APJ - ISV - Database

O'Reilly eBook: An Introduction to Cloud Databases

Issue link: https://resources.awscloud.com/i/1496544

Contents of this Issue

Navigation

Page 26 of 47

their study: access control and IAM, network isolation, and data encryption. Access Control and Identity and Access Management Cloud providers generally excel in strong access control mecha‐ nisms. The vendors mentioned in this report rely on centralized IAM to manage users, security credentials (passwords, access keys, and permissions), and authorization policies that control which resources and services users can access. Administrators need to master IAM just to get access to the cloud for themselves and their users. In addition, cloud native databases are sometimes integrated with the general cloud IAM tools. Linking your database protections to the cloud's IAM provides the easiest and most secure access poli‐ cies. You will use IAM to define user accounts and then add database- specific access rules on top. Using IAM, you can grant different user permissions to perform different database operations. You also can institute fine-grained access controls—which most databases offer, such as restrictions on particular rows or columns—through IAM. Traditional databases use the same tools in the cloud that you use on-premises, such as GRANT statements in SQL. But you might be able to hook them into IAM so that you can use the same user accounts in both the cloud and the database, and benefit from the extra security and convenience provided by that integration. Network Isolation Some common cloud features to protect your systems on the net‐ work are VPCs, firewalls, and network access control lists (ACLs). As we discuss in "High-Level Effects of Moving to the Cloud" on page 2, a VPC is a private network within the cloud for communica‐ tion between your servers. Within a VPC, you can isolate database instances by specifying the IP range that is allowed access to each database. The organization that creates a VPC has full control over its virtual networking environment and can select its own IP address ranges, create subnets, and configure its own route tables and net‐ work gateways. Security for Data and Applications in the Cloud | 21

Articles in this issue

Links on this page

view archives of APJ - ISV - Database - O'Reilly eBook: An Introduction to Cloud Databases