<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cloud technology - Techyaz.com</title>
	<atom:link href="https://techyaz.com/tag/cloud-technology/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Tips, Tutorials and How-to Topics</description>
	<lastBuildDate>Wed, 28 Jul 2021 11:17:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8</generator>

<image>
	<url>https://techyaz.com/wp-content/uploads/2017/11/cropped-Site-icon-150x150.png</url>
	<title>cloud technology - Techyaz.com</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cloud Secrets Management Tool &#8211; HashiCorp Vault</title>
		<link>https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/</link>
					<comments>https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/#respond</comments>
		
		<dc:creator><![CDATA[Kiran Mehta]]></dc:creator>
		<pubDate>Wed, 28 Jul 2021 11:17:05 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2718</guid>

					<description><![CDATA[<p>Today, we will talk about cloud secrets management tool Hashicorp vault in this article. As we know, cloud services providers have presented numerous inherent features and tools to protect the cloud environment. We have seen cloud tools for monitoring, audit,&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/">Cloud Secrets Management Tool &#8211; HashiCorp Vault</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today, we will talk about cloud secrets management tool Hashicorp vault in this article. As we know, cloud services providers have presented numerous inherent features and tools to protect the cloud environment. We have seen cloud tools for monitoring, audit, access, authentication, encryption etc. in AWS, Azure and GCP any top Cloud Service providers. These features and tools can provide basic line of defense that can protect the cloud infrastructure against some of the security threats. However, there’s also the vision of organizations to have specific protection layer for privilege information and sensitive data. This year we have seen unexpected surge in cyberattacks across all industries. Hence across industry we have noticed a more focused approach to maintain Privilege Access solution in order to protect their environment.</p>
<p>Privilege /Secrets maintenance is most crucial requirement in Identity and Access management services. The secrets/passwords are everywhere however in cloud environment these number are 4x times as compares to on premise solution with static secrets. The Secrets could be any form of digital credentials and sensitive information which could lead to breach!</p>
<h2>What are Secrets?</h2>
<p>A secret can be any sensitive information for e.g.</p>
<ul>
<li>User password</li>
<li>Application and Database and other system-to-system passwords.</li>
<li>auto-generated passwords /encryption keys</li>
<li>Private encryption keys</li>
<li>API Key and other application keys/credentials inside containers</li>
<li>SSH Keys</li>
<li>authorization tokens</li>
<li>Private certificates for secure communication, transmitting and receiving of data (TLS, SSL etc.)</li>
<li>One-time password devices</li>
</ul>
<h2>Why we need to manage Secrets?</h2>
<p>The Secret management is imperative in today scenarios as this has been most affected sector and primary target for any Hackers. The emerging threat in digital environment and highly equipped hackers with self-learning abilities to classify, assess and exploit any vulnerability in the environment</p>
<p>Whether we are using secrets in different cloud services or within a particular cloud-based application, unorganized secrets management procedures can bring serious threat to entire security of platform for example: &#8211;</p>
<ul>
<li>Hard-coded and default credentials</li>
<li>Managing passwords manually</li>
<li>Sharing passwords</li>
<li>Regular rotations</li>
<li>Weak password and storing it in plain text files</li>
<li>Hardcoded and embedded live scripts</li>
</ul>
<h2>Secrets Management Tools</h2>
<p>In Cloud security it is imperative that primary focus should be on access control and circulation of dynamic secrets. There are various tools features provided by Cloud service provider and third-party vendors in Market for secret keys management however the most flexible and easy tool trending these days in the cloud industry is <strong>Hashicorp Vault</strong>. It comes with two products to provide cloud security services the Vault and boundary</p>
<p><img fetchpriority="high" decoding="async" width="734" height="543" class="wp-image-2719" src="http://techyaz.com/wp-content/uploads/2021/07/word-image.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image.png 734w, https://techyaz.com/wp-content/uploads/2021/07/word-image-300x222.png 300w" sizes="(max-width: 734px) 100vw, 734px" /></p>
<p>Hashicorp is a software company with a <strong>Freemium Business Model.</strong> They provide various products to fully managed platform to automate infrastructure on any cloud.</p>
<p>The Hashicorp is based on open-source tools and marketable harvests that enable developers, operators, and security experts to secure, run, provision, and connect cloud-computing they basically provide infrastructure as code which is very flexible and mature. The products prevalent for cloud security are secrets management tool Hashicorp Vault and Boundary.</p>
<h2>What is HashiCorp Vault?</h2>
<p>HashiCorp Vault is a is a secrets management tool for securely accessing <em>secrets</em>. It is used to accomplish secrets keys management in distributed systems across cloud platforms. Vault empowers cloud security players to control access to tokens, passwords, encryption keys, and certificates to defend any potentially sensitive data. The contemporary “zero trust” model is used to harden inside the HashiCorp vault. The Vault can be easily integrated with applications to be explicitly authenticated, authorized to fetch secrets, rotating secrets and perform sensitive operations, along with catering audit requirements.</p>
<p>HashiCorp <a href="https://www.hashicorp.com/cloud-operating-model">Vault</a> solution is widely used across many industries including large financial organizations, hospitality, and everything in between to provide security in the cloud operating model.</p>
<p><img decoding="async" width="378" height="384" class="wp-image-2720" src="http://techyaz.com/wp-content/uploads/2021/07/word-image-1.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image-1.png 378w, https://techyaz.com/wp-content/uploads/2021/07/word-image-1-295x300.png 295w, https://techyaz.com/wp-content/uploads/2021/07/word-image-1-80x80.png 80w" sizes="(max-width: 378px) 100vw, 378px" /></p>
<p><strong>Secrets Management tool HashiCorp Vault</strong> allows steady control access to encryption keys, passwords, certificates etc. for shielding technologies and applications. This delivers an extensive secrets management solution for enterprises looking for securing cloud environment</p>
<p><strong>1</strong>&#8211; Vault helps protect data at rest and data in transit.</p>
<p><strong>2</strong>&#8211; Vault exposes a high-level API for cryptography for developers to secure sensitive data without revealing encryption keys.</p>
<p><strong>3-</strong> Vault also can act like a certificate authority, to provide dynamic short-lived certificates to secure communications with SSL/TLS.</p>
<p><strong>4- </strong>Vault enables a brokering of identity between different platforms, such as AD on premises and AWS IAM to permit applications to work across platform borders. Vaults provide: &#8211;</p>
<ul>
<li>Storage Backends for Encrypted</li>
<li>Isolated Namespaces</li>
<li>Secure plugins</li>
<li>Detailed Historical Audit logs</li>
<li>Tenancy, rotating and revoking of secrets</li>
</ul>
<ol>
<li>Vault provides a master key and generates encryption keys to protect data. The master key is split into five parts. Any three of the five parts are required to reconstruct the master key.</li>
</ol>
<h2>HashiCorp Vault Architecture</h2>
<p>The below <a href="https://www.vaultproject.io/docs/internals/architecture">architectural diagram</a> of secrets management tool HashiCorp vault can explain the workflow of the vault process and services.</p>
<ul>
<li>Storage Backend</li>
<li>Barrier</li>
<li>Secrets Engine</li>
<li>Audit Device</li>
<li>Auth Method</li>
<li>Client Token</li>
<li>Token Store</li>
<li>Root Tokens</li>
<li>Rollback Manager</li>
<li>Core</li>
<li>Audit Broker</li>
<li>Expiration Manager</li>
</ul>
<p><img decoding="async" width="917" height="527" class="wp-image-2721" src="http://techyaz.com/wp-content/uploads/2021/07/word-image-2.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image-2.png 917w, https://techyaz.com/wp-content/uploads/2021/07/word-image-2-300x172.png 300w, https://techyaz.com/wp-content/uploads/2021/07/word-image-2-768x441.png 768w" sizes="(max-width: 917px) 100vw, 917px" /></p>
<p><strong>Storage Backend</strong> &#8211; A storage backend is used for robust storage of encrypted<strong> </strong>data. The storage is placed at bottom of Architecture stack as it is non trusted components for the vault and chosen as per client requirement, the considered factors for the same are like High availability/Disaster recovery/Recovery time Objective. When the Vault is started the storage backend must be declared and configured well in advance.</p>
<p><strong>HTTP API &#8211;</strong> The HTTP API is used to interact with clients, and it is also non-trusted component for the vault hence placed outside the Barrier</p>
<p><strong>Barrier</strong> &#8211; The barrier is strong cryptographic components which creates an un-penetrable protection layer around the Vault. The barrier ensures data is validated and decrypted as it goes inside the Vault and all data gets encrypted as it goes out from the vault. The barrier by default stays in sealed state and must be unlocked before requesting any access operation to the vault.</p>
<p>The Unlocking of the vault is possible only using combination of Unseal Keys. When the vault is initialized it generate encryption keys. This key is in turn protected by Master key which gets divided into 5 parts and combination of any 3 keys of which are required to rebuild the master key. For protection purpose all data that flows between Vault and the storage backend passes through the barrier.</p>
<p><img loading="lazy" decoding="async" width="921" height="626" class="wp-image-2722" src="http://techyaz.com/wp-content/uploads/2021/07/word-image-3.png" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image-3.png 921w, https://techyaz.com/wp-content/uploads/2021/07/word-image-3-300x204.png 300w, https://techyaz.com/wp-content/uploads/2021/07/word-image-3-768x522.png 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></p>
<p><em>Image &#8211; <a href="https://www.vaultproject.io/docs/internals/architecture">Vault Architectures</a></em></p>
<p><strong>Secrets Engine</strong> – Secrets engines are components which store, generate, or encrypt data. Secret Engine is like virtual file system supporting operations like read, write, delete, generate dynamic credentials, encryptions etc. In Vault when a secrets engine is enabled, a random UUID is generated. This becomes the data root for that engine. As Secret engine writes to the physical storage layer, it is prefixed with that UUID folder as relative access is not supported by the vault hence the secrets engine cannot access other data.</p>
<p><strong>Audit Device</strong> – are leveraged to keep comprehensive record of logs for all requests and response inside the vault. As all the operations executed inside the vault are API request and response, thus audit log contains all authenticated communication with Vault, as well all generated errors.</p>
<p><strong>Auth Method</strong> – Authentication is used to validate access to vault. The auth method are responsible for conveying identity and a set of policies to a user. Vaults validate a user and returns a client token that can be used for future requests.</p>
<p><strong>Client Token /Vault token</strong>&#8211; Tokens are the method for authentication within Vault. Token can be generated leveraging authentication methods they can also be used dynamically to generate tokens based on external identities. Inside the Vault tokens record to information like Access control list policies. These policies control directs what access are allowed to the user inside the Vault these tokens also carried meta data which is used for Audit logs such as creation time, last renewal time etc.</p>
<p><strong>Token Store</strong> &#8211; Are token authentication backend that it is responsible for creating and storing tokens, the token store has no login capability and all actions require existing authenticated tokens.</p>
<p><strong>Root Tokens &#8211;</strong> are tokens that have the root policy committed to them.</p>
<p><strong>Rollback Manager</strong> &#8211; This is internal component of Vault to control partial failure cases by using write ahead logging.</p>
<p><strong>Core &#8211;</strong> The core is used to manage the flow of requests through the system, it enforces Access control Lists and ensure audit logging is done.</p>
<p><strong>Audit Broker</strong> – is leveraged to distribute the request out to all the configured audit devices.</p>
<p><strong>Expiration Manager &#8211;</strong> is used to automatically revokes the secret on Lease expire if allowed by the client</p>
<h2>HashiCorp Vaults Pricing</h2>
<p>Let&#8217;s discuss about Hashicorp vaults pricing. There are 3 options to use this tool from pricing stand point.</p>
<ol>
<li>Open Source</li>
<li>Cloud – Managed Vault</li>
<li>Enterprise Vault Premium editions.</li>
</ol>
<p><img loading="lazy" decoding="async" width="771" height="343" class="wp-image-2723" src="http://techyaz.com/wp-content/uploads/2021/07/word-image.jpeg" srcset="https://techyaz.com/wp-content/uploads/2021/07/word-image.jpeg 771w, https://techyaz.com/wp-content/uploads/2021/07/word-image-300x133.jpeg 300w, https://techyaz.com/wp-content/uploads/2021/07/word-image-768x342.jpeg 768w" sizes="auto, (max-width: 771px) 100vw, 771px" /></p>
<p>The Vault Open-source freeware version has limitation of ~50 users only and to leverage all features and functionality it is highly recommended to use Cloud or Enterprise version. You can visit attached link for all <a href="https://www.hashicorp.com/products/vault/pricing">Vault Pricing Options.</a></p>
<h2>Conclusion</h2>
<p>In this Article we have covered What are Secrets? Why we need Secrets Management? and Secrets Management tool offered by Hashicorp Vault. There are several other tools available for secrets management in the market as mentioned below. As per the client requirement and existing infrastructure we can propose appropriate tools to our clients as long it serves the purpose of underline security with future integration possibilities</p>
<ul>
<li><strong>Conjur Secrets Manager</strong> (Open Source) &#8211; CyberArk</li>
<li><strong>Dynamic Access Provider</strong> (DAP) Enterprise &#8211; CyberArk</li>
<li><strong>AWS Secrets Manager</strong> &#8211; Rotate, manage, and retrieve database credentials, API keys, and other secrets through their lifecycle</li>
<li><strong>Azure Key Vault &#8211; </strong>securely storing and accessing secrets</li>
<li><strong>Akeyless Vault </strong>for <a href="https://www.akeyless.io/">Secrets Management and Secure Remote Access</a></li>
<li><strong>Docker secrets management </strong></li>
</ul>
<p>The Security trend seen in last 5 years has shown paradigm shift towards <strong>Identify and Access management</strong> domain. IAM plays vital role in preventing Cyberattacks due to leak credentials and hence many organizations are moving towards taking proactive steps by adding more secrets tools and technology to protect their sensitive information. As these organization moves towards more flexible, scalable, secure and cloud agnostic environment.</p>
<p>The Hashicorp suits of products are outstanding in terms of ease of use, integration, and configurations. The can flawlessly assimilates with all offerings of major cloud vendors. The Hashicorp products carry solution to full scale infrastructure security management.</p>
<p>For the next topics we will cover about other HashiCorp product in security and its comparison to Other traditional Privilege Access Management tools in the market. Stay tuned for upcoming topics on <strong>Boundary</strong> and <strong>CyberArk PAM</strong> solution offerings.</p>
<p><span style="color: #0000ff;"><em><strong>Related Articles:</strong></em></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security &amp; Data Protection</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/" target="_blank" rel="noopener">Cloud Security – How to Secure Cloud Environment?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a></strong></li>
</ul>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/">Cloud Secrets Management Tool &#8211; HashiCorp Vault</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/cloud-secrets-management-tool-hashicorp-vault/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud Data Center Locations for Top 3 CSPs (AWS, Azure &#038; Google)</title>
		<link>https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/</link>
					<comments>https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Mon, 23 Sep 2019 10:56:08 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2476</guid>

					<description><![CDATA[<p>Here we are going to discuss about top Cloud Data Center locations. Best Cloud Service Providers ensure to meet or exceed Tier 3 levels of security for their Data Center. Security layer of Clod Service Provider&#8217;s (CSP) Data center comprises&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/">Cloud Data Center Locations for Top 3 CSPs (AWS, Azure &#038; Google)</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here we are going to discuss about top Cloud Data Center locations. Best Cloud Service Providers ensure to meet or exceed Tier 3 levels of security for their Data Center. Security layer of Clod Service Provider&#8217;s (CSP) Data center comprises of Physical Layer, Infrastructure Layer, data layer and Ecological environmental layer. The design and systems of data centers are to protect them from man-made and natural risks. Major cloud providers are certified for various regulations and industry requirements such as PCI, DSS, SOC1, SOC2, HIPAA, best practices/frameworks like CSA CCM, and global/regional regulations like the EU GDPR etc.</p>
<h2><span style="color: #0000ff;"><strong>AWS Data Center Locations</strong></span></h2>
<p>The AWS Cloud Data Center locations are spread across the globe with 22 Regions and 69 AZ (Availability Zones), AWS has broadcast plans for 9 new Availability Zones and 3 additional Regions in Cape Town, Jakarta, and Milan.</p>
<p><img loading="lazy" decoding="async" width="998" height="542" class="wp-image-2477" src="https://techyaz.com/wp-content/uploads/2019/09/word-image.png" srcset="https://techyaz.com/wp-content/uploads/2019/09/word-image.png 998w, https://techyaz.com/wp-content/uploads/2019/09/word-image-300x163.png 300w, https://techyaz.com/wp-content/uploads/2019/09/word-image-768x417.png 768w" sizes="auto, (max-width: 998px) 100vw, 998px" /></p>
<p><strong>Image :AWS Data center Location Map</strong></p>
<h3><span style="color: #008000;"><strong>AWS Regions</strong></span></h3>
<h4>North America</h4>
<ol>
<li>US East Region (Northern Virginia)<br />
EC2 Availability Zones: 6<br />
<em>Launched 2006</em></li>
<li>US East Region (Ohio)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2016</em></li>
<li>US West Region (Oregon)<br />
EC2 Availability Zones: 4<br />
<em>Launched 2011</em></li>
<li>US West (Northern California)<br />
EC2 Availability Zones: 3*<br />
<em>Launched 2009</em></li>
<li>GovCloud (US-West)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2011</em></li>
<li>GovCloud (US-East)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2018</em></li>
<li>Canada (Central) Region**<br />
EC2 Availability Zones: 2<br />
<em>Launched 2016</em></li>
</ol>
<h4>South America</h4>
<ol>
<li>South America Region (São Paulo)<br />
EC2 Availability Zones: 3*<br />
Launched 2011</li>
</ol>
<h4>Europe /Middle east/Africa</h4>
<ol>
<li>Europe Region (London)<br />
EC2 Availability Zones: 3</li>
<li>Europe Region (Stockholm)<br />
EC2 Availability Zones: 3</li>
<li>Europe Region (Frankfurt)<br />
EC2 Availability Zones: 3</li>
<li>Europe Region (Paris)<br />
EC2 Availability Zones: 3<br />
Middle East Region(Bahrain)<br />
EC2 Availability Zones: 3</li>
</ol>
<h4>Asia Pacific</h4>
<ol>
<li>Mainland China Region (Beijing)<br />
EC2 Availability Zones: 2</li>
<li>Asia Pacific Region (Sydney)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2012</em></li>
<li>Asia Pacific Region (Tokyo)<br />
EC2 Availability Zones: 4*<br />
<em>Launched 2011</em></li>
<li>Asia Pacific Region (Seoul)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2016</em></li>
<li>Mainland China Region (Ningxia)<br />
EC2 Availability Zones: 3</li>
<li>Asia Pacific Local Region<sup>1</sup>(Osaka)<br />
EC2 Availability Zones: 1<br />
<em>Launched 2018</em></li>
<li>Asia Pacific Region (Mumbai)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2016</em></li>
<li>Asia Pacific Region (Hong Kong)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2019</em></li>
</ol>
<h2><strong><span style="color: #0000ff;">Microsoft Azure Data Center Locations</span></strong></h2>
<p>Cloud data center locations of Microsoft Azure has further extended its reach by having maximum global regions than any other cloud provider in the world. The Azure Data center conserving data placement and contribution inclusive compliance and resiliency options for their client.</p>
<p>They have covered 54 regions across the globe</p>
<p>With 140 available Zones in 140 countries</p>
<p><img loading="lazy" decoding="async" width="1417" height="722" class="wp-image-2478" src="https://techyaz.com/wp-content/uploads/2019/09/word-image-1.png" srcset="https://techyaz.com/wp-content/uploads/2019/09/word-image-1.png 1417w, https://techyaz.com/wp-content/uploads/2019/09/word-image-1-300x153.png 300w, https://techyaz.com/wp-content/uploads/2019/09/word-image-1-768x391.png 768w, https://techyaz.com/wp-content/uploads/2019/09/word-image-1-1024x522.png 1024w" sizes="auto, (max-width: 1417px) 100vw, 1417px" /></p>
<p><strong>Image :Azure DC Location Map</strong></p>
<h3><span style="color: #008000;"><strong>Azure Regions</strong></span></h3>
<h4>UNITED STATES</h4>
<table style="height: 807px;" width="366">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>Central US</td>
<td>Iowa</td>
</tr>
<tr>
<td>East US 2</td>
<td>Virginia</td>
</tr>
<tr>
<td>East US</td>
<td>Virginia</td>
</tr>
<tr>
<td>North Central US</td>
<td>Illinois</td>
</tr>
<tr>
<td>South Central US</td>
<td>Texas</td>
</tr>
<tr>
<td>West US 2</td>
<td>Washington</td>
</tr>
<tr>
<td>West Central US</td>
<td>Wyoming</td>
</tr>
<tr>
<td>West US</td>
<td>California</td>
</tr>
<tr>
<td>Canada Central</td>
<td>Toronto</td>
</tr>
<tr>
<td>Canada East</td>
<td>Quebec City</td>
</tr>
<tr>
<td>Brazil South</td>
<td>Sao Paulo State</td>
</tr>
</tbody>
</table>
<h4>Europe</h4>
<table style="height: 1075px;" width="361">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>North Europe</td>
<td>Ireland</td>
</tr>
<tr>
<td>West Europe</td>
<td>Netherlands</td>
</tr>
<tr>
<td>France Central</td>
<td>Paris</td>
</tr>
<tr>
<td>France South</td>
<td>Marseille</td>
</tr>
<tr>
<td>UK South</td>
<td>London</td>
</tr>
<tr>
<td>UK West</td>
<td>Cardiff</td>
</tr>
<tr>
<td>Germany Central</td>
<td>Frankfurt</td>
</tr>
<tr>
<td>Germany Northeast</td>
<td>Magdeburg</td>
</tr>
<tr>
<td>Germany West Central</td>
<td>Frankfurt</td>
</tr>
<tr>
<td>Germany North</td>
<td>Berlin</td>
</tr>
<tr>
<td>Switzerland North</td>
<td>Zurich</td>
</tr>
<tr>
<td>Switzerland West</td>
<td>Geneva</td>
</tr>
<tr>
<td colspan="2"><strong>Azure Newly announced DC</strong></td>
</tr>
<tr>
<td>Norway West</td>
<td>Norway</td>
</tr>
<tr>
<td>Norway East</td>
<td>Norway</td>
</tr>
</tbody>
</table>
<h4>ASIA PACIFIC Region</h4>
<table style="height: 1243px;" width="363">
<tbody>
<tr>
<td></td>
<td></td>
</tr>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>East Asia</td>
<td>Hong Kong SAR</td>
</tr>
<tr>
<td>Southeast Asia</td>
<td>Singapore</td>
</tr>
<tr>
<td>Australia Central</td>
<td>Canberra</td>
</tr>
<tr>
<td>Australia Central 2</td>
<td>Canberra</td>
</tr>
<tr>
<td>Australia East</td>
<td>New South Wales</td>
</tr>
<tr>
<td>Australia Southeast</td>
<td>Victoria</td>
</tr>
<tr>
<td>China East</td>
<td>Shanghai</td>
</tr>
<tr>
<td>China North</td>
<td>Beijing</td>
</tr>
<tr>
<td>China East 2</td>
<td>Shanghai</td>
</tr>
<tr>
<td>China North 2</td>
<td>Beijing</td>
</tr>
<tr>
<td>Central India</td>
<td>Pune</td>
</tr>
<tr>
<td>South India</td>
<td>Chennai</td>
</tr>
<tr>
<td>West India</td>
<td>Mumbai</td>
</tr>
<tr>
<td>Japan East</td>
<td>Tokyo, Saitama</td>
</tr>
<tr>
<td>Japan West</td>
<td>Osaka</td>
</tr>
<tr>
<td>Korea Central</td>
<td>Seoul</td>
</tr>
<tr>
<td>Korea</td>
<td>Busan</td>
</tr>
</tbody>
</table>
<h4>Middle East and Africa</h4>
<table style="height: 345px;" width="363">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>South Africa North</td>
<td>Johannesburg</td>
</tr>
<tr>
<td>South Africa West</td>
<td>Cape Town</td>
</tr>
<tr>
<td>UAE Central</td>
<td>Abu Dhabi</td>
</tr>
<tr>
<td>UAE North</td>
<td>Dubai</td>
</tr>
</tbody>
</table>
<h4>GOVERNMENT</h4>
<table style="height: 672px;" width="364">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>US DoD Central</td>
<td>Iowa</td>
</tr>
<tr>
<td>US DoD East</td>
<td>Virginia</td>
</tr>
<tr>
<td>US Gov Arizona</td>
<td>Arizona</td>
</tr>
<tr>
<td>US Gov Iowa</td>
<td>Iowa</td>
</tr>
<tr>
<td>US Gov Texas</td>
<td>Texas</td>
</tr>
<tr>
<td>US Gov Virginia</td>
<td>Virginia</td>
</tr>
<tr>
<td><strong>Newly Announced Region</strong></td>
<td></td>
</tr>
<tr>
<td>US Sec West</td>
<td>Undisclosed</td>
</tr>
<tr>
<td>US Sec East</td>
<td>Undisclosed</td>
</tr>
</tbody>
</table>
<h2><span style="color: #0000ff;"><strong>Google Cloud Data Center Locations &#8211; GCP</strong></span></h2>
<p>The Google Cloud data center locations is spread across 61 Availability Zones with 134 Edge Location (Network) across 20 Regions. The Google cloud Data centers are available in 200 countries</p>
<p>Announced Google DC &#8211; Google Cloud is expanding its reach into new regions: Seoul (South Korea), Salt Lake City (USA), Las Vegas (USA) and Jakarta (Indonesia).</p>
<p><img loading="lazy" decoding="async" width="1239" height="557" class="wp-image-2479" src="https://techyaz.com/wp-content/uploads/2019/09/word-image-2.png" srcset="https://techyaz.com/wp-content/uploads/2019/09/word-image-2.png 1239w, https://techyaz.com/wp-content/uploads/2019/09/word-image-2-300x135.png 300w, https://techyaz.com/wp-content/uploads/2019/09/word-image-2-768x345.png 768w, https://techyaz.com/wp-content/uploads/2019/09/word-image-2-1024x460.png 1024w" sizes="auto, (max-width: 1239px) 100vw, 1239px" /></p>
<p><strong>Image : Google Data Center Location Map</strong></p>
<h3><span style="color: #008000;"><strong>GCP Data Center Regions</strong></span></h3>
<h4>AMERICAS</h4>
<ol>
<li>OREGON (us-west1)</li>
<li>LOS ANGELES (us-west2)</li>
<li>IOWA (us-central1)</li>
<li>SOUTH CAROLINA (us-east1)</li>
<li>N. VIRGINIA (us-east4)</li>
<li>MONTRÉAL (northamerica-northeast1)</li>
<li>SÃO PAULO (southamerica-east1)</li>
</ol>
<h4>EUROPE</h4>
<ol>
<li>LONDON (europe-west2)</li>
<li>BELGIUM (europe-west1)</li>
<li>NETHERLANDS (europe-west4)</li>
<li>ZURICH (europe-west6)</li>
<li>FRANKFURT (europe-west3)</li>
<li>FINLAND (europe-north1)</li>
</ol>
<h4>ASIA PACIFIC</h4>
<ol>
<li>MUMBAI (asia-south1)</li>
<li>SINGAPORE (asia-southeast1)</li>
<li>HONG KONG (asia-east2)</li>
<li>TAIWAN (asia-east1)</li>
<li>TOKYO (asia-northeast1)</li>
<li>OSAKA (asia-northeast2)</li>
<li>SYDNEY (australia-southeast1)</li>
</ol>
<p><strong>Reference </strong></p>
<ul>
<li>AWS &#8211; <a href="https://aws.amazon.com/about-aws/global-infrastructure/">https://aws.amazon.com/about-aws/global-infrastructure/</a></li>
<li>Google &#8211; <a href="https://cloud.google.com/about/locations/?region=asia-pacific#region">https://cloud.google.com/about/locations/?region=asia-pacific#region</a></li>
<li>Azure &#8211; <a href="https://azure.microsoft.com/en-in/global-infrastructure/regions/">https://azure.microsoft.com/en-in/global-infrastructure/regions/</a></li>
</ul>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/">Understanding Cloud Security &amp; Data Protection</a></strong></li>
<li><strong> <a href="https://techyaz.com/learning/how-to-learn-cloud-computing/">How to Learn Cloud Computing?</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz" target="_blank" rel="noopener">Twitter</a> handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/">Cloud Data Center Locations for Top 3 CSPs (AWS, Azure &#038; Google)</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Learn Cloud Computing?</title>
		<link>https://techyaz.com/learning/how-to-learn-cloud-computing/</link>
					<comments>https://techyaz.com/learning/how-to-learn-cloud-computing/#comments</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 12:06:25 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Learning]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[learning]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1677</guid>

					<description><![CDATA[<p>This article is very useful if you want to learn Cloud Computing. Here, I have explained all concerns that comes in a beginner’s mind along with required training courses.  Cloud Computing is growing faster than ever and creating lot of high&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/learning/how-to-learn-cloud-computing/">How to Learn Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is very useful if you want to learn<strong> <a href="http://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a>.</strong> Here, I have explained all concerns that comes in a beginner’s mind along with required training courses.  Cloud Computing is growing faster than ever and creating lot of high paying jobs. Cloud means compute for e.g. (Storage, Software, Platform, CPU, RAM, Processor, network, Cluster etc.) using Internet anywhere, anytime and in any size. It enables any organization to focus on their core business rather than maintaining IT infrastructure.</p>
<p><strong><a href="http://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a></strong> brings best in breed technologies mesh to provide high availability, durability and capacity with minimum time frame. In simple words your traditional data center (DC) would have flew down from on-premise to somewhere with big giants Cloud Service Providers DC like GCP (Google Cloud Platform), AWS (Amazon Web Services), Azure, IBM, Salesforce etc.</p>
<h3><span style="color: #333399;">Why Should You Learn Cloud Computing?</span></h3>
<p><img loading="lazy" decoding="async" class="size-full wp-image-1758 alignright" src="http://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min.png" alt="Learn Cloud Computing" width="300" height="300" srcset="https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min.png 300w, https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min-150x150.png 150w, https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min-160x160.png 160w, https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min-320x320.png 320w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>As i mentioned above, Cloud Computing is growing faster than ever and creating lot of high paying jobs. The reason behind its popularity is its <strong><em>Pay As You Use</em></strong> model.</p>
<p>All cloud services are running on “<em><strong><span style="color: #000000;">Pay As You Use</span></strong></em>” model. You only pay for the services till you are using and can increase/decrease the usage capacity in few hours only. The Cloud Computing takes away hassle of procurement of servers, software’s &amp; resources. It also removes the need of building, managing &amp; maintenance of Data centres that is why most of the organizations are adopting cloud computing these days.</p>
<p>As more organizations will move to cloud, more cloud related jobs or opportunities will arise. So, it is imperative to learn cloud computing technology so that you can make use of it in your IT career. The added advantage of learning cloud is that you can bring value to your organization and its clients.</p>
<h3><span style="color: #333399;">Prerequisites to Learn Cloud Computing</span></h3>
<p>Today I will brief you about the skills needed to learn cloud and build promising career in it. Cloud can add value to your CV/Resume. Every IT professional need to have some familiarity with cloud. It has become an essential part of Information Technology. We as Digital Users are leveraging cloud Technology every day in our life. The most common example is social media, mails, music, YouTube, Facebook, Instagram, Twitter, News etc. Everything where data is stored in huge size is using cloud technology in the background.</p>
<p>Cloud Computing services falls into three categories:</p>
<ul>
<li>Infrastructure as a Service (IaaS),</li>
<li>Platform as a Service (PaaS)</li>
<li>Software as a Service (SaaS).</li>
</ul>
<p>Although this article is very much applicable to all three categories for learning standpoint but primarily we will talk and refer about IaaS (Infrastructure as a Service) model. Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized compute resources over the internet following pay per use model.</p>
<p>As in earlier days Data center had multiple roles and responsibilities, similarly in cloud you can get similar technology, roles and career. If you belongs to IT Infrastructure services, then you  can pursue your career in IaaS cloud computing.</p>
<p>One can learn cloud as a beginner even if you have very basic skills in computers, prior experience in IT is an added advantage.</p>
<p>To begin with cloud there are three-important area to cover:</p>
<ul>
<li><strong>Virtualization concepts</strong></li>
<li><strong>Networking in virtual environment </strong></li>
<li><strong>Operating systems (Linux &amp; Windows)</strong></li>
</ul>
<h5><span style="color: #3366ff;">Virtualization </span></h5>
<p>It is important to understand how virtualized environment operates. In cloud context, virtual machines lie over and above hypervisor layer. Multiple VM’s shared same physical hardware and all the network equipment but are isolated or virtually separated from the other client machines using hypervisor technology. Virtualization means every type of application or workload which needed physical machines in past now can run by using shared resources across many clients. For more information refer to</p>
<h5><span style="color: #3366ff;">Networking</span></h5>
<p>The most important aspect of cloud is to understand cloud networking. It is very difficult section in cloud, and even those with some robust skills, typically require time to fully understand it.</p>
<h5><span style="color: #3366ff;">Operating System (Linux &amp; Windows)</span></h5>
<p>Hands on experience on Linux and Windows is with excellent command lines skills is must before begin journey in cloud computing. One must begin with above three concepts to enter cloud computing.</p>
<h3><span style="color: #333399;">How to Start Learning Cloud Computing?</span></h3>
<p>The very first thing you need to do is, you need to decide the cloud service provider for which you want to learn and pursue distinct roles. There are many Cloud service providers in the market. You can choose any of them but it’s always wise to choose from top 3 service providers. Currently, Amazon is top cloud service provider in the market followed by Microsoft. Below are the names of some popular cloud service providers.</p>
<ol>
<li>Amazon Web Services (AWS)</li>
<li>Microsoft Azure</li>
<li>IBM Cloud</li>
<li>Google Cloud Platform (GCP)</li>
<li>Salesforce</li>
</ol>
<p>Once you have chosen the right cloud service provider then you should focus on the distinct domains. For example, if you had prior experience in networks you can choose to become Cloud Network Architect role and start focusing on CSP network services. If you are a system administrator then you can pursue Cloud System Administrator role. Below is the list of some cloud computing roles.</p>
<p>You can choose any roles given below as per your choice and are of interest. It would be an added advantage if you choose a domain in which you have some knowledge. The Distinct Technical roles which you can pursue in cloud are given below.</p>
<ul>
<li>Cloud Operations Engineer</li>
<li>Cloud System Administrator</li>
<li>Cloud Solution Architect</li>
<li>Cloud Technical Architect</li>
<li>Cloud Network Architect</li>
<li>Cloud Security Architect</li>
<li>Cloud Sales Consultant</li>
</ul>
<p>I have explained the responsibilities and job profile of each and every role in below points.</p>
<ul>
<li><span style="color: #000000;"><strong>Cloud Operation Engineer &#8211;</strong></span> You should have at least 3 years of experience in this role. You need to ensure management of daily operations like adding Virtual machine (VM) to the cloud stack, installing software’s on the VM’s, monitoring cloud usage, controlling access to cloud environment, Identify and Access management for cloud.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud System Administrator – </strong></span>This job profile is similar to the system administrator job in legacy environment. Here, you need to take care of your cloud deployments and administration.  In cloud context security is shared responsibility however the systems security is client accountability. This role is mainly focus on hardening the Operating system and maintaining it. This will cover antivirus installation, policy control and overall protection services offered by cloud service provider. Strong Linux command line skills are needed.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Solution Architect –</strong></span> You should have more than 6 years of experience to pursue a cloud solution architect role. The Cloud Solution Architect roles means to understand client requirement and propose possible design for the cloud IaaS. This comprise of servers, Data storage strategy, location, region, monitoring, security, Disaster Recovery and Business Continuity solution. Cloud SA may need to design a Hosting solution for some website or Data analytics, Data warehousing, Graphics processing solution. The responsibility of cloud SA is to understand all services provided by the Cloud Service Provider (CSP) so that he can design a suitable solution considering all services and their relative cost.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Technical Architect – </strong></span>You should be on senior role or at least 7 years of experience to work as cloud Technical Architect. The Technical Architect role is to create the proposed design by the cloud Solution Architect. The responsibility of the Architect is to manage all technical queries in creating the entire cloud stack. Expert in shell, Perl, python compiled code language will be an added advantage. You must have expert level knowledge of Linux and windows operating system. This role demands knowledge of all fields including Networks, Infrastructure, Servers and settings, Identify and Access management. The Architect need to fix any issue which comes under configuring access, or security settings, Roles distribution etc. The hands-on experience on all services provided by CSP is mandatory for this role.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Network Architect</strong>&#8211;</span> The Network Architect need to configure Virtual Private Network(VPC), load balancing in cloud, manage ports, Incoming and outgoing connections, Tunnelling, Internet to cloud connection etc. Deep understanding of TCP/IP, Subnetting, DNS, DHCP, NAT and routing, strong knowledge of layer 2 network protocols, Good knowledge of IP routing, scripting abilities Perl or Shell. CCNA or CCNP preferred certification. The Network Architect need to design, create and maintain any network related issues.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Security Architect &#8211;</strong></span>The role is most crucial and important in cloud environment considering the fact you can access cloud from anywhere anytime and its security need to be designed by Cloud Security Architect. The data security at rest and in transit, encryptions and descriptions, to avoid data loss and exposure. Good understanding of Internet and hosting from network layer up through the application layer, monitoring tools, clustering and internet security. The cloud security policies, governance, risk assessment, Multi-factor authentication and Authorization. Read attached article if you want to <a href="http://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener"><strong>understand the basics of Cloud Security and Data Protection</strong>.</a></li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Sales</strong> <strong>Consultant</strong> &#8211;</span> Must be a business administration preferable MBA, Client facing roles, excellent communication skills, building strategic partnership at the C-level. Google knowledge of market leader in cloud in terms of services and costing. Love travel jobs.</li>
</ul>
<h3><span style="color: #333399;">Study Materials</span></h3>
<p>There are lot of study materials available on internet to start with. Many portals have free courses that you can register to learn cloud computing. You can also buy a cloud related course on <strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dcloud%2520computing%26src%3Dsac%26kw%3Dcloud%26sort%3Drelevance">Udemy</a> </strong>or <strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=40328&amp;murl=https%3A%2F%2Fwww.coursera.org%2Fcourses%3Flanguages%3Den%26query%3Dcloud%2Bcomputing%26userQuery%3Dcloud%2Bcomputing">Coursera</a></strong>. I have given specific training courses for each cloud providers in below links. You can access as per your choice to learn different cloud courses like AWS, Azure, GCP etc. You can also get practice papers as well if you are preparing for AWS or Azure certifications.</p>
<p><strong><span style="color: #993300;">Online Training Courses for Top Cloud Service Providers:</span></strong></p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Daws%2520certified%2520solutions%2520architect%26src%3Dsac%26kw%3DAWS" target="_blank" rel="noopener">AWS Certified Solution Architect &#8211; Online Training Courses</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=40328&amp;murl=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fgcp-architecture">Architecting with Google Cloud Platform</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dazure%2520certification%26src%3Dsac%26kw%3Dazure%26sort%3Dmost-reviewed">Architecting Microsoft Azure Solutions</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3DGCP%2520certification%26src%3Dsac%26kw%3Dgcp%2520certification">Hands on Google Cloud Platform (GCP) &#8211; Cloud Architect</a></strong></li>
</ul>
<p>I hope you like this article. Please Like, Comment, Share &amp; Subscribe to this website to get latest articles directly into your inbox. You can also follow our <a href="https://www.facebook.com/Techyaz/">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter</a> handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="http://techyaz.com/learning/is-presales-a-good-career-opportunity/" target="_blank" rel="noopener">Is Presales a Good Career Opportunity in IT Industry?</a></strong></li>
<li><strong><a href="http://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Top 5 Cloud Service Provider Accreditations and Third Party Auditor Reports</a></strong></li>
<li><strong><a href="http://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Understanding Cloud Computing</a></strong></li>
<li><strong><a href="http://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security and Data Protection</a></strong></li>
</ul>
<p>The post <a href="https://techyaz.com/learning/how-to-learn-cloud-computing/">How to Learn Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/learning/how-to-learn-cloud-computing/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Cloud Security &#038; Data Protection</title>
		<link>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/</link>
					<comments>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Fri, 03 Nov 2017 10:44:16 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1099</guid>

					<description><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like Is our data secured in Cloud environment? Or Is your&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like <strong>Is our data secured in Cloud environment?</strong> Or <strong>Is your data in Cloud hackable?</strong> Or <strong>Can your data be disclosed by the Cloud Service Provider?</strong></p>
<p>Here I am going to answer all these questions and explaining about Cloud Security in this context.</p>
<h3><span style="color: #000080;"><strong>Is your data secure in Cloud environment?</strong></span></h3>
<p><strong>Yes,</strong> your data will be secured in <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">cloud environment</a> if you can design security solution/configurations leveraging public cloud providers features and third-party tools efficiently.</p>
<p>The amount of security configuration work you must do will varies, depending on what kind of cloud services you select and how sensitive your data is.</p>
<p>Security in Cloud creates a shared responsibility model between the customer and Cloud Service Provider (CSP). CSPs are responsible for securing the infrastructure (hardware, software, networks, and facilities of their Data center) that supports the cloud and you will be responsible for anything you put on the cloud or connect to the cloud (Data, Operating System, softwares, tools, License, Access, Credentials, authentication, encryption etc.)</p>
<h3><span style="color: #000080;"><strong>Is your data in Cloud Hackable?</strong></span></h3>
<p><strong>No,</strong> cloud systems are not hackable in terms of technology, hardware and network services provided by cloud provider. However, if security configurations are not done accurately by the user then loopholes in security may lead vulnerability in your cloud environment.</p>
<h3><span style="color: #000080;"><strong>Can your data be disclosed by the Cloud Service Provider?</strong></span></h3>
<p>Your content/data <strong>will not</strong> be disclosed unless service provider required to do so to comply with the law of the country or a valid and binding order of a governmental or regulatory body. Unless prohibited from doing so or there is clear indication of illegal conduct about the use of CSP’s products or services. CSP notifies customers before disclosing customer content so they can seek protection from disclosure.</p>
<p>To understand all above and similar security related concerns you should first understand Cloud Security. Let’s discuss what is cloud security and how many domains we need to take care from cloud security point of view.</p>
<h3><span style="color: #000080;"><strong>What is Cloud Security?</strong></span></h3>
<p>As every second your information/data travel through cloud and from different locations, networks and regions. We need to ensure it is not leaked in process of transmission from one place to other. Typically, all firms are well verse about physical and technical security of their On-premise data center. Similarly, cloud services and Infrastructure need to be secured to protect the confidentiality, integrity, and availability of your or your client data.</p>
<p>In Cloud context, security is a shared responsibility between the Cloud Service Provider (CSP) and its users/customers. CSPs take care of physical and logical security of its underlying hardware until Hypervisor layer. However, anything above Operating System is Client responsibility because customer owns the data and service provider has no access to it. Although it also varies in each model of Cloud Computing for some services.</p>
<p>Cloud Security is all about leveraging security features and tools to design and build a secure cloud environment to protect the privacy and integrity of cloud customers and their data. Cloud Security is blend of technologies and policies designed to adhere and regulate compliance rules and protect information, data applications and infrastructure associated with <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> use.</p>
<h3><span style="color: #000080;"><strong>Cloud Security Categories</strong></span></h3>
<p>From cloud security perspective, below are the cloud security domains or categories that needs to be considered while building cloud environment.</p>
<ol>
<li><strong>Physical Security</strong></li>
<li><strong>Network security</strong></li>
<li><strong>System Security</strong></li>
<li><strong>Application Security</strong></li>
<li><strong>Data Security</strong></li>
<li><strong>Identity and Access management</strong></li>
<li><strong>Encryptions</strong></li>
<li><strong>Security operations</strong></li>
</ol>
<p>Each ownership for each type of security in cloud varies in each model of Cloud. You can see who is responsible for  what in each cloud model in below image.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1100" src="http://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png" alt="cloud security" width="1024" height="410" srcset="https://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png 1024w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-300x120.png 300w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-768x307.png 768w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security.png 1204w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<ol>
<li><strong>Physical Security- </strong>is the protection of hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. CSPs are responsible to take care of this security.</li>
<li><strong>Network Security – </strong>Includes data security in transit to and from the public cloud provider. It means designing and building network configuration and its elements allowing a secure access to cloud resources from your on-premise Data centers, Office, Internet etc. This security is shared responsibility between CSPs &amp; Customer.</li>
<li><strong>System Security- </strong>This capability covers operating system hardening, protection and policy control. The host security at PaaS and SaaS Level are transferred to CSP.</li>
<li><strong>Application Security – </strong>It’s a shared responsibility in cloud context to protect the application running over the cloud. Based on type of cloud model application security is managed, for e.g in SaaS cloud provider will manage the security of the application. While at the PaaS level platform security will be managed by CSP and deployed application will be customer responsibility.</li>
<li><strong>Data Security – </strong>Data security capability includes securing data in transit and at rest it to avoid data loss and exposure.</li>
<li><strong>Identity and Access management- </strong>This capability evolves around authentication, verification and authorization of cloud resources.</li>
<li><strong>Encryptions – </strong>As all communications between regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect sensitive data.</li>
<li><strong>Security operations- </strong>Governance and strategic direction on security policies, risk assessment and its maintenance.</li>
</ol>
<h3><span style="color: #000080;"><strong>Choose Cloud Service Provider considering Data Security, Information Security and Quality Assurance?</strong></span></h3>
<p>Its depends on data and its criticality in terms of sensitivity, availability &amp; durability requirement. For choosing most reliable cloud service provider we must consider <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">CSP’s accreditations, security certifications and third party audit assessment reports</a>. All major cloud service provider share their policies accreditation on data privacy, security, durability, availability information on their respective portals under valid Non-disclosure agreement. These certifications are global and can be achieved through periodic rigorous external audit accredited certification bodies based on <strong>NIST</strong> (National Industrial Security Program Operating Manual) global standards.</p>
<p>Some of the Most popular <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Cloud Service Provider Accreditations and Certification</a> for cloud computing compliance and security are given in attached article. Read it to understand Cloud Accreditations and Certification that will finally help you to choose right Cloud Service Provider.</p>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Reference Links:</strong></em></span> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</title>
		<link>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/</link>
					<comments>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 14:00:13 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1094</guid>

					<description><![CDATA[<p>Cloud Service provider is responsible for protecting its infrastructure that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud Service provider is responsible for <a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">protecting its infrastructure</a> that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and technical security of the cloud data center hence all CSPs publish several third-party auditors report to validate its compliance. CSPs  provide reports from third-party auditors who have verified their compliance with a variety of computer security standards and regulations that is known as Cloud Service Provider Accreditation.</p>
<p><img loading="lazy" decoding="async" class="aligncenter  wp-image-1097" src="http://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg" alt="Cloud Accreditations" width="525" height="295" srcset="https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg 1024w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-300x169.jpg 300w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-768x432.jpg 768w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations.jpg 1280w" sizes="auto, (max-width: 525px) 100vw, 525px" /></p>
<h3><span style="color: #000080;">Compliance Program provided by Cloud Services Providers</span></h3>
<p>Cloud Service providers ensure robust controls to secure their infrastructure, to protect client data. As virtual systems build over the cloud Infrastructure need also to be secured and it comes with shared responsibility and compliance. Cloud Data center environment comes with audit friendly features and standards to ensure client satisfaction about their data security. The IT infrastructure that CSP provides to its customers is designed and managed in orientation with security best practices and a variety of IT security standards due to economies of scale, including but not limited to the following:</p>
<p><span style="color: #800000;"><strong>AWS (Amazon) Security Certifications /Accreditation </strong></span></p>
<ul>
<li><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> Compliance Controls Catalogue (C5)</li>
<li>FedRAMP Partner Package</li>
<li>Global Financial Services Regulatory Principles IRAP Package</li>
<li>ISO 27001:2013 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27017:2015 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27018:2014 Certification and Statement of Applicability (SoA)</li>
<li>ISO 9001:2015 Certification</li>
<li>MAS TRM Guidelines Workbook</li>
<li>PCI DSS Attestation of Compliance (AOC) and Responsibility Summary</li>
<li>PSN Connection Compliance Certificate (CoCo)</li>
<li>PSN Service Provision Compliance Certificate</li>
<li>Quality Management System Overview</li>
<li>Service Organization Controls (SOC) 1 Report</li>
<li>Service Organization Controls (SOC) 2 Report</li>
<li>Service Organization Controls (SOC) 3 Report</li>
<li>SOC Continued Operations</li>
</ul>
<p><strong> </strong><span style="color: #800000;"><strong>Microsoft Azure Security and Compliance Certifications / Accreditation</strong></span><strong> </strong></p>
<ul>
<li>ISO 27001, FedRAMP, SOC 1 and SOC 2.</li>
<li>The Content Delivery and Security Association (CDSA)</li>
<li>Criminal Justice Information Services (CJIS)</li>
<li>The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) CSACCM</li>
<li>EU Model Clause</li>
<li>FDA 21 CFR Part 11(The US Food and Drug Administration (FDA) Code of Federal</li>
<li>Regulations (CFR) Title 21 Part 11)</li>
<li>FedRAMP(Federal Risk and Authorization Management Program (FedRAMP)</li>
<li>The Family Educational Rights and Privacy Act (FERPA)</li>
<li>FIPS 140-2. Federal Information Processing Standard (FIPS) Publication 140-2</li>
<li>The Health Insurance Portability and Accountability Act (HIPAA)</li>
<li>IRAP (Australian Government Information Security Registered Assessors Program)</li>
<li>ISO/IEC 27001/27002:2013</li>
<li>Multi-Level Protection Scheme (MLPS) is based on the Chinese state standard issued by the Ministry of Public Security</li>
<li>Multi-Tier Cloud Security Standard for Singapore (MTCS SS),</li>
<li>Payment Card Industry (PCI) Data Security Standards (DSS) version 3.0</li>
<li>TCS CCCPPF Trusted Cloud Service certification developed by the China Cloud Computing Promotion and Policy Forum (CCCPPF)</li>
<li>UK G-Cloud.<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>Google Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>SSAE16 / ISAE 3402 Type II:</li>
<li>SOC 1</li>
<li>SOC 2</li>
<li>SOC 3 public audit report</li>
<li>ISO 27017, Cloud Security</li>
<li>ISO 27018, Cloud Privacy</li>
<li>FedRAMP ATO for Google App Engine</li>
<li>PCI DSS v3.2</li>
<li>HIPAA</li>
<li>CSA STAR</li>
<li>MTCS Tier 3 Certification (Singapore)</li>
<li>Google Cloud Platform and the EU Data Protection Directive<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>IBM Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>FedRAMP</li>
<li>FISMA</li>
<li>FFIEC</li>
<li>SOC Reports</li>
<li>ISO 27001</li>
<li>ISO 27017</li>
<li>ISO 27018</li>
<li>Cloud Security Alliance</li>
<li>PCI Compliance</li>
<li>HIPAA</li>
<li>HITRUST Assessment</li>
<li>GSMA (DAL09, PAR01)</li>
<li>CJIS Standards</li>
<li>EU Model Clauses</li>
<li>Privacy Shield</li>
<li>IBM ISO Management System Certifications</li>
</ul>
<p><span style="color: #800000;"><strong><em>Related Read:</em></strong></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">What is Cloud Computing?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security &amp; Data Protection in Cloud</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><em><strong><span style="color: #800000;">Reference Links:</span></strong></em> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Cloud Computing?</title>
		<link>https://techyaz.com/cloud/what-is-cloud-computing/</link>
					<comments>https://techyaz.com/cloud/what-is-cloud-computing/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 04:32:54 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[Iaas]]></category>
		<category><![CDATA[Paas]]></category>
		<category><![CDATA[Saas]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1082</guid>

					<description><![CDATA[<p>In today’s digital world, all our data is travelling every second from one place to other electronically. Most of the data in today’s scenarios resides in cloud, whether we talk about personal or commercial data, it&#8217;s sitting in cloud so&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/what-is-cloud-computing/">What is Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today’s digital world, all our data is travelling every second from one place to other electronically. Most of the data in today’s scenarios resides in cloud, whether we talk about personal or commercial data, it&#8217;s sitting in cloud so that it can be made available anywhere anytime. We all perhaps using cloud computing right now, even if we don’t understand it like sending or receiving emails, watch movies or TV online, listen to music, play games, chatting social networking or store pictures and other files etc.</p>
<h5><span style="color: #000080;">Cloud Computing</span></h5>
<p>Cloud Computing atmosphere is all about getting compute for e.g. (Storage, Software, Platform, CPU, RAM, Processor, network, Cluster etc.) using Internet anywhere, anytime and in any size. Cloud provides unlimited compute services with pay as per use model. Cloud bring best in breed technologies mesh to provide high availability, high durability and high capacity with minimum time frame, in simple words your traditional data center (DC) would have flew down from on-premise to somewhere with big giants Cloud Service Providers DC like Google, AWS, Azure etc.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1086" src="http://techyaz.com/wp-content/uploads/2017/11/cloud-computing-2001090_640.jpg" alt="cloud computing" width="640" height="360" srcset="https://techyaz.com/wp-content/uploads/2017/11/cloud-computing-2001090_640.jpg 640w, https://techyaz.com/wp-content/uploads/2017/11/cloud-computing-2001090_640-300x169.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></p>
<h5><span style="color: #000080;">Benefits of Cloud Computing</span></h5>
<p>There are many benefits of Cloud Computing. It is a big shift from the traditional way businesses think about IT resources.</p>
<ol>
<li><strong>Time</strong> -Most cloud computing services are provided on demand, so even vast amounts of computing resources can be provisioned in minutes, certainly with just a few mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity planning</li>
<li><strong>Cost </strong>&#8211; Cloud Computing removes the investment expense of procurement of hardware and software and setting up and running onsite datacenters—the racks of servers, 24/7 electricity for power and cooling, the IT experts for managing the infrastructure, Hardware maintenance, Physical security etc.</li>
<li><strong>Scalability </strong>-The benefits of cloud computing services include the ability to scale elastically. In cloud speak, that means delivering the right amount of IT resources—for example, computing power, storage, bandwidth—right when it&#8217;s needed and from the right geographic location.</li>
<li><strong>Productivity</strong>-On-site data centers typically requires high maintenance, technology upgrade and heavy investment as it need lot of “racking and stacking”—hardware setup, software patching and other time-consuming IT management tasks. Cloud removes the need for many of these tasks, so IT teams can spend time on achieving business goals. Moving to the cloud gives access to enterprise-class technology, for everyone anywhere anytime.</li>
<li><strong>High Performance</strong>-The biggest cloud computing services run on a worldwide network of secure datacenters, which are regularly upgraded to the latest generation of fast and efficient computing hardware. This offers several benefits over a single corporate datacenter, including reduced network latency for applications and greater economies of scale. You can increase any amount of storage and processing capacity with pay per use model.</li>
<li><strong>High Reliability</strong>&#8211; Cloud computing makes data backup, disaster recovery and business continuity easier and less expensive, because data can be replicated at multiple redundant locations on the cloud provider’s network.</li>
<li><strong>Security </strong>&#8211; Cloud computing gives you greater security when your hardware like laptop, mobile, tablet etc. are lost, damage or stolen this occurs as your data is stored in the cloud, you can access it no matter what happens to your machine. And you can even remotely wipe data from lost devices so it doesn’t get into the wrong hands. Cloud Ensures minimum disruption to Business.</li>
<li><strong>Disaster Recovery –</strong> Cloud provides best DR solution for any businesses, cloud-based backup and recovery solutions save time, reduce large upfront investment due to global presence and economies of scale. Cloud service provider features like tiered storage, multiple Availability zones, Data replication etc. can be leveraged to design optimum DR and BCP solutions.</li>
</ol>
<h5><span style="color: #000080;">Types of Cloud Offerings</span></h5>
<p>Cloud Computing services majorly  falls into three categories:</p>
<ul>
<li><strong>Infrastructure as a Service (IaaS), </strong></li>
<li><strong>Platform as a Service (PaaS) </strong></li>
<li><strong>Software as a Service (SaaS). </strong></li>
</ul>
<p><strong>IaaS &#8211; Infrastructure as a Service</strong></p>
<p>Infrastructure as a service (IaaS) is a form of <a href="http://searchcloudcomputing.techtarget.com/definition/cloud-computing">cloud computing</a> that provides virtualized computing resources over the internet following pay per use model . Or we can say traditional on-prem data center services on rent for e.g. IT infrastructure—servers and virtual machines (VMs), storage, networks, operating systems.</p>
<p><strong>Platform as a Service (PaaS)</strong></p>
<p>Platform-as-a-service (PaaS) represents cloud services that provide platform or environment for developing, run, manage testing, delivering and managing applications on-demand online anytime. PaaS ensure ready to use development &amp; testing platform without the complexity of building and maintaining the infrastructure. PaaS is designed to make developers and clients life easy by leveraging pre-configured systems, templates, software’s ready to build mobile or web applications  and with no hassle of setting up or managing the underlying infrastructure of servers, storage, network and databases needed for development.</p>
<p><strong>Software as a Service (SaaS)</strong></p>
<p>Software-as-a-service (SaaS) is a process for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet or PC. To see more on SaaS, refer to <a href="https://azure.microsoft.com/en-in/overview/what-is-iaas/">Azure</a></p>
<h5><span style="color: #000080;">Top Cloud Service Providers</span></h5>
<p>As per <a href="https://www.forbes.com/sites/bobevans1/2017/06/05/meet-the-cloud-wars-top-10-the-worlds-most-powerful-cloud-computing-vendors/#62169ad14e1e&quot; ">Forbes</a> below are the list of top 10 Cloud service providers</p>
<ol>
<li>Microsoft Azure</li>
<li>AWS</li>
<li>Salesforce</li>
<li>SAP</li>
<li>IBM</li>
<li>Google</li>
<li>Oracle</li>
<li>Workday</li>
<li>Service Now</li>
<li>VMware</li>
</ol>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/cloud/what-is-cloud-computing/">What is Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/what-is-cloud-computing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
