Cloud bursting vulnerability

B2B Cyber ​​Security ShortNews

Share post

As an application delivery technique, cloud bursting enables the best of both worlds to be combined. On the one hand, it allows running an application in a private data center, with known, fixed investment costs, complete control over the environments and organizational expertise to run them.

On the other hand, it is used in a public cloud that is available on demand and has almost unlimited resources. This means you only pay for additional resources when you need them. In short, this means that cloud bursting is a hybrid cloud delivery model that works in a similar way to "pay-as-you-go", i.e. costs only arise as more resources are consumed.

This model gives IT teams access to technology relevant to their project despite the lack of operational knowledge. This is especially true for database services, which are notoriously difficult to configure and manage. The type of architecture required to support cloud bursting does not necessarily depend on the application, but rather on its architecture. The ideal architecture for this concept of application delivery technology is loosely coupled and independent, so that the components communicating between the private data center and the public cloud do not have to transfer large amounts of data between them and can tolerate unpredictable latencies.

IT security challenge

Cloud bursting brings with it numerous challenges, the most important of which are the impact on IT security and data protection. In order to guarantee the IT security of the networks, companies must set up encrypted routes between the data center and the cloud components. In addition, the dynamic nature of cloud bursting leads to a proliferation of machine identities. In the cloud, the only thing that separates it from another cloud and authenticates it to the data center is the respective machine identity. For this reason, companies need to set up a control plane to automate the management of machine identities. This provides IT teams with the observability, consistency, and reliability they need to effectively manage their machine identities.

In addition, it is equally important to be aware of different configurations – the way infrastructure is deployed and configured differs between data centers and the cloud. The types of virtual machines available, the hypervisor they run on, and networking are likely to vary. As a result, IT teams must support multiple configurations for the same application. In addition, there are other issues such as data transfer fees, as cloud providers often charge for data ingress and egress.

More at Venafi.com

 


About Venafi

Venafi is the immune system for the internet, protecting the foundations of all cybersecurity - keys and certificates - from being misused by cybercriminals. In today's connected world, cybercriminals seek to gain trusted status and remain undetected, making keys and certificates a primary target. Unfortunately, most systems blindly trust keys and certificates. This allows cybercriminals to hide in encrypted traffic, spoof websites, spread malware and steal data. As immune system of the internet/ Venafi controls across the network, on devices, behind the firewall, and across the web to determine which SSL/TLS, SSH, Wifi, VPN, and mobile keys and certificates can be trusted. Furthermore, Venafi protects those who can be trusted and repairs or blocks the others.

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more