Skip to the content.

Security Architecture

Security Architecture

Design, structure and behavior of an organization’s information security environment.

On-Premises Data Centers

When it comes to data centers, there are two primary options: organizations can outsource the data center or own the data center. If the data center is owned, it will likely be built on premises. A place, like a building for the data center is needed, along with power, HVAC, fire suppression and redundancy.

Components of a Datacenter:

Heating, Ventilation and Air Conditioning (HVAC) / Environmental

Ensure adequate cooling for high-density and enclosed space equipment.

Data Center/Closets

Protect access to the physical layer for information system security.

Power

Ensure constant and consistent power delivery to data centers.

Key terms:

Fire Suppression

Choose appropriate fire detection/suppression considering room size and equipment risks.

Using Robust Systems

Cloud Computing

Cloud computing involves accessing and utilizing computing resources and services over the internet, provided by third-party vendors. It offers scalability, flexibility, and reduced dependency on on-premise hardware.

Cloud Concepts

TO learn more, check out Cloud Computing.

Key Considerations

Managed Service Provider (MSP)

A company managing IT assets for another organization and is Commonly utilized by small- and medium-sized businesses for day-to-day IT operations.

Service-Level Agreement (SLA)

It is an agreement between a cloud service provider and customer that defines the quality of cloud services, specific to cloud computing terms and roles.

Common Security Challenges

Cloud Security Controls

Virtualization

Virtualization involves creating virtual instances of computing resources, such as servers, storage devices, or networks, to maximize resource utilization and flexibility.

Hypervisors

Hypervisors are software or firmware that create and manage virtual machines (VMs).

VM Vulnerabilities

Securing VMs

Securing VMs are almost similar with how we secure physical servers.

Containerization

Containerization is a lightweight form of virtualization that encapsulates an application and its dependencies into a standardized unit known as a container. Containers can be easily deployed and run consistently across different computing environments.

Advantages

Serverless

Serverless is an approach where cloud providers manage the infrastructure, allowing developers to focus solely on writing and deploying code.

Vendor Lock-in

It is a situation where a customer becomes dependent on a particular vendor’s products or services to an extent that switching to another vendor becomes impractical or costly..

Mitigation:

Microservices

Microservices is an architectural approach where applications are composed of small, independently deployable services. Each service is focused on a specific business function and communicates with others through APIs. This allows for modularity, flexibility, and scalability, enabling teams to develop, deploy, and maintain services independently.

Monolithic vs Microservices

Benefits

Challenges


Back to main page