Cloud Skill
Cloud Skill
Cloud Skill
2 3
10
10 16
16
lthough some would argue that cloud computing dates back to the dawn of the mainframe, its most recent incarnation began around the turn of this century when the concept of software as a service was born. Cloud computing centers around the concept of sharing computing resources rather than having local servers or personal devices handle applications. Clouds can be public, available to anyone or organization that wishes to use it; private, located in an organizations data center or off premise; or a combination of the two known as a hybrid. With the rise of cloud computing has come many shifts, not the least of which is a change in the skill sets required of IT professionals. This ebook will discuss core competencies needed to successfully administer a cloud environment as well as opportunities developing in the cloud computing market place. While IT professionals will be able to leverage many of their existing skills to manage cloud environments, the cloud requires a holistic mindset, and that means moving beyond ones comfort zone. Successful network and systems integrators, for example, will need to think beyond just bringing together the hardware and software components with which they are familiar. They will need to think of themselves as cloud integrators, and that will require a deeper knowledge of newer technologies and services for Internet-connected providers to produce and deliver. Security is another key component of cloud management, particularly when it comes to working with public clouds. Moving customer data outside of the organization is one of the biggest barriers to public cloud adoption. This perceived shortage of highly skilled cloud security
professionals presents a unique opportunity for IT professionals. When it comes to transitioning to a cloud computing environment, there is no one true path. There are, however, best practices for successfully reaching your destination, be it public cloud, private cloud or a hybrid of the two. We hope you find this ebook a useful roadmap as you embark on your journey.
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
If so, youre not alone. Many systems and network integrators share your concern and are actively seeking to understand what they need to do, not only to remain in the industry, but to continue to advance their careers upward through it. The good news is that the cloud does not reduce the need for integrators. It simply broadens the ways in which technologies can be integrated, which creates the need to expand your knowledge and skills to take full advantage of the new flexibility, scalability and agility that cloud computing offers to companies large and small. Cloud computing is not a starkly new and different technology, it is a set of technologies that have been in development for years and that allow us to deliver IT services in new ways. Once youve trained yourself on these new techniques and technologies, you will become part of a new category of integrator the Cloud Integrator.
Over the past few decades, information technology integrators have segregated themselves into two fundamental types: Systems Integrators According to the Wikipedia, systems integration is the process of linking together different computing systems and software applications physically or functionally to act as a coordinated whole. For systems integrators, the focus is on bringing different software systems together to work in concert. Network Integrators Network Integrators focus on the infrastructure that software applications require to run. This includes creating connections between local area networks at disparate locations, optimizing the communications
Integrators
From the moment there was more than one manufacturer making computer hardware devices and software developers creating applications, there were integrators seeking to combine these products into superior solutions for themselves and their clients. Integration makes sense and brings value to information technology clients in that it creates choice at a component level, with the integrator leveraging lower cost and higher performance to create client satisfaction.
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
between them, assuring the security of data in transit, and monitoring network functionality to assure business continuity and high-availability.
may be one of dozens or even hundreds of customers on the same server. This is referred to as a multi-tenant environment in which each customer is firewalled from the others to assure information security and privacy. This multi-tenancy is enabled by server and storage virtualization technologies that allow large, robust servers to run many instances of the server operating system, thus sharing one unit of server hardware among many customers. This sharing allows the provider to dramatically reduce the cost to each customer, which has enabled providers to offer highly attractive pricing for their services. Public cloud services include Microsoft Office 365 and Windows Intune, Google Apps for Business and IBM LotusLive. These are usually sold by subscription through resellers who function as sales agents. The challenge to these resellers is that the prices for public cloud services have become so low that they have difficulty driving sufficient revenue from the sale of the subscriptions alone. These resellers employ cloud integrators to furnish their customers with initial planning and design services, data preparation and migration, and ongoing training and support to deliver greater profitability from each subscription sale. Cloud integrators working in a public cloud environment will want to develop a strong knowledge and understanding of how to provision and configure DNS (Domain Names Services) so they can direct email and other traffic from the Internet to the appropriate public cloud service providers and then back to the customer. Since public cloud services usually include email and unified communications, training on how to properly migrate, manage and archive email, instant messenger, and other data will also be critical. Also, focus on how to
Cloud Computing
Cloud computing moves some of your infrastructure, particularly servers, storage and some applications, to a remote data center operated by a professional provider. Some of these providers are very large, well-known IT industry mainstays, such as IBM, Microsoft, HP and Savvis, as well as relative newcomers including Amazon, Google and Rackspace. Others are far smaller in terms of resources and funding. Properly selecting the right providers for a particular requirement will be a skill that cloud Integrators will need to develop.
Cloud computing moves some of your infrastructure, particularly servers, storage and some applications, to a remote data center operated by a professional provider.
4
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
manage multiple data types, including voice and video. From a security perspective it will also be important to manage multi-factor authentication and authorization technologies to enhance the ID/Password security offered by most public cloud service providers today. Private cloud environments are designed to serve one specific customer with no multi-tenancy. A private cloud may be built and delivered from a providers remote datacenter, or it may be built in an integrators facilities and managed by that integrator, or it may be constructed on the clients premises. Many systems and network Integrators will find private cloud to be a very familiar environment to work in, as they will still be called upon to do many of the things they have always done in other environments. They will still need to manage servers, storage, applications and networking as before. In fact, they are so similar that many questions arise regarding how a private cloud built on a customers premises is different from being simply a virtualized data center. The goal of a private cloud environment is to establish a separation between the applications the user interacts with and the underlying technology that powers it. In a successful private cloud environment, the users never see or concern themselves with the technology. Its completely transparent to them. To expand upon this, some of the characteristics of cloud computing as defined by the National Institute for Standards and Technology (NIST) must be considered: Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics:
as needed automatically without requiring human interaction with each services provider.
Resource pooling
The providers computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines.
Rapid elasticity
Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Measured Service
Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service. These characteristics offer insight into the broad scope of knowledge cloud integrators will require, including resource provisioning, network access control for a wide variety of client devices, multi-tenant separation (for
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
On-demand self-service
A consumer can unilaterally provision computing capabilities, such as server time and network storage, 5
Back to Contents
departmental or multi-company-within-a-corporation operations), virtualization of servers, storage, desktops and more, as well as monitoring, measurement and management of many service components. Hybrid cloud approaches will be necessary for a long time to come as companies work to transition to cloud computing services. The primary compelling reasons to transition are to reduce their costs and increase service levels. This must be balanced against maintaining the security of company data, as well as regulatory compliance and other fiduciary responsibilities surrounding data privacy. Customers will want or need to keep some data within their own walls until they can completely trust the security of cloud providers. Cloud integrators will be called upon to know how to combine some services from remote data centers with applications that must run on premises. Overall, cloud integrators will be engaged in combining services more than technologies or applications. This will include integration of services from different cloud providers as well as integration of cloud-delivered services with services sourced from systems located on the clients own premises. It is anticipated that support of this hybrid model will continue to be necessary for many years to come and will require cloud integrators to understand the interaction of differing communications, security and data interchange standards.
Virtualization
The most important skillset to master in private cloud computing will be the implementation and ongoing management of the many virtualization technologies, including: Server Virtualization The virtualization engine that underlies server virtualization is referred to as the hypervisor. The three primary hypervisor environments are Microsoft Hyper-V, VMware vSphere and Citrix XenServer. Cloud integrators will want to study each to understand the comparative strengths and weaknesses, as well as their requirements. Optimization of the virtualized server environment is achieved by automating the movement of server instances to the most cost-effective server machine available, even automatically shutting down machines that have been emptied of server instances; thus saving power, too. This requires working knowledge of virtualization management systems, such as Microsofts System Center Virtual Machine Manager or VMwares vCenter. Storage Virtualization Storage area networks (SANs) can also be virtualized to dynamically allocate storage space not only among users, but also among different companies all sharing a cloudbased SAN. Cloud integrators should seek training on
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
how to manage SANs, paying particular attention to the technologies that allow dynamic movement of storage from one server to another in event of server failure and dynamic storage allocation technologies. Desktop Virtualization The ultimate cloud experience is the ability to access data, applications and other resources from whatever device a user may have, wherever he may be, on whatever network he has access to. The most effective way to accomplish this is to perform the actual computing at the server and only send screen contents and receive keystrokes and mouse movements. This is far less data to transmit than entire applications, making it possible to use much less bandwidth and still get better response time. Cloud integrators will need to develop VDI (Virtual Desktop Infrastrcuture) skills on products such as Microsoft Terminal Services, Citrix XenDesktop and XenApp, VMware View and others.
of principles and methodologies for designing and developing software in the form of interoperable services. These services are well-defined business functionalities that are built as software components (discrete pieces of code and/or data structures) that can be reused for different purposes. SOA design principles are used during the phases of systems development and integration. It is no surprise that these architectural standards are emerging in parallel with the growth of cloud computing. Following the self-service characteristic of cloud computing, the effort here is clearly to make it possible to assemble and integrate software components in the cloud through management of simple messaging over easily achieved and quickly disassembled connections. This is a logical consequence of the emergence of webparts, in which small pieces of code perform very specific functions that would never logically stand alone, but when combined through programming or other management create useful functionality available over a web browser or web-enabled application. This foresees, then, a time when cloud integrators will not be integrating hardware or software, but rather will be managing the creation and successful execution of cloud-based workflows involving a wide variety of pieces of code designed to perform specific functions. These workflows may be executed within a specific organization or may cross multiple organizational lines, similar to the way in which B2B eCommerce supply chain systems like Microsofts BizTalk Server connect suppliers, manufacturers, customers and others to facilitate rapid process execution.
Technology professionals seeking to become cloud integrators will find a tremendous variety of new opportunities as the universe of cloud computing continues to expand geometrically.
7
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
also comes the need for more and better trained Cloud Integrators to bring this all together.
Summary
The world of the cloud integrator will differ widely from that of their network and systems integration predecessors. Where network integrators focused solely on communications protocols and standards, and systems integrators concerned themselves with the loading of software onto properly configured systems, the cloud integrator will need a broader education in both of these disciplines and much more. They will need a far better understanding of capacity planning and management, interprocess communications, workflow management, security standards and how to coordinate them between divergent providers and coordination of directory and name services between vastly different platforms. The cloud integrator will need to be able to translate technology infrastructure into service deliverables, and
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
speak two languages simultaneously, interfacing and communicating effectively both with the clients who are using the services and with the providers of the various component services that will be assembled to create those services. This will require disciplinary cross-training on a whole new scale. System specialists will want to take the time now to improve their understanding of internetworking transport and network protocols, while network integrators will want to focus on session, presentation and application skills. Because users will feel the need to keep certain applications and data sets housed within their own walls, all will need to learn to work effectively in a hybrid environment that connects many cloud-delivered services with the clients on-premises network, and all will need to develop far deeper capacity planning, provisioning, network and data security and systems management skills.
The future promise of all of this is a computing environment that is richly resourced, highly flexible and scalable, creating the opportunity for businesses that use them to achieve higher levels of agility, nimbleness and profitability than ever before. Perhaps more important is the opportunity for todays technology professionals to play a major role in the development of the next generation of technologists. All of the standards described in this white paper, and all of the information being shared about cloud computing in general are still in their formative stages. Gartner, NIST, HP and all of the other players in the cloud market acknowledge that the definitions they share are bound to change repeatedly over the next few years as cloud computing evolves. Todays network and systems integrators have the unique opportunity to drive those redefinitions and shape the direction of the future world of cloud computing and cloud integration.
The world of the cloud integrator will differ widely from that of their network and systems integration predecessors.
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
As the world of cloud computing continues to evolve at light speed, New Horizons helps the worlds workforce stay proficient with the latest technologies and achieve their career goals. With 300 centers in 70 countries, New Horizons is the worlds largest independent IT training company. Our innovative, award-winning learning methods have revolutionized the way students learn, retain and apply new knowledge. Our partnerships with major developers of cloud technology, including Microsoft, Cisco, and VMware, allow us to offer the courses you need to leverage your current skills and adopt new ones to gain a competitive advantage. Its what weve been doing better than anyone else for 30 years, and what we plan to do well into the future.
www.newhorizons.com/Cloud-Computing.aspx
loud computing provides new and more efficient methods to deliver IT services. Just like any other service delivery method, achieving a stable, reliable state that provides an optimal user experience requires careful management. Before we can discuss the management of a reliable cloud environment, we need to establish a common understanding of just what it is that needs to be managed in the cloud. This is challenging because many, many people have offered up many, many different definitions of everything having to do with cloud computing. For the purposes of this article, we will once again use the definition developed by the Information Technology Laboratory at the National Institute of Standards and Technology (NIST): Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The list of resource examples, including networks, servers, storage, applications and services, sounds very similar to what most network managers are responsible for managing right now and, in fact, it is. Cloud computing services are delivered from data centers that do not differ widely from the data centers that many companies maintain on their own premises. One of the primary benefits of cloud computing that is cited frequently is cost savings. In large part these savings come from the economies realized by using a shared pool of configurable computing resources. Because they are shared, the cost of hardware, software
and operations is distributed among all users. The ability to share server, storage and other resources is enabled by virtualization technologies. Prior to the introduction of virtualized servers, each server only ran one instance of the server operating system. Moving that single-user server to a remote data center actually increased costs, in that it added the cost of communications with that server. Virtualized servers run dozens, and soon hundreds, of instances of the server operating system in a multitenant environment. This allows one unit of hardware to serve dozens and soon hundreds of customers. Each of those customers pays a fraction of the cost of the infrastructure used to support them, creating substantial cost savings per customer.
10
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
11
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
for example, will be substantially different from those of a private cloud providing infrastructure as a service.
routers, switches, modems, and other network interface devices, are extremely reliable and rarely fail. In fact, the majority of problems they actually resolve focus on carrier outages or reductions in service. Since their customers subscribe to and pay for a specific service level, the network management service reports specifically on carrier performance to help their customers ensure that they receive the Quality of Service to which they subscribed. The carriers themselves report on Quality of Service regularly, but independent monitoring is required to assure accuracy. With cloud computing, many more services are introduced that carry a Service Level Agreement. The Quality of Service for cloud-delivered servers, storage, software as a service, and other cloud services must each be separately monitored, measured, and reported for much the same reason. Customers have the right to demand specific performance from their cloud services. Proper vigilance through aggressive network and systems management can help to assure it.
Performance
There are many moving parts to any compute environment, and each can introduce latency. Latency translates into user dissatisfaction. Performance monitoring looks at CPU, memory utilization, bandwidth, I/O, network, and any other factor that can potentially create delay. Technology professionals will need a broad familiarity with every part of the infrastructure to enable them to identify and evaluate potential bottlenecks and anomalies.
Another distinguishing characteristic of cloud computing is that it introduces a layer of abstraction that separates the services being delivered to the end-user from the underlying technology infrastructure required to support them.
12
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
feature-rich and faster to use. Network connections between the user community and the cloud data center must be optimized, and IP addresses and DNS properly managed. Both primary and backup storage must be adequately provisioned with configurations for blocklevel snapshotting, server replication, data mirroring and data compression. The clouds virtualized environment must be load-balanced, with properly placed virtual machines and data workloads. The same requirements for security and regulatory compliance apply in a cloudbased infrastructure. Technology professionals who have traditionally focused on any one of these areas must recognize that just as cloud computing compresses process requirements and infrastructure, it will also compress many responsibilities into each specialist involved in the management of the environment. It will become paramount not only to deepen existing skill sets, but also to broaden your understanding of the entire infrastructure from network to systems. If you have focused previously on servers, add network protocol management to your skill set. Network specialists need to recognize that servers have become simply another element of the infrastructure and adjust skills to accommodate.
Infrastructure Management
Even though it may be located at a distant data center, the cloud providers infrastructure is very similar to onpremises infrastructure. Servers must be provisioned and managed, although the tools to do so will be much more
13
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
All technology professionals will want to improve upon their capacity planning skills to increase their ability to optimally provision and configure server resources in the cloud environment. Optimal economies can be realized by rightsizing each server precisely to its specific use case and adjusting as requirements change. While most cloud server providers include provisions for load balancing, high availability and fault tolerance, IT managers will want to be able to adapt services to suit their particular environment.
will need to develop superior skills in delivering support remotely using session shadowing and other collaborative tools.
Application Management
The cloud brings us to an evolution in the use of the word solution. Cloud customers expect solutions to be totally business-relevant and focused on overcoming corporate challenges. Because it abstracts the infrastructure and focuses on the delivery of services, managing cloud computing requires greater focus on applications and everything that affects them. Managers need to know how to measure response time, throughput, errors, resource utilization, availability, and user satisfaction. They also need to know how to manage the performance of the servers that house those applications so they can understand the impact of server utilization factors, such as CPU utilization, memory, storage I/O, network access and availability, and active processes. Those who have traditionally specialized in server management will recognize many of these as areas they have managed for a long time. It will be important for these professionals to add deeper understanding of the software mechanics of applications as well as focusing on how network bandwidth utilization and transport protocols can be tuned to positively impact and tune application performance.
Services Management
Each service delivered from a cloud environment depends upon many factors. Resources must be provisioned and managed, including CPU, memory, storage and bandwidth. Monitoring, alerting and reporting must be maintained to assure rapid response to anomalies or outages. Applications must be correctly configured for optimal performance, and interacting with servers, storage, and the network. Those with narrowlyfocused expertise must learn about all the moving parts of the technology they support to survive and thrive in the cloud era. Technology professionals must change their orientation accordingly to address each service as a service by preparing themselves to deal with the entire support system, including all of the above.
Support Management
The most important goal of any IT endeavor is to deliver the best possible user experience, which depends in large part upon the quality of user support. This is as true of emerging cloud environments as it has ever been in on-premise deployments. One of the advantages of cloud computing is the abstraction of the service delivered to the user from the underlying technology required to deliver it. In other words, the network should be completely transparent to the user, allowing him to focus on the data and the processes he needs to perform with it. To take fullest advantage of the remote infrastructure of the cloud, user-support specialists
Server Management
It is important to remember that cloud servers are still servers, requiring the same administration and management as they would if they were physically located at your own location. The fact that they are located at a remote data center simply removes the responsibility and cost required to maintain and power and cool the physical hardware. The technology specialist must still perform all the processes that were required when the server was local. While cloud providers routinely provide a self-service capability to instantiate and configure servers, those
14
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
server instances must be carefully monitored to ensure they are functioning properly, and performing optimally. The cloud environment facilitates server problem resolution in that a troubled server instance can simply be deleted and replaced in seconds. In an on-premise environment, it would require the replacement of hardware and incurrence of significant downtime. Skills in server provisioning, configuration and performance tuning will be required to facilitate rapid and accurate server modification and replacement.
Managing Costs
Cloud computing enables IT managers to add computing resources as needed to accommodate peak periods of activity, and then reduce back to normal when the peak has ended. Failure to reduce the capacities will incur unnecessary expense. The larger the cloud implementation, the greater the savings that will come from carefully managing subscribed compute resources. As their involvement in cloud computing grows, technology professionals will be required to become more adept at the financial management of user/provider relationships. Since cost savings is such a primary driver of cloud adoption, it will fall at least in part to the IT department to manage utilization to maximize these savings.
Management of Virtualization
Virtualized servers are also still servers, requiring management and load balancing of their resources, including active processes, CPU and memory utilization, IP address and DNS management, storage placement, I/O and throughput. Technology professionals will want to learn more about optimizing virtual machine placement and adjusting storage Quality of Service parameters, including reservations, shares and limits. New virtualized machine management solutions are emerging that will perform virtual machine load balancing by moving VMs to the most optimal location in the host cluster automatically. Should an entire machine become unnecessary to the operation of the cluster, it is powered down and later powered back on when it becomes needed again. The evaluation of optimal location is governed mainly by two criteria, aggressiveness and frequency. Virtualization specialists will need to be able to evaluate the relative benefits of optimization against the potential latency introduced by the process.
Cloud computing enables IT managers to add computing resources as needed to accommodate peak periods of activity, and then reduce back to normal when the peak has ended.
15
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
Microsoft
10324 Implementing and Managing Microsoft Desktop Virtualization (Cloud Integration and Managing) 10215 Implementing and Managing Microsoft Server Virtualization (Cloud Integration and Managing) 10750 Private Cloud Monitoring and Operations with System Center 2012 (Managing) 10751 Private Cloud Con guration and Deployment with System Center 2012 (Managing) 50592 Advanced SQL Azure (Cloud Integration and Managing) 50466 Windows Azure Solutions with Microsoft Visual Studio 2010 (Cloud Integration and Managing)
VMware
VMware vSphere Install, Con gure, Manage v5.0 (Cloud Integration and Managing) VMware View: Install, Con gure, Manage v5.1 (Cloud Integration and Managing)
Citrix
CXD-202-1 Citrix XenDesktop 5 Administration (Cloud Integration and Managing) Information Security Certi ed Information Systems Auditor (CISA) (Security) Certi ed Information Security Systems Professional (CISSP) (Security) CompTIA Advanced Security Practitioner (CASP) (Security)
organization involved in certifying information security professionals, recently engaged the research firm of Frost & Sullivan to produce The 2011 (ISC)2 Global Information Security Workforce Study. Some of the key findings cited in this study include:
16
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
the deployment of new technologies in the enterprise being offset by a demand for more security education on these technologies.
Many believe that security is furnished by the cloud providers themselves. According to a recent study by The Ponemon Institute that was commissioned by CA, The majority of cloud providers believe it is their customers responsibility to secure the cloud and not their responsibility. They also say their systems and applications are not always evaluated for security threats prior to deployment to customers. Ponemon suggests part of the reason behind this as being, The majority of cloud computing providers surveyed do not believe their organization views the security of their cloud services as a competitive advantage. Further, they do not consider cloud computing security as one of their most important responsibilities and do not believe their products or services substantially protect and secure the confidential or sensitive information of their customers. Of course, ultimate responsibility for data and network security always rests with the customers themselves. It is only they who will suffer from compromise or corruption of their corporate data assets. While they may be able to successfully prosecute a lack of due diligence on the part of a provider and receive partial remuneration, it is they who are required to protect all corporate assets by their stakeholders. IT professionals responsible for data and network security at companies that use cloud computing will be expected to step up to meet these requirements. The fundamental architecture of cloud computing connects data sources and services from many different sources to integrate superior solutions far more flexibly than ever before. Each of these data sources will have its own security provisions, requiring the security professional to develop skills in interfacing and integrating these divergent security platforms to
The Opportunity
Technology professionals who are concerned about being displaced by cloud computing should be encouraged by the breadth of new opportunities being created by the perceived need for greater security to protect and control data as it is migrated to the cloud.
The fundamental architecture of cloud computing connects data sources and services from many different sources to integrate superior solutions far more flexibly than ever before.
17
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
protect the data while maintaining acceptable access by authorized users. This synergistic nature of cloud computing will require a broad understanding of how all of the components of the infrastructure interact with each other. Any specialist wishing to focus on cloud security, or any aspect of cloud computing for that matter, will need to expand her skill sets to include every discipline that is involved in making and securing these connections. This includes network communications, server operations, network access control, protocol analysis and tuning, data structures, data packet architecture, storage infrastructure, bus, backbone, and fabric design, even software development and database management. It also extends to new skills created not as much by technology as by human involvement, including regulatory compliance, human resource and legal compliance, and behavioral monitoring and analysis. With many studies agreeing that 80 percent or more of data exploits are committed by people inside the company, monitoring the activities of individual users to identify unusual access attempts and other actions has become an important security consideration.
to use the same device to do their work that they use to access entertainment and personal information. Cloud Security Specialists will be required to get each of these devices to conform to the access control configuration requirements of their network. The corporation wants these employees to use their own devices, as it will encourage them to extend their workday through travel time and back to their homes. It will also substantially reduce the investments required in corporate-supplied client devices. Employers and their employees are also grasping the value of social networking to tie their people together with suppliers, customers, service providers and other associates in deeper, more meaningful ways. The Cloud Security Specialist should see social networks as yet another way into the network that could potentially circumvent security measures. This balance between securing the assets and protecting the company, yet still providing the optimum user experience is not new. It has been with us for as long as there has been distributed computing. However, the increased flexibility and reach of the cloud substantially amplifies as many vulnerabilities as it does capabilities.
The Challenge
Another fundamental element of the cloud computing environment lies in its openness, flexibility, and ease of information access. Very quickly, mobile devices and tablets are overtaking the desktop or laptop computer as the user access device of choice, increasing the number of access points geometrically. These users want to be able to access their information effortlessly and very quickly. Those with fiduciary responsibility for the corporations data assets want that access to be well secured and resilient. Cloud Security Specialists will be challenged to achieve and maintain this balance between easy and flexible, yet secure, network access and data management. Making this more challenging is the advent of BYOD or Bring Your Own Device strategies created by the growing consumerization of computing. Users want 18
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
208.97.227.12. When subscribing to public SaaS services, such as email or instant messenger, a series of entries will need to be made to tell DNS to direct all traffic such as email, IM and voice applications to your cloud service provider. DNS is managed by various providers, most usually a companys Internet service provider (ISP). Each ISP has different ways of managing DNS, so it is important to develop a mastery of the fundamentals of DNS so you can easily configure and manage this key connection. Similarly, as more companies migrate their primary messaging systems, such as email, to cloud-based servers, there will be a growing need to properly manage the interaction with the networks Active Directory. As more companies decide to allow other companies domains to interactively communicate with their domain, a process known as federation, there will be a growing need to manage Active Directory Federation Services (ADFS). Cloud-based email also increases the need for close attention to privacy standards, message retention policies and secure message integrity. IT security professionals will certainly be called upon to continue and extend their responsibility for control over user authentication and authorization to cloud-accessed services.
By definition, a public cloud is a multi-tenant environment that achieves economies of scale by sharing pools of resources such as servers, storage, and applications among many different users from many different companies.
19
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.
Like on-premise networks, private clouds are almost always connected to the global internet. This leaves them exposed and vulnerable to all the same attacks and exploits as any traditional data center. Hackers can bring them down by using techniques, such as Distributed Denial of Service attacks, phishing, malware and firewall penetration. Private clouds may be built by companies in their own dedicated facilities, but more and more often virtual private clouds are being provisioned within the data centers of Infrastructure as a Service (IaaS) providers and other co-location or hosting facilities. This adds complexity to the security equation, as professionals now need to allow for security standards and provisions in addition to their own. The CA Ponemon study cited earlier indicates that virtual private cloud IaaS providers consider security to be part of their responsibility far moreso than public SaaS providers. However, this does not relieve the customer from owning ultimate responsibility. Private cloud security exists at most of the seven layers of the classic International Standards Organization Open Systems Interconnect (ISO/OSI) model, and adds one of its own: Physical Private clouds may be built by companies within the confines of their own premises, in which case they have all of the same security requirements as any other data center. Even in the case of Virtual Private Clouds that are provisioned in a providers data center, the infrastructure for user access within a companys facilities is still vulnerable to attack and must be properly protected. Network The fact that the core of the network is physically removed from the edge does not change the fact that there is a network connecting them, and that network is vulnerable. A deeper understanding of packet communications, including the various mechanisms within the TCP/IP stack, firewalls, stateful and stateless inspection technologies, MAC-layer addressing and Ethernet architecture are as necessary here, if not moreso, as they are in any network. 20
Back to Contents
Virtualization While not a layer in the classic ISO-OSI model, server virtualization, storage virtualization and even desktop virtualization, are each major contributors to the costsaving and performance-enhancing features of cloud computing. Multi-tenant firewalling and the ability to properly monitor it are essential to assuring the security of the cloud to all tenants. Session In the cloud model, the Session layer could more appropriately be termed the Server Operating System Layer. In an IaaS or PaaS environment, the responsibilities of the IT professional remain identical to the on-premises environment. The fact that the servers are not physically accessible to the IT professional has no impact upon the fact that they are servers that must be managed and administered as if they were located in the next room. Application IaaS allows customers to locate their servers in data centers that they themselves do not need to manage. This is true of the infrastructure within that data center only. The customer will still be the one to install applications and manage them. Many applications take advantage of active directory services to manage authentication and authorization, but the cloud-based IT professional will need to be constantly monitoring and testing the effectiveness of these measures.
21
Back to Contents
Cloud Computing: Discover the Skills that Power the Cloud 2012 QuinStreet, Inc.