New User Offer
Recieve a Alibaba Cloud Certificate for $0.01
Alibaba Cloud Official Certificate
6th Generation Elastic Compute Service
$10.00 USDLearn more
Learn about Alibaba Cloud's security products line and their design strategy. So this course aims to help you better understand the transition from traditional IT infrastructure to cloud infrastructure including current information security best practices and trends. You will get a clear understanding of how to use cloud platform to reduce security risks.
Cloud security administrators and operators
How to get Certified
Certification:Apsara Clouder - Cloud Security:Cloud Platform Security Overview
Exam Duration:30 Minutes
No. of Exam Attempts:2 Times
Cloud Platform Security Overview
Understand the transition from traditional IT infrastructure to cloud infrastructure and recommended security best practices in the cloud.
- A brief history of IT infrastructure evolving
- Cybersecurity current situation
- Security risk evaluation and shared responsibilities
- Security focus on different infrastructure model
- Alibaba cloud security products overview
- Alibaba Cloud security products go through on console (console demo)
A Brief History of IT Security Infrastructure
By Alibaba Cloud Academy: Interested to learn more about Alibaba Cloud? Check out our course on Cloud Platform Security Overview course and get certified today! Ever wondered how data stored online can remain secure despite being publicly accessible? Well, before we start, let's have a quick recap on the history and evolution of the IT infrastructure. In the 1960s, the mainframe is recorded on the memory of its on making a very powerful but very isolated kind of device. At that time, those devices can only be owned by rich individuals or big companies, especially banks. They use this kind of device to do major financial transactions or for other kinds of heavy load computing. But as the internet developed further, we saw a shift from physical mainframes to a powerful and empowering tool called the virtual server, all thanks to cloud computing. The Rise of Cloud Computing: The problem of the mainframe is that it's very isolated and can only be controlled by large enterprises with a lot of resources and technical expertise. This type of setup is not shareable and is also very expensive to develop. Eventually, companies like Intel and AMD began to provide cheaper and cheaper chips, and rebuild these powerful devices into personal computers and small servers. This innovation gave consumers and individuals the ability to carry out their own computational tasks. For smaller enterprises, such as SMEs, they started to buy cheaper servers to build up a network of servers. Companies can now have their own computing capability to compete with larger enterprises, building their own centralized, small database center. This trend caught on in the late 80s and early 90s, and at the same time, many companies spun off to provide specialized products, such as Cisco to provide dedicated network devices. It was a golden time for the architecture and the market and this model worked very well in the 1990s, and even at the beginning of the 21st century. But as technology is becoming more and more commonplace, scaling such systems became expensive due to physical constraints. For instance, you have to maintain the temperature and humidity of a data center to ensure service availability is not affected. Some companies, namely IBM, had a concept that we should treat computing similar to a water service or power service. This concept, also known as cloud computing, was slow to gather momentum at the beginning due to many constraints. Although cloud computing solves many financial and physical challenges for customers, having data stored in a public location with other customers does not seem like a safe option at first glance. Virtualization Is Key to Data Security: In cloud computing, you only need to manage the parts that are important to your business. Physical aspects, such as server management and updates are taken care of by cloud service providers. From a user's perspective, resources such as networking and storage are virtual resources, which can be created or destroyed (released) rather easily. They have no sense about any existing infrastructure. They only focus on their business convenience, Easy to use features, and the service staff. By virtualizing these resources, customers will not be able to access resources created and managed by other users because from their perspective, such resources do not exist. In addition, services like virtual private cloud (VPC) lets customers build an isolated network environment based on Alibaba Cloud, including customizing the IP address range, network segment, route table, and gateway. This gives an additional layer of data security from a software level. In terms of data storage, services like Alibaba Cloud Object Storage Service (OSS) provides hierarchical security protection and encryption for enterprises, including features such as server-side encryption, client-side encryption, hotlink protection, IP address blacklist or whitelist, fine-grained permission control, log audit, and Write Once Read Many (WORM) policies. Additionally, data stored in the cloud is not only protected against cyber-attacks, but is also reliable. OSS uses a data redundant storage mechanism to store copies of each object on multiple devices of different facilities in the same region, ensuring data reliability and availability in case of hardware failure. Backing up data on the cloud is more convenient and faster than that of traditional systems. Shared Security Responsibilities Model: Another concept that helps ensure data security on the cloud is the shared security responsibilities model. In this model, Alibaba Cloud and its customers are jointly responsible for the security of customers' applications built on Alibaba Cloud. With security responsibilities shared between Alibaba Cloud and its customers, Alibaba Cloud provides a secure infrastructure to decrease the enterprise security burden of customers. As such, customers can configure and use cloud products in a secure manner, thus relieving much of the underlying security burdens while allowing customers to focus more on their core business needs. You can learn more about our security capabilities and compliances in the Alibaba Cloud Security Whitepaper - The International Version.Ready to test your knowledge? Take the Cloud Platform Security Overview course and get certified today!