Resource sharing and virtualization create direct channels between cloud-based applications. Unfortunately, the benefits this practice provides are outweighed by the risk of either accidentally interfering with another application’s operations or opening it up to deliberate attacks.
It’s possible to insulate these applications using dedicated cloud servers rather than VMs or cloud-based containers. However, considering that scalability depends on pooling resources, the dedicated cloud approach likely won’t cut it performance-wise.
One way to secure these applications is to implement specific isolation strategies, particularly between hosts and the network. While internal governance and security practices will define exactly what needs to be kept separate and how separated…
Source link