1.Press the power switch 1 time,the 1HOUR LED will light on.The Timer into ON mode,USB and control socket output ON .

2.Continuously press the power switch the LED light on,the Countdown mode and LED light on will cycle change from 1HR,2HR,4HR,6HR,8HR,10HR.

3.Choose you need countdown time mode,the mode LED will lighto on,start countdown until countdown time finish,the control output and USB change to OFF

4.Then the countdown is start,The Time indicate LED will from high to low auto change until Countdown finish off.

Failure analysis:

1.check whether the power supply connection is good

2.check whether the USB cable is loosen

Warning Note:

1.Use indoor and dry location ONLY

2.The load max does not exceed 15A 3600W

3.This product does not convert voltage please do not miss use DO NOT exceed the maximum loading of 3600 Watts 15A

4.Always have earth connection for safety reason

5.If in doubt please consult with a qualified electrician

USB countdown timer, USB countdown timer socket, USB timer, USB charger timer, USB timer socket

NINGBO COWELL ELECTRONICS & TECHNOLOGY CO., LTD , https://www.cowellsocket.com