Cloud Computing
Cloud Computing
Cloud Computing means storing and accessing the data and programs on
remote servers that are hosted on the internet instead of the computer’s hard
drive or local server. Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided as a service
through the Internet to the user. The data that is stored can be files, images,
documents, or any other storable document.
The following are some of the Operations that can be performed with Cloud
Computing
servers hosted on the internet for store, manage, and process the
data.
1
● Types of Services: Cloud computing offers various benefits such as
To know about this refer this Article – Virtualization in Cloud Computing and
Types
2
Architecture Of Cloud Computing
Cloud computing architecture refers to the components and sub-components
required for cloud computing. These components typically refer to:
3
within the organization and the Intercloud enables interoperability across
various cloud services. This dynamic network connectivity ensures an
essential component of cloud computing architecture on guaranteeing easy
access and data transfer.
applications.
making it cost-effective.
4
2. Platform as a Service ( PaaS )
5
● Cost Efficiency: SaaS acts as a cost-effective solution by reducing
software licenses.
and infrastructure making users worry about it. FaaS facilitates the
the principle “Pay as per you Run” for the computing resources used.
deployment.
To know more about the Types of Cloud Computing Difference please read
this article – IaaS vs PaaS vs SaaS
6
perfect for companies which are looking for security and compliance
needs.
To know more about the Cloud Deployment Models, read this Articles
7
A few years ago, the websites were put on the server somewhere, in this
way you had to run around or buy and set the number of servers. It costs a lot
of money and takes a lot of time. You pay for these servers when you are
using them and as well as when you are not using them. This is called
hosting. This problem is overcome by cloud hosting. With Cloud Computing,
you have access to computing power when you needed. Now, your website is
put in the cloud server as you put it on a dedicated server. People start
visiting your website and if you suddenly need more computing power, you
would scale up according to the need.
number and size of servers based on the need. This is done by either
growth in demand.
hardware needs are left to the vendor. For companies that are
resources can be acquired quickly and easily. Even better, the cost of
8
with purchase costs, off-site hardware cuts internal power costs and
saves space. Large data centers can take up precious office space
expenditures.
within data centers and so benefit from the security measures that
9
1. Reduces cost: The cost-cutting ability of businesses that utilize
studies.
and computing power. Many tools are available for cloud storage
Even on holidays, the employees have to work with the server for its
storage the thing is not the same, employees get ample time for
10
One of the most successful cloud-based businesses is Amazon Web
Services(AWS), which is an Infrastructure as a Service(Iaas) offering that
pays rent for virtual computers on Amazon’s infrastructure.
Microsoft is creating the Azure platform which enables the .NET Framework
Application to run over the internet as an alternative platform for Microsoft
developers. This is the classic Platform as a Service(PaaS).
search engine. From this service, Google has captured the world’s
a Service(SaaS).
11
3. Collaboration and Accessibility: Cloud computing provides easy
and innovations.
cloud computing.
12
3. Dependency on Internet Connectivity: Cloud computing services
is their pricing model that coming with Pay as you go but it also
ongoing attention.
Cloud Sustainability
The following are the some of the key points of Cloud sustainability:
improve efficiency.
energy sources like solar and wind power to data centers and
13
● Virtualization: Server virtualization facilitates better utilization of
Cloud Security
Cloud security recommended to measures and practices designed to protect
data, applications, and infrastructure in cloud computing environments. The
following are some of the best practices of cloud security:
14
1. Scalable Infrastructure: Infrastructure as a Service (IaaS) enables
maintenance.
datasets efficiently.
15
Primary Terminologies
● Mainframe Era: The Mainframe Era was famous in the
pieces called services. and after that, they will be integrated and
16
Imagine a room-size computer! This was the time of mainframes, where
big, giant, super-powerful machines were only affordable by big
companies. Back then, a computer scientist named John McCarthy had a
brilliant idea, what if we could share powerful machines, like how we
share electricity from a power plant? This early concept that basically
creates the basic building blocks for cloud computing.
Even though mainframes were strong, they were very expensive and
difficult to manage and handle, which is why most people did not use
them. In short, we say that it was sharing the big machine.
17
At the same time, when SOA comes, another new concept called grid
computing emerges. Imagine that groups of computers are working
together to solve a big problem. Grid computing works similarly by
connecting more machines to solve a big task or problem that is too
difficult to solve using a single machine. here the idea of sharing resources
are the creation of basic building blocks of cloud service like resource
pooling, at the same time resources are pool to serve multiple users.
Imagine a time before you could download apps or programs. At the end
of 1990s, companies called Application Service Providers (ASPs) introduce
a new way to use software. Instead of buying and installing it manually,
you can pay subscription of it online and access it through a web-based
interface. This was an early stage of the cloud-based
software-as-a-service we use today, like renting a bike instead of buying
it!
This early concept that basically create basic building blocks for Software
as a Service (SaaS), where you access programs or service like email
service or other writing tools directly though the internet, with no
downloads needed.
18
Below two things make cloud computing super attractive in the late
1900s and early 2000s:
that time you required some space or room, needs power source
many more, and some times hardware failure which is too much
investment (TCO).
● The Internet Grew Up: As the internet became faster and more
19
Understanding Cloud Computing with Examples
Imagine a company that has it’s own infrastructure but they can’t afford to
add more resources, the required skill base of staff, and additional
infrastructure maintenance costs like cooling equipment, electricity, etc.
Sometimes, when load increases or there is an unpredictable spike in
usage, we are adding horizontally or vertically scaling of the servers.
The best things about pricing and billing services in the cloud are:
● Pay as you go model (per hour, minute, and second base charges
20
● If your workload is not critical at that time, you can use the spot
There are many characteristics of Cloud Computing here are few of them
:
1. On-demand self-services: The Cloud computing services does
not require any human administrators, user themselves are able
to provision, monitor and manage computing resources as
needed.
2. Broad network access: The Computing services are generally
provided over standard networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT
resources that are able to scale out and in quickly and on a
need basis. Whenever the user require services it is provided to
him and it is scale out as soon as its requirement gets over.
4. Resource pooling: The IT resource (e.g., networks, servers,
storage, applications, and services) present are shared across
multiple applications and occupant in an uncommitted manner.
Multiple clients are provided service from a same physical
resource.
5. Measured service: The resource utilization is tracked for each
application and occupant, it will provide both the user and the
resource provider with an account of what has been used. This
21
is done for various reasons like monitoring billing and effective
use of resource.
6. Multi-tenancy: Cloud computing providers can support multiple
tenants (users or organizations) on a single set of shared
resources.
7. Virtualization: Cloud computing providers use virtualization
technology to abstract underlying hardware resources and
present them as logical resources to users.
8. Resilient computing: Cloud computing services are typically
designed with redundancy and fault tolerance in mind, which
ensures high availability and reliability.
9. Flexible pricing models: Cloud providers offer a variety of
pricing models, including pay-per-use, subscription-based, and
spot pricing, allowing users to choose the option that best suits
their needs.
10. Security: Cloud providers invest heavily in security measures
to protect their users’ data and ensure the privacy of sensitive
information.
11. Automation: Cloud computing services are often highly
automated, allowing users to deploy and manage resources
with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on
sustainable practices, such as energy-efficient data centers and
the use of renewable energy sources, to reduce their
environmental impact.
22
Infrastructure as a Service
Infrastructure as a Service | IaaS
Iaas is also known as Hardware as a Service (HaaS). It is one of the layers of
the cloud computing platform. It allows customers to outsource their IT
infrastructures, such as servers, networking, processing, storage, virtual
machines, and other resources. Customers access these resources on the
Internet using a pay-as-per-use model.
23
configuration to meet changing requirements and are billed only for the
services actually used.
The IaaS cloud computing platform layer eliminates the need for every
organization to maintain its IT infrastructure.
IaaS is offered in three models: public, private, and hybrid cloud. The private
cloud implies that the infrastructure resides at the customer's premise. In the
case of the public cloud, it is located at the cloud computing platform
vendor's data center, and the hybrid cloud is a combination of the two in
which the customer selects the best of both public cloud and private cloud.
Advertisement
24
○ Resource Pooling: This feature enables users to share computer
resources, such as networking and storage, among a number of
users, maximizing resource utilization and cutting costs.
○ Elasticity: IaaS allows users to dynamically modify their computing
resources in response to shifting demand, ensuring optimum
performance and financial viability.
○ Self-Service: IaaS offers consumers "self-service" portals that let
them independently deploy, administer, and monitor their
computing resources without the assistance of IT employees.
○ Availability: To ensure the high availability and reliability of services,
IaaS providers often run redundant and geographically dispersed
data centers.
○ Security: To safeguard their infrastructure and client data, IaaS
companies adopt security measures, including data encryption,
firewalls, access controls, and threat detection.
○ Customization: IaaS enables users to alter the operating systems,
application stacks, and security settings of their virtualized
instances to suit their unique requirements.
25
Computing: To provision virtual machines (VMs) for end users, IaaS providers
offer virtual central processing units (CPUs) and virtual main memory. As a
result, users may run their workloads and apps on the provider's
infrastructure without having to worry about managing the underlying
hardware.
26
Network: IaaS providers provide networking tools, including routers,
switches, and bridges for the VMs through Network as a Service (NaaS). This
enables connectivity and communication between VMs and other resources
while also allowing customers to create and maintain their network
architecture within the IaaS environment.
Backup and disaster recovery services are provided by some IaaS providers,
enabling customers to create backup copies of their data and software and
put recovery plans in place in the event of data loss or system problems. This
promotes business continuity and data security.
Monitoring and Management: IaaS suppliers provide tools and services for
monitoring and controlling the resources and infrastructure. This can involve
managing VMs, storage, and network configurations using management
panels or APIs, as well as measuring resource utilization, automating scaling,
and monitoring performance.
It's vital to remember that depending on the provider and their offerings, the
precise services offered by IaaS providers may change. The list above
illustrates some typical IaaS providers' common services.
27
machines (VMs), which are software simulations of real hardware.
Customers can select the VM that best matches their needs from a
variety of VM types that IaaS providers normally offer, each with a
different CPU, memory, and storage configuration.
○ Virtual Networks: Another virtualized computing resource in IaaS is
virtual networks. Customers can design and maintain network
topologies in the cloud, including subnets, IP addresses, and routing
tables, using virtual networks. Virtual networks offer clients'
applications and data a secure, decoupled environment and make it
simple to integrate them with on-premises networks.
○ A crucial virtualized computing resource in IaaS is storage. IaaS
providers frequently offer various storage options, including block,
object, and file storage, each with its own performance, pricing, and
cost-effectiveness features. Because storage resources are highly
scalable, clients can alter their storage capacity as needed without
having to change their actual hardware.
○ In comparison to conventional on-premises hardware architecture,
virtualized computing resources have better scalability, flexibility,
and cost-effectiveness. Without making expensive hardware
investments or taking care of their own data centers, customers
may rent the computing capabilities they require on demand and
only pay for what they use.
1. Shared infrastructure
3. Pay-as-per-use model
IaaS providers provide services based on a pay-as-per-use basis. The users are
required to pay for what they have used.
28
IaaS providers focus on the organization's core business rather than on IT
infrastructure.
5. On-demand scalability
Learning Curve and Complexity: Learning Curve and Complexity: Using and
administering IaaS calls for a certain amount of technical know-how and
comprehension of cloud computing principles. To efficiently use and manage
29
the IaaS resources, organizations may need to spend money on IT employee
training or turn to outside experts.
Cost Management: Cost Control: IaaS provides scalability and flexibility, but it
can also result in difficult cost control. In order to prevent unforeseen
charges, customers must keep an eye on and manage their resource
utilization. Higher costs may be the result of inefficient use of resources or
improper resource allocation.
IaaS cloud computing platform may not eliminate the need for an in-house IT
department. It will be needed to monitor or control the IaaS setup. IT salary
expenditure might not reduce significantly, but other IT expenses can be
reduced.
Breakdowns at the IaaS cloud computing platform vendors can bring your
business to a halt stage. Assess the IaaS cloud computing platform vendor's
stability and finances. Make sure that SLAs (i.e., Service Level Agreement)
provide backups for data, hardware, network, and application failures. Image
portability and third-party support are a plus point.
The IaaS cloud computing platform vendor can get access to your sensitive
data. So, engage with credible companies or organizations. Study their
security policies and precautions.
30
Tata Communications InstaCompute InstaCompute is Tata
Communications' IaaS offering. InstaCompute data centers are located in
Hyderabad and Singapore, with operations in both countries.
31
PaaS includes infrastructure (servers, storage, and networking) and platform
(middleware, development tools, database management systems, business
intelligence, and more) to support the web application life cycle.
32
support relational databases (like MySQL, PostgreSQL, and Microsoft SQL
Server) and NoSQL databases (like MongoDB, Cassandra, and Redis). For its
database services, PaaS platforms often offer automated backups, scalability,
and monitoring tools.
Additional Tools and Services: PaaS providers provide a range of extra tools
and services to aid in the lifecycle of application development and
deployment. These may consist of the following:
33
following are some of the essential tools and services that PaaS companies
provide:
Advertisement
34
Development, database administration, deployment, integration with outside
services, analytics and monitoring, and security tools and services are some
of the tools that fall under this category.
Developers can build, test, deploy, and manage their apps on a complete
platform provided by PaaS providers without the need for complicated
infrastructure.
Advantages of PaaS
There are the following advantages of PaaS -
1) Simplified Development
2) Lower risk
4) Instant community
5) Scalability
Applications deployed can scale from one to thousands of users without any
changes to the applications.
35
One has to write the applications according to the platform provided by the
PaaS vendor, so the migration of an application to another PaaS vendor
would be a problem.
2) Data Privacy
It may happen that some applications are local, and some are in the cloud. So
there will be chances of increased complexity when we want to use data in
the cloud with the local data.
Organizations can evaluate the viability of PaaS solutions for their unique
requirements by taking into account these characteristics, as well as the
trade-offs and potential difficulties involved in implementing such platforms.
36
The Seven-Step Model of Migration into a Cloud
Migrating applications to the cloud involves a structured and
iterative approach. Here, we discuss a generic, versatile, and
comprehensive seven-step model designed to facilitate cloud
migration, capturing best practices from numerous migration
projects.
Overview of the Seven-Step Model
1. Assessment Phase
o Objective: Understand issues at the application, code,
design, architecture, and usage levels.
o Activities:
Conduct migration assessments.
Evaluate tools, test cases, configurations,
functionalities, and non-functional requirements
(NFRs).
Formulate a comprehensive migration strategy.
o Example: Assess the cost and ROI of migrating an
enterprise application to the cloud.
2. Isolation of Dependencies
o Objective: Identify and isolate all systemic and
environmental dependencies of application components
within the captive data center.
o Activities:
Analyze dependencies.
Determine the complexity of migration.
o Example: Identify which components need to remain on-
premises and which can move to the cloud.
3. Mapping Constructs
o Objective: Create a mapping between local data center
components and cloud components.
o Activities:
Develop a migration map.
Re Architect, redesign, and reimplement parts of the
application as necessary.
o Example: Map databases, services, and applications to
their cloud counterparts.
37
4. Leveraging Cloud Features
o Objective: Utilize cloud computing features to enhance
the application.
o Activities:
Integrate intrinsic cloud features to augment
application functionality.
o Example: Use cloud storage, elasticity, and auto-scaling
features to improve performance.
6. Optimization
o Objective: Optimize the migration process through
iterative testing and refinement.
o Activities:
Fine-tune the application based on feedback.
Ensure robust and comprehensive migration.
o Example: Adjust resource allocation and configurations to
optimize performance and cost-efficiency.
7. Successful Migration
o Objective: Complete the migration process and ensure
stability and performance.
o Activities:
Finalize the migration.
Conduct post-migration review and optimizations.
o Example: Ensure the migrated application is fully
functional and meets all requirements.
38
o Similar to the first phase of the seven-step model,
focusing on dependencies and strategy formulation.
2. Proof of Concepts
o Develop reference migration architectures, akin to
creating prototypes in the seven-step model.
3. Data Migration
o Segment and cleanse database data, leveraging cloud
storage options.
4. Application Migration
o Use forklift or hybrid strategies to migrate applications
and their dependencies.
● Compute Layer
● Storage Layer
Physical storage is allotted only when compute needs it and the provisioning
decisions are not bound by presently accessible storage. The physical storage
is allotted from a shared pool of physical capacity to the application
“on-demand”. This gives more efficient storage utilization by minimizing the
allotted amount, but unused physical storage.
39
Need for Virtual Provisioning :
It consists of physical drives that give the actual physical storage used by thin
LUNs. Various pools can be formed within a storage array and the allotted
capacity is reclaimed by the pool when the thin LUNs are erased. Thin LUN is
a logical device where the physical storage need not be totally allotted at the
creation time. All the thin LUNs formed from a pool share the storage
resources of that pool.
40
Advantages of Virtual Provisioning :
● Decreases downtime.
● The drives in Thin Pool should have same RPM (revolutions per
● The drives should be of the same size in the Thin Pool. Different
fluctuation in performance.
41
Virtual Machine Migration Services
1. Cold Migration :
shared storage. There is a lack of CPU check and there is long shortage
time. Log files and configuration files are migrated from the source host to
The first host’s Virtual Machine is shut down and again started on next
2. Hot Migrations :
physical host. A source host state is cloned to destination host and then
42
that source host state is discarded. Complete state is shifted to the
A common shared storage is needed and CPU checks are put into use.
server is freed for maintenance purposes and workloads (which are among
Suspend first host’s Virtual Machine and then clone it across registers of
CPU and RAM and again resume some time later on second host. This
● Stage-0:
primary host.
● Stage-1:
● Stage-2:
● Stage-3:
43
and all remaining Virtual Machine state are synchronized on
second host.
● Stage-4:
● Stage-5:
activities.
44
resources available to the system and users. Provisioning can refer to a
variety of processes, which we are going to look at in this article. The term
● Server Provisioning
● User Provisioning
● Network Provisioning
● Device Provisioning
are many servers categorized according to their uses, Each of them has
unique provisioning requirements, and the choice of the server itself will
be driven by the intended use. For example, there are file servers, policy
servers, mail servers, and application servers, just to name a few. Server
45
set-up of other servers. Generally, server provisioning is a process that
activities.
devices, servers, and authorized users can gain access to it. Network
begins when the network is first set up and users are granted access to
device management.
46
customized, and certified, after which a user is allocated these devices.
adjusted, which could take some time. This is especially true for larger
1. Performance Monitoring:
2. Resource Allocation:
47
● Optimal Distribution: Allocate IT resources (like CPU, memory, storage)
based on current demand to prevent overloading or underutilization. This
ensures that all services remain performant and available as per the SLA.
● Dynamic Adjustment: Use techniques like load balancing and auto-scaling
to dynamically adjust resources in real-time, ensuring the system can
handle varying loads efficiently.
3. Capacity Planning:
4. Workload Analysis:
5. Scalability:
48
Practical Example:
1. Fabric Services
49
The Fabric services in Aneka represent the basic part of the infrastructural
framework through which the resources of the cloud environment can be
managed and automated. They implement as they involve the physical or
low level of resource provision and allocation and also virtualization. Here
are some key components:
optimize them.
failover.
2. Foundation Services
50
As you move up in the stack, foundation services rely on the fabric layer
and provide further enhancement for the development of applications in
the distributed environment. The following are the benefits of
microservices: They provide basic foundations that are necessary for
constructing applications that are portable and elastic. Key components
include:
of tasks.
usage and its behaviour in real-time mode as well as track all the
51
events and the measures of activity for the usage in the analysis
of the incident.
3. Application Services
Subservices in Aneka are many but they are more generalized services
built on top of the core infrastructure to support specialized needs of
different types of applications. It is worth mentioning that they represent
typical application templates or scenarios that can help to promote
application assembly. Key components include:
52
● IoT Integration: Api Products can provide support for IoT devices
1. Core Components
53
application and minimize time as well as cost of the job
completion.
2. Middleware Services
publish-subscribe mechanisms.
systems.
3. Application Services
54
● Data Analytics and Processing: Aneka offers functionalities and
data sets.
5. Integration Interfaces
55
● APIs and SDKs: Aneka offers application programming interfaces
tracking of jobs.
containers.
for the management of specific tasks, it decides how the tasks are
56
to be a resource and then manages their execution, their progress
the application and may also involve the APIs for applications to
57
● Development Libraries: Software libraries for data handling,
3. Aneka Marketplace
58
The Aneka Cloud Management Console is a GUI that offers an interactive
web-based interface for administrators and users to manage the Aneka
framework in addition to the applications that are deployed. It offers:
59
● Virtualization Technologies: Some of the future features include
to use basic and advanced methods, how some of them work, and
unit test tools that can be used as plug-ins in the supported IDEs
data processing.
60
● Scalability: Aneka is self-sufficient in the dynamism of resource
resource and allows for horizontal scaling to make sure the cloud
are achieved.
61
framework, tools and libraries. It has APIs provided for task
shorter time.
different clouds and lets you work with third-party services and
62
to optimize the rate at which an application runs and its response
time.
63
● Integration Challenges: Some of the complexities involved may
limited.
into a certain platform. The difficulty is that some users may even
technologies or platforms.
64
● Limited Ecosystem: Compared to other more mature cloud
offered by Aneka.
65
if the total cost of ownership is justified or if there are more
Conclusion
In conclusion, Aneka is an advanced platform that speaks of the
possibilities to harness the power of cloud computing for designing,
implementing, and running distributed applications. As a computer-based
testing approach that is highly regarded in the IT industry, this type of
assessment is favored for its benefits like scalability, flexibility,
cost-effectiveness, and others; however, it comes with disadvantages too,
which include the learning curve associated with the tool, complexity, and
intersection with other testing tools.
66
make it easy for developers to build and deploy cloud-based
applications.
67
68
Overview of Comet Cloud based Applications
69
including graphs and charts that can illustrate
performance metrics over time.
5. Model Management: Comet helps manage
different versions of models, datasets, and
parameters, ensuring reproducibility and
consistency in experiments.
6.Resource Monitoring: Users can monitor the
computational resources used during
experiments, which helps in optimizing
performance and cost.
Components of SLA
Various components of a Service Level Agreement are necessary to be
included in an SLA to make them a valid legal agreement. Some of the
components that must be included in an SLA are discussed below.
70
1. Overview: Both parties must mention the general details of the
agreement like name, and details of the parties, tenure, signing date, etc.
2. Services: The agreement should mention the services that the service
provider will provide, the timeline, and the costs associated with it.
3. Metrics: In metrics, the client or the customer will mention how they are
going to measure the performance of the services. The service provider
can also provide their metrics to lure other customers.
6. Penalty: It is there so that the parties know that in case they are not
performing the services then they have to pay the mentioned penalty to
the other party.
2. Service SLA: These SLAs are created by companies for the services they
give to a set of customers. The content of these SLAs are same for every
customer, and it depends upon the customer whether they want to enter
into these agreements or not. The company does not change its services
71
under this SLA irrespective of the customer. An agreement of insurance
between a company and its customer can be an example of a Service SLA.
3. Multilevel SLA: These SLAs are created between service provider and
client when the services are offered to various level of clients or in cases
where more than one service provider are giving the services. The services
in this case differ for each level of customers and for each level, a different
set of rules has been set in the SLA.
Importance of SLA
Service Level Agreement is a very detailed document and it is important
for both the parties i.e. service provider and the client. There are various
important points from the perspective of the service provider as well as
the client, some of them are mentioned below.
1. Clear Guidelines: All the terms and conditions are expressly mentioned
in the SLA, so it is easier for the customer to raise any issue if they face
any difficulty.
2. Predefined Quality: The metrics are defined in the SLA, so any party can
refer to the same if they have any confusion regarding any services.
4. Details of the Parties: The SLA also helps the service provider to know
about the details of their customers and to know about all the conditions
that they have agreed upon.
6. Disclaimer: The SLA also provides a part in which the services are
mentioned that are not the liability of the service provider.
72
7. Liability of the Service Provider: The service provider can show their
customers the liability defined in the SLA if the client is demanding more
services or any service that is not theirs in the SLA.
2. Error Rates: This metric is used to count how many times there has
been an error while performing the services and how the service provider
is going to address that issue.
73
3. Technical Advancement: This metric will measure the technical services
provided by the service provider. In this, they also have to mention the
technology that they are going to use while providing the services.
SLA Lifecycle
74
Steps in SLA Lifecycle
provider that can meet the needs of the organization and has the
vendors.
defined and agreed upon between the service provider and the
75
5. Terminate SLA: If the service provider is unable to meet the
the service provided, the SLA can be terminated. This can be done
agreement.
76
● Data Encryption: Encrypt data both at rest
and in transit to protect sensitive information.
● Regular Audits: Conduct security audits and
vulnerability assessments regularly.
3. Performance Optimization
78
● Performance Reviews: Regularly assess the
performance of cloud services and make
adjustments as necessary.
● Technology Updates: Keep abreast of new
features and services to take advantage of
improvements.
10. Vendor Management
79
2. Insider Threats
80
6. Lack of Compliance
81
● Cloud services can be targeted by DoS attacks,
which can disrupt availability and affect
business operations.
11. Third-Party Risks
82
● Data Encryption: Ensure all sensitive data is
encrypted both in transit and at rest.
● Monitoring and Logging: Use monitoring
tools to track access and usage of cloud
resources, enabling quick detection of
anomalies.
● Compliance Checks: Regularly review
compliance with relevant regulations and
standards.
● Training: Educate employees about security
best practices and the importance of
safeguarding sensitive data.
83