White Paper: Cloud Network Security Best Practices

Networking in the application layer is about bringing the network close to the application, and giving control over the network and its configuration to the application owners. Finally, cloud application owners can now dictate specific security rules for each application in network layers 3-7.

Executive Summary

Regardless of cloud deployment model (public, private or hybrid cloud), all organizations need security for critical applications and sensitive data. Defense in depth has never been more prevalent than with cloud computing and third party interactions with critical data.

Layers of security can bolster defenses for any application, database, or critical data. In a data center, application owners could physically segment networks and built walls around data. As data centers virtualized, application owners could add logical segmentation at the virtualization layer.

Networking in the application layer is about bringing the network close to the application, and giving control over the network and its configuration to the application owners. Finally, cloud application owners can now dictate specific security rules for each application in network layers 3-7.

First, application owners should selection cloud providers that have published security policies, industry certifications, and recognition. Next, cloud users should take advantage of cloud provider settings that provide additional isolation and network controls for traffic to and from their applications. Finally, application owners must use application-layer security and segmentation they alone own and control.

By adding VNS3, application owners can create an overlay network over the top of a provider’s network. This network depends on the native layer, but is fully owned and controlled by application owners. Likewise, IPsec (Internet Protocol Security) tunnels are a vital addition because users can control encryption keys and verify traffic as it travels across the public internet, cloud regions and to third party environments.

Because it offers completely unique application layer security features, VNS3 allows application owners to manage their own authenticated, encrypted SSL tunnels. When used in combination with cloud provider security features, VNS3 security make applications more effective.

Read the full White Paper now (PDF). 

 

By: Margaret Valtierra