Blog

Cloud storage security: comparative study (part 2)

Last time we started comparing Cloud storage security and touched Amazon AWS advantages and shortcomings. Today I am going to provide you with Windows Azure description.
2 September 2014
Cloud-based testing
Cybersecurity testing
The article by a1qa
a1qa

Last time we started comparing Cloud storage security and touched Amazon AWS advantages and shortcomings. Today software testing engineer Anna Andreeva is going to provide you with Windows Azure description.

Windows Azure

Although recently Windows Azure provided only cloud “platform as a service» (PaaS), introducing series of updates made Azure to be a full-fledged cloud infrastructure to run applications on Windows Server and Linux.  Independent performance testing showed that Windows Azure is far ahead of its competitors, thereby strengthening the leading position. So, what is included in the security package?

  • Mutual SSL-authentication. All internal traffic is sent in encrypted form, which prevents information outflow, even if it is intercepted.
  • Management of certificates and private keys. Mentioned certificates and keys are generated by a separate mechanism, which is not available from the application code. They are encrypted and stored in a secret repository. There is a possibility of an additional password protection.
  • Principle of Minimal Privilege. Custom applications running on virtual machines with minimal rights, which complicates any kind of attack, since their implementation requires escalation of privileges.
  • Data access control. Windows Azure has a simple model for managing data access. For each client’s account secret key is generated that is used to gain access to the vault, tied to this account.
  • Isolation of Hypervisor, host OS and the guest virtual machines. Client virtual machines Isolation is critical for safe sharing of disk space. Hypervisor and the root OS are responsible for isolation of guest virtual machines In Windows Azure.
  • Packet filtering. Hypervisor and the root OS filtering unsafe packet traffic.
  • VLAN Isolation. Internal data transfer is organized so that all traffic when moving from one network to another is verified by router. That protects data from listening and getting external traffic into the internal network infrastructure.
  • Removal of outdated data. To ensure a high level of security after the removal the platform checks and removes all references to the purified resource. All copies are also erased by means of scavengers.

It can be seen from the description that the security mechanisms offered by the providers, aimed at protecting domestic architecture – hardware and client VMs.

And this is natural, since for provider it is important to prevent further attacks in case of illegal capture virtual machine. i.e. access to root operating system, unauthorized listening of other client machines traffic or getting information stored on disk. The process of developing cloud web application does not differ much from the development of applications written in a regular PC. So all web application threats remain relevant in the cloud, and that is why customer is responsible for protection and secure configuration.

Summing up, the use of cloud infrastructure has a huge advantage. Stability, availability, flexibility – are the most important criteria for successful implementation of the project. However, the issue of safety here is also worth acute me as “old fashion” ones.

The artilce Cloud Storage Security: AWS Vs.Azure by Anna Andreeva was published in Network Computing online edition, you can read the full version here.

More Posts

19 August 2021,
by a1qa
4 min read
Cybersecurity: Top 5 questions to ask a QA vendor
What information to request from QA providers to get confident in the complete security of your software and protect end-user sensitive data? Read about that in the article.
Cybersecurity testing
5G impact
31 May 2021,
by a1qa
4 min read
5G network impact on mobile app testing
Check out what 5G connectivity will bring to the IT world and how it will modify mobile app testing.
Cybersecurity testing
Mobile app testing
Performance testing
29 April 2021,
by a1qa
4 min read
Addressing 4 security issues for digital transformation programs
Find out the top 4 safety challenges of digital transformation and a QA playbook to address them and contribute to a higher level of cybersecurity.
Cybersecurity testing
31 March 2021,
by a1qa
4 min read
QA scenario to introduce 6 eCommerce trends in 2021
Discover what trends will rule the eCommerce industry in 2021 and how QA can help implement them with confidence and ease.
Cybersecurity testing
Test automation
25 February 2021,
by a1qa
4 min read
9 QA points for delivering high-quality SaaS-based solutions
In the article, we’ve gathered 9 QA factors relying on the SaaS specifics that may help to perform SaaS testing with ease.
Cloud-based testing
Cybersecurity testing
Functional testing
Performance testing
Test automation
16 February 2021,
by a1qa
5 min read
Winning trust: 5 industries that need blockchain testing
Get to know what industries are prone to rapid transformation within blockchain solutions, and how their catch-all testing can help keep leading positions.
Blockchain app testing
Cybersecurity testing
Functional testing
Performance testing
13 January 2021,
by a1qa
4 min read
Reaching HIPAA compliance for eHealth solutions through QA
We reveal the HIPAA’s data safety benchmarks and shed light on how software testing may help in its conformity.
Cybersecurity testing
Software lifecycle QA
30 November 2020,
by a1qa
5 min read
Acumatica: ensuring sound business operations with well-tested ERP system
Internal business activities are advancing, while ERP systems’ usage is growing rapidly. Explore how to ascertain their accurate work through timely applying QA.
Big data testing
Cybersecurity testing
ERP testing
Functional testing
Performance testing
Test automation
19 August 2020,
by a1qa
4 min read
Data migration to the cloud: enable robust transition through QA
With cloud computing being a pervasive technology, many companies still face challenges to set well-tuned information transfer. Learn how to avoid possible quality issues and be confident in data safety.
Cloud-based testing
Cybersecurity testing
Migration testing
Performance testing

Get in touch

Please fill in the required field.
Email address seems invalid.
Please fill in the required field.
We use cookies on our website to improve its functionality and to enhance your user experience. We also use cookies for analytics. If you continue to browse this website, we will assume you agree that we can place cookies on your device. For more details, please read our Privacy and Cookies Policy.