Common Security Port Numbers and Names

FTP Data Transfer- 20 FTP Control – 21 SSH – 22 Telnet – 23 SMTP – 25 TACACS – 49 IPSec Header – 50 and 51 DNS – 53 TFTP – 69 HTTP – 80 Kerberos – 88 POP3 – 110 NNTP – 119 NTP – 123 IMAP – 143 SNMP – 161 SNMP Traps […]

Continue reading
System Performance Icon

Monitoring Cloud Systems: Optimize for Performance

Post topics: Monitor Cloud Systems to Measure Requirements Optimize Cloud Systems to Meet Performance Criteria Benefits of Monitoring Cloud Systems Monitoring can help identify potential issues before they become a problem or disruption in services. Monitoring can give a quick overview of the health and performance of all systems in the environment. Budgeting and IT […]

Continue reading
Backup Restore Icon

Cloud Backups, Restores, and Disaster Recovery Measures

Post Topics: Backups and Restoring Cloud Data Implement a Disaster Recover Plan Implement a Business Continuity Plan Main Backup Types: Full – Complete backup on an entire data set. Incremental – Backs up data that has been changed since last backup. Differential – Back ups all of the data that has changed since the last […]

Continue reading
Patching Icon

Patching Systems in the Cloud

Cloud Components that need to be Patched: Hypervisors Virtual Machines Virtual Appliances Networking Components Applications Storage Components Clusters Production – Development – Quality Assurance Rolling Updates A rolling update is a patching strategy that staggers deployment across multiple phases. Helps reduce downtime and issues from the update. Patches on server at a time. Blue/Green Deployment […]

Continue reading
cloud migration icon

Steps to Ensure a Successful Cloud Migration

Cloud Migrations Virtual environments tend to be the most cost effective and flexible IT environment in the cloud. Converting physical machines to cloud-based virtual environments allows systems to run on fewer hosts and less CapEx expenses. The advantages of Virtualization includes allowing snap-shotting, cloning systems, reducing downtime, and reducing staff resources. Physical to Virtual (P2V) […]

Continue reading
Cloud Storage Icon

Determining Storage Requirements for Cloud Deployments

Cloud Storage Considerations: Determine storage technology requirements are (HDD or SSD) Select storage options for deployment Read/Write Throughput using IOPS (IOPS measures I/O performance for storage devices) Cloud Storage Protection Options Local Replication – Replicates data within a single data center region. Regional Replication (zone-redundant storage) – Replicates data across multiple data centers within on […]

Continue reading
virtualization vs containers

Cloud Virtualization vs. Containers

Containers provide a lightweight solution for running a cloud application and only use resources intended to run and function. They are also referred to as operating-system-level-virtualization and can be viewed as a minimalist virtual machine that does not have a hypervisor. Containers include: The application Dependencies Libraries Binaries Configuration files Advantages of Containers in a […]

Continue reading
CPU

Determining CPU and Memory Size for Cloud Deployments

Cloud services provide a variety of computing options but getting the best value should start with initial compute requirements. CPU Performance Considerations Chose processor models that are optimized for virtualization (Intel-VT or AMD-V). Determine the number of cores based on the number of app and the needs of each app to run on the host. […]

Continue reading
Virtual Network Icon

Virtual Network Components (Cloud)

Virtual Switch: Allows for connecting multiple network segments that are virtual. Virtual Bridge: Allows you to connect a VM to a physical LAN adapter. Virtual Host Adapter: Allows the VMs to communicate with the host computer. NAT: Allows a connection to an external network when the adapter has only a single IP address. DHCP Server: […]

Continue reading
Security Policies Icon

Cloud Corporate Security Policies

Goals or mission statement for cloud services: Short summary that clearly states the goals for using cloud services. Data classification: Sensitive corporate data. Data that is protected by law such as HIPA, PII, and SPI. Operational data that is used on a daily basis. Scope: Defines who and what the policies applies to. Responsibilities: The […]

Continue reading