8 Must Haves For Cloud Based Applications}

8 Must-Haves for Cloud-based Applications

by

RomeshThe proliferation of always-on, web available applications has created a new universe of products, services, tools, entertainment, and, of course vulnerability. Once protected by the safe confines of fire walls and enterprise networks, cloud based apps (SaaS) are today, by the very nature of their purpose, exposed to unprecedented threats.As seen below, it isn’t just user data at risk. Here we offer a few fundamental considerations to accompany the inventive process in order to safe-guard the application, its environment, and the ever-sacrosanct data therein. 1.Authentication: All APIs, with as few exceptions as possible, should be authenticated. Examples of unauthenticated APIs can be the login & password reset APIs, which, by definition, will be unauthenticated. Using Single Sign On (Google, LinkedIn) instead of your own user database makes things convenient for the users. Authentication must be token based, which should expire after a period. 2. Authorization: All APIs should have an authorization layer. This layer defines which user (role) is allowed to access which resources in the system. Eg, adding new users to the system can be a privilege limited only to the admin roles of the system. Authorization caches can be used to boost the performance of the app, as authorization checks are repeated for every API call. 3. Auditing: tools like splunk should be used whenever possible. This allows real-time monitoring for anomalous activities. This implies that logging must be fine grained. 4. Static Code Analysis: tools like checkmarx should be used whenever possible to identify & fix vulnerabilities in code. 5. Common Vulnerabilities & Exposures (CVEs): maintain a list of all 3rd party code used in the app, & keep an eye on their CVEs. CVEs are public disclosures of vulnerabilities & exposures in software modules. If any CVE affects the app, alternatives or other mitigation & contingency measures must be found to minimize the impact of the disclosed vulnerabilities. This monitoring should be done for the lifetime of the app. 6. Data Protection: certain sensitive data like personally identifiable information, or financial data should be stored encrypted in the database, if at all. One of the best ways is to have a separate key management server, which dynamically issues decryption keys to each authenticated requester, when accessing encrypted data. 7. Randomized URLs: when allowing access to unauthenticated or unauthorized user-specific resources, like images use long, randomized URLs so that others cannot guess related URLs.Tresbu is a enterprise solutions company focusing on Cloud, IoT, Mobile, Big data solutions. Tresbu has over many years of experience architecting highly scalable, secure, enterprise cloud solutions. Tresbu has core competencies in understanding, conceptualizing, prototyping, developing and deploying enterprise solutions for various customers across the globe. 8. Rate Limiting: all APIs should be rate limited to ensure nobody can launch DoS/DDoS attacks, whether authenticated/authorized or not. For unauthenticated APIs, an exponential backoff is must. This ensures that attackers cannot hog/monopolize system resources while probing the system for vulnerabilities.

Tresbu is a enterprise solutions company focusing on Cloud, Social, Mobile, Big data solutions. Tresbu has over many years of experience architecting highly scalable, secure, enterprise cloud solutions. Tresbu has core competencies in understanding, conceptualizing, prototyping, developing and deploying enterprise solutions for various customers across the globe.

[youtube]http://www.youtube.com/watch?v=KGdi-C9GjCY[/youtube]

We are also provide the Digital Transformation and Business Transformation

Services.

For More info please visit: http://tresbu.com

Article Source:

eArticlesOnline.com}

Tags: No tags

Comments are closed.