How important is cyberresiliency in the world of public and hybrid cloud?
Distinguished Engineer Rebecca Gott explains why cyberresiliency is important for cloud environments
By Rebecca Gott09/01/2020
Q: How important is cyberresiliency in the world of public and hybrid cloud?
It’s easy to apply the usual aspects of resiliency to cloud environments, but cloud introduces new components and ways of working that, in turn, introduce additional points where security can be compromised. In the cloud, clients must realize that the ownership of data—and the ownership of risks to that data—remain theirs.
Administrators in the cloud may have access to your data for administrative management, and this opens up an opportunity for admins to access confidential information at your expense, either intentionally or by accident. In addition, cloud providers must ensure that you have enough regions or zones for availability. That planning must be done, and it’s up to IT to know what’s required. Customers need to have confidence that their workloads are backed up and that the data is accessible and secure.
Workloads need to be isolated in the cloud. You must protect multiple tenants in a cloud to ensure that each customer has privacy and control over their own data and workloads. IBM has many technologies to help you safeguard your assets in the cloud.
For instance, let’s look at the recently introduced IBM Hyper Protect Virtual Servers (HPVS). With HPVS, you can create scalable, high-performance Linux® virtual servers with your own key. Clients maintain exclusive access to their code and data; no one with elevated system credentials (such as cloud administrators) have access to data. HPVS provides the technical assurance that only the workload owner has access to his or her data. Every instance is built as a highly available clustered configuration with multizone region support, so your mission-critical workloads will have high resiliency and low latency.
Secure Execution is another newly introduced capability on IBM Z®. As more companies move to public cloud, the need for a highly secure and trustworthy multitenant hosting solution becomes necessary to support the confidentiality and integrity of applications and data. Secure Execution gives you the ability to use hardware-based security technology (a trusted execution environment) to allow a hosted workload to run without its memory or execution state being visible to the host or to any other workload hosted in the same environment.
Rebecca Gott is a Distinguished Engineer for IBM Z and LinuxONE™, Blockchain and IBM Z as a Service.
See more by Rebecca Gott