Cloud Computing Basics—Platform as a Service (PaaS)
Security in PaaS
It is essential that application developers are thoroughly experienced in application security best practices. This can include secure coding practices in the proffered language as well as in secure design principles. Unlike traditional application development, PaaS offers a shared development environment, so authentication, authorization and access control can be combined to ensure consumers' data and application security. It is also important to scan Web applications for common security issues, such as cross-site scripting (XSS) and SQL injection. To refine development efforts to produce secure and robust applications, application threat modeling is critical. OWASP threat modeling can be used to create secure applications.
Future of PaaS
Many IaaS providers are moving up in the stack of service models. AWS is one of the examples. Today, the market for PaaS may be the smallest proportion of the overall public cloud. But, it will have huge implications in application developers' roles and responsibilities. Nearly half of respondents (49.6%) to the 2013 TechTarget Cloud Pulse Survey said they chose the PaaS they did because it was part of a cloud ecosystem they already were using. Similarly, 43% of respondents said they based their decision on how well the PaaS would integrate with existing architecture. Now, PaaS providers have realized that it will be more beneficial from a market and competition point of view to run services across several IaaS providers' architectures. Some providers are providing private versions of their PaaS offering, so organizations can use the same services in their existing facilities to utilize existing resources in a better manner.
According to 451 Research, PaaS is the fastest growing area of cloud computing and is projected to attain a 41% compound annual growth rate (CAGR) through 2016—24% of total cloud revenues.
The NIST Definition of Cloud Computing, version 15: http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf
Peeling Back the Layers of the Platform as a Service Market: http://searchcloudcomputing.techtarget.com/tip/Peeling-back-the-layers-of-the-Platform-as-a-Service-market
451 Research: Platform-as-a-Service Fastest Growing Area of Cloud Computing: http://www.cloudcomputing-news.net/blog-hub/2013/aug/23/451-research-platform-as-a-service-paas-fastest-growing-area-of-cloud-computing/?utm_medium=referral&utm_source=t.co
Windows Azure: http://www.windowsazure.com
Amazon Elastic Beanstalk: http://aws.amazon.com/elasticbeanstalk
Cloud Foundry: http://www.cloudfoundry.com
Mitesh Soni has been associated with the Cloud Services Team for the past three years, which is a part of the Research and Innovation Group of iGATE. Currently, he is working there in the capacity as Technical Lead. He loves to write on technical and soci
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide
- The Humble Hacker?
- Server Hardening
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- Varnish Software's Hitch
- Tech Tip: Really Simple HTTP Server with Python