Abstract
With the advent of public cloud services, enterprise are moving to adopt the lower cost, more flexible, scalable public cloud offerings like OTC, AWS and Azure. Simultaneously they are adapting their network models to move away from centralized enterprise QoS networks (with internet break out from a single or few large enterprise gateways) in favor of lower cost, direct offloading of corporate traffic from company locations via local and distributed Internet service providers. Using this model enterprises are also accessing cloud services from multiple entry points, and this completely changes the enterprise security deployment landscape. As an additional ongoing trend, the networking of physical devices is bringing a whole new ‘operational technology’ domain to the enterprise space, and a new approach to enterprise security is therefore required. In this paper the drivers of change in approaches to security for public cloud computing are presented, considering also the responsibilities of the customer and of the cloud service provider and the component which enterprises still need to focus on. In addition, the network model for security is explained and considered, with the new distributed deployment zone for security as described. Cyber physical/IoT type systems are also then discussed as an additional security landscape over which enterprises increasingly need to take special care.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Amazon Web Services, Inc.: Overview of Security Processes (2016)
Munch, B., Rickard, N.: Cloud Adoption is Driving Hybrid WAN Architectures. Gartner (2017)
ENISA: Ad-hoc and sensor networking for M2 M Communications – Threat Landscape and Good Practice Guide (2017)
Hutchison, A., Rieke, R.: Management of security information and events in future internet. In: Proceedings of Cyber Security and Global Affairs, Conference on Cyber Security, Budapest (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hutchison, A. (2017). Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)