📒2. Cloud Management Concepts

📕 Learning Objectives

  • Basics aspects of managing cloud resources and related tasks

  • Cloud access control fundamentals

Management Foundations

Cloud shared responsibility refers to the distribution of security and management responsibilities between cloud service providers and cloud customers. Both the CSP and the customer have distinct roles and responsibilities to ensure the security, availability and proper management of the cloud environment and its resources.

Management Responsibility

The CSP will always be responsible for the physical facility and infrastructure, virtualization and cloud management plane.

The customer is always responsible for identities and subscription access.

  • Customer Responsibility e.g.

    • IaaS: Virtual machine (O.S.), Services, Workload (Application, Data, Service configuration)

    • PaaS: Workload (Application, Data, Service configuration)

    • SaaS: Customizations (Data, Service configuration, Usage, Identity, Access, Good practices & Compliance)

Security Responsibility

CSP is responsible for

  • Physical, Infrastructure, Platform security

  • Identity system security

  • Standards compliance

The customer is responsible for

  • Identity, Data, Application security (good practices)

  • Standards compliance

Resiliency Responsibility

CSP responsibility

  • Infrastructure Resiliency, Uptime service level agreement (SLAs)

  • Service Availability, Disaster Recovery

Customer responsibility

  • Build resilient applications and integrate CSP built-in availability and resiliency

  • Implement data backup, replication, business continuity planning

🔗 AWS Shared Responsibility Model for Resiliency

Workload Responsibility

Workload responsibility includes the tasks and considerations involved in deploying, configuring, monitoring and securing the specific applications, services and data that make up the workload.

CSP is responsible for

  • SaaS out-of-the-box workload failures (with no customization)

📌 Effective software lifecycle management techniques are essential.

The customer is responsible for

  • Workload configuration

  • App and Data security

  • Monitoring and Performance

Resource Management

🔗 Resource Management Models in Cloud Computing - geeksforgeeks.org

Control Plane

  • The cloud is controlled by the management plane, which relates to the management and control of cloud infrastructure and services.

    • Web-based console

    • REST APIs

    • Command line tool

Data Plane

  • The Data plane is the cloud workload

    • VMs, Data, Applications, Services

A workload, a custom application, needs maintaining of its resources like code base, data and security.

Monitoring

  • Provided built-in cloud tools to monitor spending, performance, automated alerting & actions

    • Applications need monitoring

Change Management in the cloud refers to the process of effectively managing and controlling changes to cloud-based systems, services and infrastructure, by implementing procedures and policies to ensure change planning, testing, deployment and so on.

  • Governance is critical- relevant compliance requirements, industry regulations, and organizational policies

  • Documentation and tracking

AWS

  • RDS - Create a database (Platform service) - Templates & Settings

    • Connectivity & Security, Monitoring, Logs, Configuration, Maintenance

Azure

  • Azure PowerShell script as a template (template JSON files)

Monitoring & Alerts

Cloud monitoring is the process of observing, gathering and analyzing data from cloud-based applications, services and resources to guarantee their overall performance, availability, security and health.

It involves the use of monitoring tools, metrics and alerts to track and assess the behavior and state of various components within the cloud environment.

Proactive Resource Management

  • Cloud Automation & Alerting

Identity & Access Management

Cloud Identity and Access Management (IAM) refers to the set of practices, policies and tools used to manage user identities, control access to cloud resources and enforce security measures within a cloud computing environment.

  • management of user authentication, authorization, permissions

Root user - absolute full rights on everything

Federated user - authenticated and authorized to access resources in a system or application through a trusted external identity provider.

🔗 Google IAM

  • Users, Groups, Roles, Policies

  • Federated Users

  • Policies (User, Role, Resource, Condition)

🔗 Azure AD

  • Users, Groups, Roles

  • Federated Users

🔗 AWS IAM

  • Users, Groups, Permissions

  • Federated Users

  • Policies grant permissions (Effect, Action, Resources, Conditions)


Last updated