News Stay informed about the latest enterprise technology news and product updates.

Netflix leverages cloud computing characteristics for security

Company’s cloud security architect talks about advantages over data center model.

SAN FRANCISCO -- Netflix sees practical advantages for security in the cloud compared to the traditional data center...

model.

In a presentation at the UNITED Security Summit held here earlier this week, Netflix Cloud Security Architect Jason Chan described how the Los Gatos, Calif.-based company got to a point where it couldn’t build data centers fast enough to keep up with its growing streaming movie business. Today, the company is nearly 100% in the cloud, he said. Netflix uses Amazon Web Services, and wants to “be able to use clouds, not build them,” he said.

Businesses clearly love the cloud, but there are ways security professionals also can leverage cloud computing characteristics to their advantage, Chan said. 

In the data center, applications are long-lived, code is pushed to running systems, and it can be difficult to enforce deployment patterns, such as patches, he said. “There’s a snowflake pattern.”

For Netflix, every application change is a new AMI (Amazon Machine Image), so there’s no patching required. File integrity monitoring is easier if systems aren’t changing, as is vulnerability management “if you have more confidence in the versions running,” he said.

Traditionally, tasks such as adding a user account, changing firewall configurations or forensic analysis usually require multiple steps and interfacing with multiple systems, Chan said. “These tasks are a simple API call with cloud.”

AWS enables the creation of security groups; systems are added to groups that control the connectivity. Unlike the traditional firewall, “there’s no one chokepoint,” he said.

Cloud computing involves “ephemeral nodes,” he said. If you’re running an instance in the cloud, you should expect it to disappear and be able to survive that, he added.

“The key lesson we learned is you have to leave the old ways behind,” Chan said, referring to methods tied to the old data center model. A generic forklift of an application into the cloud is a mistake, he said. “Adapt things for this new model.”

There’s still a lot of work to be done on the cloud security front, he said. With ephemeral nodes, security monitoring is problematic since many monitoring systems are based on device history. Identity integration is another area where improvement is needed, he said.

 

 

 

Dig Deeper on Cloud Patch Management and Cloud Configuration Management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close