Latest Cloud computing publications
According to the State of Cloud Native Development Report developed for CNCF by SlashData, there are now 6.5 million cloud native developers, an increase of 1.8 million since Q2 2019.
With the pandemic continuing to cause disruption to countless services, many businesses have benefited from the shift to the cloud due to the advantages it provides around reduced IT costs, flexibility and scalability.
Optimal cloud security requires a distinct way of thinking about IT infrastructure, says Ray Pompon, Principal Threat Evangelist at F5 Labs. Back in the day, the theft and loss of backup tapes and laptops were a primary cause of data breaches. That all changed when systems were redesigned and data at rest was encrypted on portable devices. Not only did we use technology to mitigate a predictable human problem, we also increased the tolerance of failure. A single lapse, such as leaving a laptop in a car, doesn’t have to compromise an organisation’s data. We need the same level of failure tolerance, with access controls and IT security, in the cloud. In the cloud, all infrastructure is virtualised and runs as software. Services and servers are not fixed but can shrink, grow, appear, disappear, and transform in the blink of an eye. Cloud services aren’t the same as those anchored on-premises. For example, AWS S3 buckets have characteristics of both file shares and web servers, but they are something else entirely. Practices differ too. You don’t patch cloud servers – they are replaced with the new software versions. There is also a distinction between the credentials used by an operational instance (like a virtual computer), and those that are accessible by that instance (the services it can call).