Blog

Your cloud provider is not your security provider - surprised?

Obsah

Although the cloud and cloud services are not new to the market, there is still a prevailing opinion that when a company moves to the cloud, it can get rid of security costs because they are included in the price.

But they are definitely NOT included in the price. It may not be talked about loudly enough, but the savings that moving to the cloud from an on-premise solution makes possible are in a variety of areas beyond security.

When a business moves to the cloud, it no longer has to worry about hardware, it can save on consumption and the need for maintenance and troubleshooting. All of that yes. But nowhere on that list will you find the elimination of the cost for security and the professionals who provide it.

Why? Because leaving on-premise doesn’t mean leaving IT. Even if you can’t see the cloud infrastructure, similar principles and processes still apply.

Basic Principles

The first important point that you must keep in mind is the immediate update and upgrade of the operating system to the latest stable version. When your provider provides you with an environment where you can deploy a virtual machine (VM), you specify the operating system you want the machine to run. These OS are pulled from the image bank made available by the provider.

Updates and upgrades come out all the time, so it’s not in the provider’s power to keep them up to date. It is up to you. And then of course reboot.

The second important point is the protection of the virtual server from intrusion from the outside. If you are deploying a server, make sure that either

  • it is not immediately connected to a public IP address
  • or you have the option of password protection.

 

It’s best to be able to use the SSH key option or at least choose your own password when you order the service.

The third important point concerns accessibility from the Internet. You need to clarify if and which ports should be available. For example, a website must be accessible from the Internet, so there the choice is clear. But then there are other systems that you use, and there is no need to have them accessible from the outside. Then use a VPN, and all aspects of your business will send you a thank you note.

How to Deploy Virtual Servers Securely

Now we will look at the procedure that will reveal the big secret to you – how to safely deploy a virtual machine, what to watch out for and most importantly – why you need to keep a system administrator (SA) and a network engineer in your company, even if you already have company IT in the cloud.

Do not be surprised, we describe the deploymentof a Linux server.

  1. SSH key – before you even get to the server itself, it is ideal if you can upload an SSH key to the environment and immediately increase your security ranking.
  2. Private Network – Once you’ve gotten around to deploying a clean VM with only the OS installed, deploy it on a private network. At that moment, your server can see the Internet, but it does not exist for the Internet.
  3. Correct ports – In the firewall, you then set the ports that will be open from the outside. And here we see the first need for the cooperation of the SA and the network operator. You need to find out which ports actually need to be open, if any, and how to modify the system so that it does not compromise the security of the entire environment.
  4. Current version – And then there is a point that we have already encountered. Update, upgrade and reboot.

 

If you have now experienced moments like

  • What is it …?
  • We didn’t know that…
  • We didn’t do that…
  • We thought it was not necessary…

 

and the like, remedial steps need to be taken because security is a very fragile thing – if you don’t take care of it properly, it will shatter with just a little pressure. This can result in data loss, ransom demands, architecture loss, or the use of your environment to attack another environment. You may then wonder how much it costs to clean up an IP address, for example.

Cloud security is partly the provider’s responsibility – they’re unlikely to give you access to a data center to put bars in there (that’s an exaggeration, of course). But a large part of that responsibility lies and always will lie with you. It is the area that cannot be seen and that only experts know.

A system administrator understands the needs of your business, how it works, and knows how IT needs to work to keep the business running. The network operator is there to work with the SA and ensure that the coverage of the company’s needs is done safely.

We have commonly encountered the fact that you get virtual private servers (VPS) with all ports open to the Internet. It’s like putting a giant target on yourself with a red arrow and “Attack here” written on it. However, this arrow points to an online environment where you have, for example, sensitive data.

Don’t take security lightly. We can say that nowadays cyber terrorism is fully spread – we never know who will become a victim of cyber crime and it can be really anyone. But you have an opportunity to take away attackers’ ability to attack you, so take advantage of it and ask what needs to change.

Caught Your Interest?

Our technicians will gladly make time for you.
Doporučené

Rádi s vámi probereme možnosti řešení pro vaše požadavky

Zanechte nám prosím kontaktní údaje. Ozveme se vám v co nejkratší době.

Vzdálená podpora pomocí TeamViewer

Abychom vám poskytli co nejefektivnější pomoc, využíváme program TeamViewer. Poté, co odsouhlasíte EULA a přístup technika, náš kolega má možnost navigovat se v prostředí vašeho přístroje, aby co nejrychleji odhalil, kde je problém. Tento přístup po vyřešení problému technik odpojuje, takže už do vašeho počítače nevidí, dokud mu příště přístup neodsouhlasíte.

Software TeamViewer stahujte až po konzultaci s našimi techniky. Nikdy nedávejte své přihlašovací ani jiné citlivé údaje ostatním, jediné údaje, které můžete při tomto řešení potřebovat, je ID a osobní kód v rámci softwaru TeamViewer.

TeamViewer Remote Assistance

To provide you with the most efficient help, we utilize the TeamViewer software. After you agree to the EULA and the technician access, our colleague has the abilitiy to navigate in the environment of your device to find as soon as possible where the problem us. This access is disconnected by the technician after the problem is resolved so he no longer can see the insides of your device until you aprove his access the next time. 

Download the TeamViewer sotware after you have consulted our technicians. Never give your login information or any other sensitive information to others. The only credentials you will need for the resolution of your problem is the ID and a personal code within the TeamViewer software.

Windows

Procesory

RAM

Storage

IP adresa

Linux

Procesory

RAM

Storage

IP adresa

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

Rádi s vámi probereme možnosti řešení pro vaše požadavky

Zanechte nám prosím kontaktní údaje. Ozveme se vám v co nejkratší době.

Rádi s vámi probereme možnosti řešení pro vaše požadavky

Zanechte nám prosím kontaktní údaje. Ozveme se vám v co nejkratší době.

We Tailor an Offer Specifically
to Your Needs

We Tailor an Offer Specifically
to Your Needs

Please leave your contact information below and we will get back to you as soon as possible.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

We will be happy to talk about a solution fitting your needs

Please leave your contact information below.

Rádi vám zpracujeme nabídku na míru