{"id":217166,"date":"2017-06-06T18:08:14","date_gmt":"2017-06-06T22:08:14","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/a-deeper-dive-into-cloud-security-as-a-service-advantages-and-issues-cloud-tech.php"},"modified":"2017-06-06T18:08:14","modified_gmt":"2017-06-06T22:08:14","slug":"a-deeper-dive-into-cloud-security-as-a-service-advantages-and-issues-cloud-tech","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/a-deeper-dive-into-cloud-security-as-a-service-advantages-and-issues-cloud-tech.php","title":{"rendered":"A deeper dive into cloud security as a service: Advantages and issues &#8211; Cloud Tech"},"content":{"rendered":"<p><p>    In a recent article which focused on     cloud security I presented a comparison between    security-as-a-service and traditional style security tooling in    the cloud. This installment is a deeper dive into the security    as a service (SECaaS) paradigm.  <\/p>\n<p>    It would seem to me that a natural outgrowth of the cloud    computing and 'everything as a service' paradigm that the    technology world is undergoing, would be that the tools and    services we use to manage and secure our cloud environments    also move into an as a service mode.  <\/p>\n<p>    In much the way one would expect, SECaaS works under the    principle of a small agent controlled from an external service    provider. It is not so different conceptually from controlling    a number of firewalls (virtual or physical) from an external    management console.  <\/p>\n<\/p>\n<p>    Heres how it works. A security administrator sets the policy    for the service in the SECaaS provider cloud, using online    management tools, and sets what policy or policies applies to a    group of VMs classified by any number of criteria.  <\/p>\n<p>    Then, the SECaaS services governs the security activity within    and around the VM via a lightweight, generic, agent installed    within the VM. When a new VM is created out of a template the    agent is included in the image.  <\/p>\n<p>    Finally, the agent executes various security functions    according to the direction\/policy communicated from within the    providers cloud environment.  <\/p>\n<p>    For example, the security administrator creates a segmentation    policy that all webserver VMs will only accept traffic on ports    80 and 443. The administrator creates a policy in the SECaaS    cloud which is transmitted to the agents on all webserver VMs    in the environment. The agent then acts to block and\/or allow    traffic as per this and other policies that apply to this type    of VM.  <\/p>\n<p>    The advantages of using a SECaaS solution include:  <\/p>\n<p>    As more organisations continue to adopt and move to the public    cloud it becomes even more critical to secure those    environments, applications and services. SECaaS providers    continue to enhance their offerings and continue to add    specific security services to their portfolios. As SECaaS    matures it becomes an even more viable option for securing    enterprise public and hybrid cloud deployments.  <\/p>\n<p>        Read more: Cloud security best practice: Security as a service    or cloud security tooling?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/2017\/jun\/06\/deeper-dive-cloud-security-service-advantages-and-issues\/\" title=\"A deeper dive into cloud security as a service: Advantages and issues - Cloud Tech\">A deeper dive into cloud security as a service: Advantages and issues - Cloud Tech<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In a recent article which focused on cloud security I presented a comparison between security-as-a-service and traditional style security tooling in the cloud.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/a-deeper-dive-into-cloud-security-as-a-service-advantages-and-issues-cloud-tech.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[494695],"tags":[],"class_list":["post-217166","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/217166"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=217166"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/217166\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=217166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=217166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=217166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}