Over the last two years many small and medium sized businesses have become increasingly aware of cloud computing but have remained cautious in deploying the available cloud technology, according to tech industry analysts.
“The impact of cloud technology in the SMB space will remain small in the near future,” according to Dave Pearson, senior analyst for enterprise solutions and networking at analyst firm IDC Canada.
He said security, reliability issues and confidence in managing and integrating the technology with existing systems remain as key stumbling blocks for many small firms.
The State of Cloud Computing in Canada: Enter to win a pair of tickets to Toronto FC by taking our survey.
“However, there are a growing number of organizations it the space that are experimenting with cloud-based tools, they are using it mainly for storage,” he said.
As such, Pearson said, he finds SMBs flocking to cloud storage solutions tend to be companies with large storage capacity needs, but do not require rigorous security or firms looking for flexible storage payment structures but do not mind failure rates.
Traditional risk assessments focus on external/internal access to confidential information like social security numbers, credit card number, and for banks PINs for the ATMs. Access controls and network protection are high priorities because they suppress the risk.
“The actual dollar spend on cloud storage is low but the bogeyman is security and reliability,” said Pearson recalling the outage that Amazon recently experience with its Elastic Compute Cloud service and the Google cloud outage.
The desire is to avoid single points of failure for critical applications so that catastrophic errors don’t occur; those lead to huge financial loses and a diminished corporate brand.
Here are some storage and networking diagnostic questions you would ask for the top-10 applications within a corporation.
Note that some questions that need to be asked are pertinent to all applications and some just within a given domain. We’ll focus on just the storage and networking product domains that support the top-10 applications.
Storage Architecture — All Applications
Is only one storage area network (SAN) vendor used for storage of all of the applications?
How is data de-duplication addressed?
Is only one SAN switch vendor used for all of the applications?
Is only one data replication vendor used?
Is only one encryption vendor used to encrypt data for all of the applications?
Which encryption algorithm is used for a given encryption tool?
Is only one public key infrastructure (PKI) vendor used to manage certificates?
Where are the certificates related to data at rest encryption stored?
Storage Architecture — Each Application
What storage subsystem does the application run on?
Which other applications run on the same subsystem?
Is the data on the storage subsystem replicated elsewhere or is this the only copy?
How is the need for more data storage addressed for a given application?
What SAN switch is used for traffic to/from the storage subsystem?
What network components are used to replicate SAN data from one data centre to another remote data centre?
What is the application that performs data replication?
What is the software version and release for the data replication application?
Which encryption vendor is used to encrypt Confidential data on a given storage subsystem?
Does the storage for the encryption tool also run on a SAN shared with other applications?
Can corruption of the encryption data affect multiple applications or just this application?
What PKI vendor is used?
What version and release of PKI software is deployed?
Network Architecture — All Applications
Is there only one switch/router vendor?
Is there only one firewall vendor?
Is there only one Intrusion Protection System/Intrusion Detection System (IPS/IDS) vendor?
Is there only one load balancer vendor?
Is there just one telecommunications vendor to the internet and/or WAN (Wide Area Network)?
Network Architecture — Each Application
Which switch/routers are used within the data centre?
Which switch/router models are used?
Are the switch/routers in an architecturally redundant design?
What version of embedded software and model of hardware is used in switch/router deployment?
Which firewall vendor is used?
What models of firewalls are deployed in the data centre?
Are there a limited number of firewall permutations that are deployed? (embedded OS version, hardware model, features)?
What intrusion protection/detection products are deployed?
Which intrusion protection/detection vendors are used?
What permutations of IPS/IDS (intrusion prevension system/intrusion detection system)are deployed in the data centre?
What version of IPS/IDS software is deployed?
Which vendor’s load balancers are used?
Which load balancer model is used?
What is the version of the load balancer’s embedded software and model of hardware?
Are they used to steer traffic between different global data centres?
Are the load balancers redundant, could one instantly take the place of another?
What telecommunications vendors are used for internet access?
What wide area network (WAN) telecommunications vendor is used for traffic between data centres?
What WAN telecommunications vendor is used for traffic between offices and the data centre?
Is the telecommunications equipment redundant?
Is the telecommunications fiber underground physically separate?
These questions cover a large chuck of storage and networking diagnostic questions. There may be some questions that have been missed but these should provide a flavour of what the critical web applications are using within the infrastructure cloud layer.
These questions give insight into whether or not failure in a given product would affect multiple applications. It helps companies design and tune the architecture properly so that redundancy can be created in all products where possible. Then the failure of a given product does not cascade to multiple critical applications. It is very likely that it is much cheaper to over-engineer, thereby anticipating and reacting well to failure, than it is to have very expensive cloud services downtime.
The questions associated with whether or not only one vendor is used for a given product type reveals a potential enterprise weakness. Full reliance on one vendor can lead to significant failure if a specific product hardware/software release is flawed and occurs under stressful conditions only. Then, all cloud applications that use that product would be impacted negatively. The other questions address what I’ll call use congestion. Multiple applications are sharing the same component (storage subsystem, server, or firewall). The product failure affects all those applications simultaneously.
In summary, this article focuses on architectural reliability. It creates a set of questions just focused on products within the storage domain, encryption of data-at-rest, and the networking domain. Since the cost of products is much cheaper than application downtime over-engineering is encouraged where possible. The need to deploy more product vendors must be balanced with a need to limit product and feature permutations so that realistic disaster recovery scenarios can be tested.
Gregory Machler is a security architect and risk assessment consultant at Wells Fargo.
Nestor Arellano is a Senior Writer at ITBusiness.ca. Follow him on Twitter, connect with him on LinkedIn, read his blogs on ITBusiness.ca Blogs, email nestor at firstname.lastname@example.org and join the ITBusiness.ca Facebook Page.