Page 172 - How Cloud Computing Is Transforming Business and Why You Cant Afford to Be Left Behind
P. 172

MANA GEMENT STRATEGIES F O R THE CL OUD R EV OL UTION



                     The Web server can handle traffic coming to it, but it holds
                 that traffic there, denying it entry to corporate systems. Only
                 through its own protected procedures does it access internal
                 resources. The data center is separated from the DMZ behind
                 a deeper set of protective layers, primarily firewalls that screen
                 traffic, filters that keep out specific unwanted message sets,

                 and intruder detection systems that look for invasive agents.
                 The screens protect the database servers, business production
                 systems, and other systems that make the business run.
                     Amazon’s EC2 is the form of cloud computing known as
                 infrastructure as a service (IAAS), where users load remote
                 server hardware in a data center on the Internet with the work-
                 load that they want to run. They exercise programmatic con-

                 trol over the operation of the virtual machine, known as an
                 Amazon Machine Image. In some ways, it looks and feels like a
                 duplicate of what you’re doing in the data center. You trust
                 the cloud provider, whether it’s Amazon Web Services, Rack-
                 space, or Verizon Business, to supply security at the perimeter
                 of its operations.
                     Cloud providers encourage this thinking. In a recent inci-
                 dent, someone who was probably a professional thief succeeded
                 in placing a botnet, or a remotely controlled agent, on a legiti-

                 mate host and used it to serve as a control center for pursuing
                 users’ bank account information. The Zeus botnet, as it was
                 called, had been placed on a Web site being hosted in Ama-
                 zon’s EC2, the first such known invasion of EC2 by a botnet.
                     After I reported on this incident for InformationWeek on De-
                 cember 11, 2009, Amazon spokesmen Kay Kinton responded:
                 “Users of Amazon EC2 use the same precautions to secure and



                    152
   167   168   169   170   171   172   173   174   175   176   177