In the world of software offerings, the Cloud is gaining ground thanks to its ease of use and the focus on providing value-added services by simplifying many of the technical aspects for the customer. But what exactly do we mean by Cloud. But is it a good idea? What are the impacts on data security?
If we refer to the Definition given by Wikipedia, Cloud (or Cloud Computing) is the exploitation of the computing power or storage of remote computer servers through a network, generally the Internet. In reality, and as the article states, the Cloud rather covers commercial offer terminology that is segmented at several levels according to the associated service offer.
There are in fact 3 levels of services that one is likely to buy from a supplier (knowing that this supplier can also buy a lower level service from another provider)
Depending on the type of service, here is the distribution of responsibilities between the customer and the supplier:
IaaS : purchase from a supplier of machines (virtual most of the time) on which you can install the operating systems and the desired applications. This service is similar to traditional accommodation services.
PaaS : located just above the IaaS services, the operating system and infrastructure tools are under the responsibility of the provider.
SaaS : the supplier provides the customer with an application that he can use directly without having to configure anything. This application can be made available via the internet but also via a private network or any other suitable means of connection.
(IaaS, PaaS, SaaS)
The first advantage of the cloud is that there is no need to buy and maintain computer hardware other than that used for internal routing as well as office equipment. This represents a saving on investments to be implemented as part of a project, but also in terms of the human resources required to manage these infrastructures.
(IaaS, PaaS, SaaS)
Since server virtualization, data storage and infrastructures are managed by the service provider on a very large number of machines, a high level of redundancy can be ensured and thus makes most hardware failures completely transparent to the user. This makes it possible to reach a level of application availability that is much higher than what can be achieved with own infrastructures.
(PaaS, SaaS)
The operating system of the machines as well as the supervision of the infrastructure are under the responsibility of the supplier. Therefore, the customer does not have to worry about these tasks, which require specialized skills and are often time consuming. In the context of PaaS or SaaS, these tasks are carried out by experts in the field, which ensures that the best practices in terms of security are implemented. It is one of the essential foundations for guaranteeing the security of the data processed and the availability of infrastructures.
(PaaS, SaaS)
One of the main strengths of the cloud is the ability to adjust resources quickly and dynamically according to application needs. This concerns both computing power, memory but also storage space. Different mechanisms make it possible to simply play on these different levers in order to offer great comfort and flexibility to application users at the best cost.
Let's take the example of an application that would require significant calculations once a day for 1 hour. In the case of an infrastructure of its own, it would be necessary to size it for these calculations and the rest of the time it would be very oversized. With a Cloud infrastructure, it is possible to mobilize, and therefore pay, computing power for only one hour per day for this need.
(SaaS)
In the context of SaaS, the supplier delivers directly to its customer the applications that it maintains and updates in an industrialized manner. This leads him to do it frequently and reactively. This guarantees the customer to have a scalable and flexible application both in terms of new functionalities, bug fixing or urgent troubleshooting.
Since infrastructures are no longer under the responsibility of the application user, it is necessary to guarantee the latter that their data will not be accessible by third parties. Here are the various elements to ensure a very high level of data confidentiality:
On this point too, the Cloud makes it possible to achieve a very high level of security. Data can be backed up regularly and transparently with best practices:
In the event of data loss, which is unlikely due to system redundancy, it is possible to put applications back into service as soon as possible thanks to these backups.
On the other hand, as the service is provided in SaaS, the data stored at the provider is safe from attack by cryptoware, malware and other viruses that could infect the customer's network.
One of the potential ways to access customer data in a fraudulent manner is by accessing their applications. To avoid this type of attack, several solutions (which can be combined) exist:
Because of its architecture, data coming from and going to the Cloud will transit on public networks. It is essential to ensure that no third party will be able to access data in transit.
Since the data is no longer stored with the customer but with the service provider, it is important for the customer to ensure the possibility of recovering their data, whether it is:
It is obvious that the data belongs to the customer, however it is a point of vigilance that must be negotiated with the SaaS service provider.
Reversibility is the ability to go back to the fact that data is stored with the provider. The supplier must undertake to make his customer's data available at his request through a format readable by the latter. The contract for the provision of the SaaS service must include a reversibility clause in order to guarantee this right to the customer.
As the calculation and storage infrastructures are no longer managed by the application user, the latter will have to devote themselves only to correctly sizing access to the SaaS platform in order to guarantee the best quality of connection and therefore of service.
Since access to the platform is a critical point, the user will have to ensure that the access of his site to the Internet is sufficiently robust, in particular:
Since SaaS solutions are most of the time provided through web applications, it is important to have user workstations using a browser recommended by the provider and updated regularly. Depending on the type of SaaS application, it will also be necessary to update the modules necessary for the proper functioning of the application.
Authors: Marouane Hassani and Mathieu Cura