14Cloud and Edge Networking Security
Edge and Cloud networking security is complex. Many parameters are involved, both at the physical and logical levels. In this chapter, we will describe a number of solutions deployed in companies but which are sometimes limited by the complexity coming from both the network and the system side. We will start by examining Cloud Security which is a new paradigm whose objective is not to bring security to Clouds but to propose virtual machines whose objective is to make the rest of the world secure. Next, we will look at SIM cards and their evolution in the context of Cloud Networking. Finally, we will focus on several solutions to secure the Cloud.
14.1. The Security Cloud
The Security Cloud is a new paradigm that should spread rapidly in the 2020s, that of simplifying security processes by gathering them all in virtual machines that are housed in an adapted data center. We find firewalls, which today form the majority of virtual machines, but also authentication or identification servers, attack or DDOS detection processes, various and varied filters, in particular DPI (Deep Packet Inspection), which detects applications transported on a network by examining the flow of binary elements. There are also HSMs (Hardware Security Modules) for companies and individuals. The HSM, which we will review later, is a form of equipment to protect cryptographic actions.
If we start with firewalls, which are the most widespread case, one of the ideas is ...
Get Cloud and Edge Networking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.