What are the Different Roles in Cloud Computing?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
12 hours 57 minutes
Difficulty
Intermediate
CEU/CPE
13
Video Transcription
00:00
>> Hello again, here we are in module 1.3.
00:00
What are the different roles in Cloud computing?
00:00
The learning objectives for this module are,
00:00
what are the terms used to
00:00
describe the different roles in
00:00
the Cloud and what are
00:00
the common responsibilities for each role?
00:00
This is significant because
00:00
unlike on-premise deployments,
00:00
the Cloud is really,
00:00
you can think of as an orchestra
00:00
between a number of different roles to
00:00
successfully enable customers to
00:00
get the most of Cloud environments.
00:00
The common roles are the customer,
00:00
the Cloud service provider,
00:00
the Cloud broker, and the Cloud access security broker.
00:00
What does do all of these roles mean?
00:00
The customer is either the person or
00:00
the organization that is purchasing
00:00
services from a Cloud provider.
00:00
The Cloud provider is
00:00
the organization that's actually providing
00:00
the physical infrastructure that
00:00
is being accessed through the Internet.
00:00
Most of the major Cloud providers include AWS,
00:00
Microsoft Azure, and Google Cloud.
00:00
Those are really the three largest companies
00:00
that provide Cloud hosting services.
00:00
The Cloud broker, just like in life,
00:00
there's always a middleman.
00:00
Cloud brokers provide a really important service
00:00
to Cloud customers.
00:00
Going into the Cloud and
00:00
utilizing the services properly,
00:00
it can be very complicated,
00:00
even more complicated if you're doing it securely.
00:00
But that's why you guys are here.
00:00
The Cloud broker really negotiates
00:00
with the Cloud service provider
00:00
on behalf of the customer,
00:00
as well as may deploy
00:00
their own services to help the customer
00:00
manage and get the most out of their Cloud deployment.
00:00
The Cloud Access Security Broker,
00:00
this is either an application
00:00
or a server itself that sits between
00:00
the customer and acts as an access portal to
00:00
its Cloud hosted applications
00:00
>> or servers or its instance.
00:00
>> The Cloud Access Security Broker,
00:00
also referred to as the CASB,
00:00
their role is really to enforce
00:00
the access logging a security policies
00:00
for the organization and the Cloud.
00:00
Take a closer look at how these things interact.
00:00
We've had our Cloud customer in the center here.
00:00
They're getting services from the Cloud provider.
00:00
The broker may help that Cloud customer.
00:00
Let's say, they're in an industry where
00:00
they aren't technically sophisticated
00:00
or they aren't really sure how to really
00:00
get the most out of
00:00
their Cloud services that they're using.
00:00
They may hire or contract with
00:00
a broker to help them
00:00
ensure that they are optimizing their instance,
00:00
keeping their costs under control
00:00
and making sure that that move to
00:00
the Cloud is really economical for the business.
00:00
Let's say instead of hosting one
00:00
environmental on the Cloud or their own applications,
00:00
they have a whole host of applications
00:00
out there in the Cloud that they want to access.
00:00
They probably would contract or purchase
00:00
some service on a Cloud Access Security Broker so that
00:00
they can log into
00:00
these various Cloud applications
00:00
without having to worry about multiple passwords,
00:00
the encryption schemes,
00:00
>> and all the nitty-gritty details
00:00
>> of Identity and Access
00:00
Management we're going to get to later in the course.
00:00
Quick question. Which role is paid to monitor
00:00
access and enforce security policies
00:00
for Cloud environments? Is that the customer?
00:00
The Cloud Broker or the Cloud Access Security Broker?
00:00
If you said C or if you said three,
00:00
the Cloud Access Security Broker, you're correct.
00:00
This is something that
00:00
some organizations don't necessarily think about.
00:00
Why do I need to pay another service to
00:00
provide access and authentication to the Cloud?
00:00
Would I be able to do that?
00:00
It depends on the complexity of
00:00
your environment and potentially whether you
00:00
want to manage some of the tasks that come
00:00
with providing secure connection
00:00
to a Cloud-based environment.
00:00
In this module, we really covered
00:00
those common roles involved in Cloud computing.
00:00
One of the major differences I've already stressed,
00:00
is that the Cloud really works on
00:00
shared responsibility between customers and
00:00
other vendors to successfully gain and utilize
00:00
those advantages of the Cloud that we've
00:00
talked about in previous modules.
00:00
In this, we talked about some of
00:00
the responsibilities of each.
00:00
If the customer is really paying for the services
00:00
the Cloud provider is providing those hosting services,
00:00
that broker may be helping with some of
00:00
those optimization features of utilizing
00:00
the Cloud and the Cloud Access Security Broker,
00:00
the CASB is helping a lot of
00:00
that identity and access management and
00:00
forcing the organization's security policies to
00:00
securely access and monitor activity in a Cloud.
00:00
The size of your organization,
00:00
the complexity of the Cloud deployment,
00:00
and how many applications you really need to
00:00
access really depends on
00:00
whether you'll utilize these
00:00
service or how they'll work in
00:00
concert to serve your organization's needs,
00:00
or how you are going to serve
00:00
your customer if you already worked
00:00
for a Cloud services provider
00:00
or company based in the Cloud.
00:00
We'll get more into this in detail as we continue on.
Up Next