Blog

Cloud storage security: comparative study (part 2)

Last time we started comparing Cloud storage security and touched Amazon AWS advantages and shortcomings. Today I am going to provide you with Windows Azure description.
2 September 2014
Cloud-based testing
Cybersecurity testing
The article by a1qa
a1qa

Last time we started comparing Cloud storage security and touched Amazon AWS advantages and shortcomings. Today software testing engineer Anna Andreeva is going to provide you with Windows Azure description.

Windows Azure

Although recently Windows Azure provided only cloud “platform as a service» (PaaS), introducing series of updates made Azure to be a full-fledged cloud infrastructure to run applications on Windows Server and Linux.  Independent performance testing showed that Windows Azure is far ahead of its competitors, thereby strengthening the leading position. So, what is included in the security package?

  • Mutual SSL-authentication. All internal traffic is sent in encrypted form, which prevents information outflow, even if it is intercepted.
  • Management of certificates and private keys. Mentioned certificates and keys are generated by a separate mechanism, which is not available from the application code. They are encrypted and stored in a secret repository. There is a possibility of an additional password protection.
  • Principle of Minimal Privilege. Custom applications running on virtual machines with minimal rights, which complicates any kind of attack, since their implementation requires escalation of privileges.
  • Data access control. Windows Azure has a simple model for managing data access. For each client’s account secret key is generated that is used to gain access to the vault, tied to this account.
  • Isolation of Hypervisor, host OS and the guest virtual machines. Client virtual machines Isolation is critical for safe sharing of disk space. Hypervisor and the root OS are responsible for isolation of guest virtual machines In Windows Azure.
  • Packet filtering. Hypervisor and the root OS filtering unsafe packet traffic.
  • VLAN Isolation. Internal data transfer is organized so that all traffic when moving from one network to another is verified by router. That protects data from listening and getting external traffic into the internal network infrastructure.
  • Removal of outdated data. To ensure a high level of security after the removal the platform checks and removes all references to the purified resource. All copies are also erased by means of scavengers.

It can be seen from the description that the security mechanisms offered by the providers, aimed at protecting domestic architecture – hardware and client VMs.

And this is natural, since for provider it is important to prevent further attacks in case of illegal capture virtual machine. i.e. access to root operating system, unauthorized listening of other client machines traffic or getting information stored on disk. The process of developing cloud web application does not differ much from the development of applications written in a regular PC. So all web application threats remain relevant in the cloud, and that is why customer is responsible for protection and secure configuration.

Summing up, the use of cloud infrastructure has a huge advantage. Stability, availability, flexibility – are the most important criteria for successful implementation of the project. However, the issue of safety here is also worth acute me as “old fashion” ones.

The artilce Cloud Storage Security: AWS Vs.Azure by Anna Andreeva was published in Network Computing online edition, you can read the full version here.

More Posts

19 April 2022,
by a1qa
5 min read
What prevents companies from boosting eCommerce customer experience: 4 common mistakes
Dreaming of a flawless online shopping journey for your users? Explore 4 widespread situations that hamper achieving this goal.
Cybersecurity testing
Performance testing
Test automation
Usability testing
Clutch awards
23 March 2022,
by a1qa
2 min read
a1qa recognized for cybersecurity expertise by Clutch!
The global online review platform Clutch added a1qa to the Top 15 Penetration Testing Companies for 2022.
Cybersecurity testing
Mobile app security
3 January 2022,
by a1qa
4 min read
Cybersecurity testing: 4 best practices to ensure highly safe IT solutions
Find out 4 cybersecurity tips to release highly secure software and protect end-user data.
Cybersecurity testing
Mobile app testing
streaming services
30 November 2021,
by a1qa
4 min read
Ho ho ho! QA to enable crash-proof streaming platforms for Holidays season
Isn’t it high time to forget about the Christmas rush and truly enjoy the pre-holidays season? Read the article about how to put peak-load anxiety behind by applying rigorous testing of your streaming solution.
Cybersecurity testing
Functional testing
Performance testing
Usability testing
19 August 2021,
by a1qa
4 min read
Cybersecurity: Top 5 questions to ask a QA vendor
What information to request from QA providers to get confident in the complete security of your software and protect end-user sensitive data? Read about that in the article.
Cybersecurity testing
5G impact
31 May 2021,
by a1qa
4 min read
5G network impact on mobile app testing
Check out what 5G connectivity will bring to the IT world and how it will modify mobile app testing.
Cybersecurity testing
Mobile app testing
Performance testing
29 April 2021,
by a1qa
4 min read
Addressing 4 security issues for digital transformation programs
Find out the top 4 safety challenges of digital transformation and a QA playbook to address them and contribute to a higher level of cybersecurity.
Cybersecurity testing
31 March 2021,
by a1qa
4 min read
QA scenario to introduce 6 eCommerce trends in 2021
Discover what trends will rule the eCommerce industry in 2021 and how QA can help implement them with confidence and ease.
Cybersecurity testing
Test automation
25 February 2021,
by a1qa
4 min read
9 QA points for delivering high-quality SaaS-based solutions
In the article, we’ve gathered 9 QA factors relying on the SaaS specifics that may help to perform SaaS testing with ease.
Cloud-based testing
Cybersecurity testing
Functional testing
Performance testing
Test automation

Get in touch

Please fill in the required field.
Email address seems invalid.
Please fill in the required field.
We use cookies on our website to improve its functionality and to enhance your user experience. We also use cookies for analytics. If you continue to browse this website, we will assume you agree that we can place cookies on your device. For more details, please read our Privacy and Cookies Policy.