NEED SOME HELP
CLICK HERE OR CALL US ON
hosting provider in india 1-800-212-2022
web hosting services in USA 1-888-288-3570
Have questions? Let us answer them all!

Go4hosting
FORUM

Go4hosting offers top-notch services, such as dedicated server hosting, VPS hosting, Co- location,Web hosting,
Email hosting, and Cloud Computing solutions. All the services offered by Go4hosting are efficient, reliable,
andcost-effective. , remaining essentially unchanged.

It is currently Sat Nov 23, 2024 3:42 pm

All times are UTC + 5:30 hours




Post new topic Reply to topic  [ 2 posts ] 
Author Message
PostPosted: Thu Jun 28, 2018 4:41 pm 
Offline

Joined: Tue Apr 12, 2016 5:42 pm
Posts: 107
What is the Way to Secure Data for Carrying in the Cloud?


Top
 Profile  
 
PostPosted: Thu Jun 28, 2018 5:27 pm 
Offline

Joined: Wed Jul 27, 2016 2:57 pm
Posts: 72
The data security for carrying over to the Amazon cloud includes several capabilities to ensure maximum privacy and controlled network access. They include:

Infrastructure security:

Network firewalls are built into the Amazon cloud that allows the users to build their private networks and get access to their instances (virtual machines) and applications. Data encryption with TLS when in transit.

DDoS mitigation:

Amazon Web Services ensures availability of client business with some pre-configured strategies to thwart any possibility of D-DoS attacks. With auto-scaling, CDNs and Route53, AWS has taken many effective steps to lessen the risks of any D-DoS attacks.

Encryption:

Data encryption features are available in all the AWS storage and DB services like EBs, S3, Oracle RDS, Glacier, SQL Server RDS, RedShift etc. The users can choose to let AWS manage the encryption keys or they can keep it under their control. Server-side encryption is done to all the sensitive information.

Inventory and configuration:

There are a set of tools that AWS offers for you to make sure your cloud resources are on par meeting the standards and best practices.

1. Amazon Inspector checks for the application vulnerabilities on networks, OS, external storage etc.
2. Deployment tools to manage decommissioning of AWS resources
3. AWS Config tools identify and track AWS resources.
4. AWS CloudFormation to build pre-designed configured environments.

Monitoring and logging:

AWS tools like CloudTrail provides information about API calls -who made, from where, and for what it was made. It provides alerts and notification through the CloudWatch for any specific occurrences or brinks.

Identity and Access control:

The AWS IAM defines the individual user accounts with their privileges to access.

AWS Multi-factor authentication and AWS Directory services to control and reduce administrative overheads and enhance end-user experience.

Penetration testing:

This requires prior approval from Amazon Web Services[/b] which must be obtained by submitting a form. In general, only testing of EC2 and RDS testing is allowed.


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 2 posts ] 

All times are UTC + 5:30 hours


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to: