Cloud Architecture: interconnection and concrete case

The advent of Clouds has significantly changed the IT landscape in the last few years. Public, personal and even more. There are many kinds, each along with its specific advantages. And thanks to cloud architects, it is now possible to build a hybrid, secure and flexible infrastructure that perfectly satisfies the needs of organizations.

Today we will talk about exactly what is ization that is cloud hybrid practice?

 – symmetrical server room (colocation UK) or colo with server cabinets on two sides

We can’t deal with the main topic of Cloud architecture without mentioning the interconnection that is vital. In a hybrid architecture, an interconnection allows data to be transferred from one environment to another. To cite just one example, it is through it that a Cloud hosting an e-commerce site sends validated orders to the Cloud hosting the CRM so that the cheap colocation is entered there.

Before continuing, let us pause for a moment on this word, “interconnection”. We no longer speak of “connection”, a term connoting a descent that is unilateral of, but of interconnection, involving exchanges and putting all of the elements linked to each other for a passing fancy degree of importance. It really is a positive development, very representative o f the thought of cloud architectures, and of what is becoming associated with the IT landscape generally speaking.

This trend accentuates the need that is overall securing information systems. Indeed, it may be easier to collect information during its transfer rather than compromise the environments by which it really is kept. The interconnections, therefore, provide the opportunity for hackers and must be completely secure. Along with that, they need to be since efficient as the surroundings they link so as to not decelerate the overall functioning of the information system. So just take these two elements into account when selecting your provider.


In a hybrid cloud, the environments and their interconnections must, therefore, form a homogeneous whole; this is one of the reasons why a cloud architect is necessary for any hybridization project. These experts know good practices and can above all identify the technologies that are right surroundings adapted to each need.

Certainly, we frequently talk about linking the public cloud (for flexibility) and private cloud (for data security), but this is only one example of what a hybrid architecture can be. We talk about hybridization from the moment an interconnection exists between two environments: thus, the best solutions are chosen to meet each specific need.

We are able to, consequently, imagine an architecture connecting different local sites for the subsidiaries of friends via an MPLS, or conversely the interconnection of two general public Clouds to benefit from two various technologies or simply just redundancy … the limit that is main apart from technical constraints, this is actually the imagination of architects!


Simply take the example of the fictitious the e-mail Shop, evolving into the B2B sector, which will be undergoing digital restructuring. It hosted its internal information system itself, which included, among other things, a messaging system and a few business tools making use of Microsoft technology. The business’s web site and associated information system depend on Linux. The e-mail Shop, consequently, chooses to turn to a uk colocation hybrid architecture.

The other information of this internal information system, contained in the HRIS, the CRM, etc. are however considered critical by The Email Shop Company. In the interests of data sovereignty to have them hosted on a se cure private cloud, situated on British soil.

It continues to be to pick the absolute most solution that is effective hosting its website. The website is linked to CRM but does not use any of its uk server colocation considered to be critical. It can, therefore, be hosted on a cloud that is public Linux infrastructures.

We’ve thus identified at the least four different surroundings for the details system associated with the e-mail Shop business: two different public Clouds, a private Cloud, and another private Cloud in the form of a PaaS (Platform as a Service) for Office 365. In order to manage the interconnection between these environments, supports the outsourcing of the operational system in general. The latter also guarantees data security therefore the protection that is overall of IS against attacks.

Many manufacturers now provide automatic interconnection portals. They guarantee both good data transfer speed, and data integrity and protection. For more information, contact our Cloud architects who will be happy to answr fully your questions!

Just how to give consideration to protection within the AWS cloud?

Currently, a major change is taking place in companies. Digital transformation is a very subject that is broad however with a typical thread: IT security. Data protection has become better and better, however, stays a concern for a lot of, specially with regard to clouds that are public such as for example AWS. Nonetheless, migration for this cloud often improves the protection of its information systems.

Protected infrastructure: Security is JOB ZERO

The cloud is attractive, but scary during the time that is same organizations could find it tough to give consideration to having their data stored on gear that they do not get a handle on. However, the security of the equipment is fully guaranteed by AWS, for whom security is “Job Zero”, to phrase it differently, the supplier’s first concern.

The amenities of Amazon online Services, therefore, have an extremely level that is high of. The infrastructures have been designed to meet the strong security needs of army businesses and on occasion even banking institutions: this is certainly “security by design” put ahead by the GDPR. In addition, the AWS secur ity group, continuously available, is continually learning and improving thanks to the feedback from their an incredible number of clients.

The guarantee with this safety is a large number of accreditations with which AWS is in compliance. And this is where a received idea began to appear: “My information system migrated to AWS benefits from their accreditations”: this is false! However, they are installed is in compliance with said certification if you want to have your environments certified, this will be possible, because the base on which.

And also this is where in actuality the nuance is very important: AWS provides cloud protection (the foundation, the fundamentals of your architecture), and also you provide safety into the cloud (the system). This dimension, the security policy, remains the re sponsibility of the ongoing business, which controls and is responsible for it.

Adopt good practices and safety tools

Nevertheless, AWS isn’t only a secure infrastructure on that you must find a way to arranged a protected system. Migrating to the AWS cloud means building your environments on a solid foundation, and accelerating the implementation of safety procedures, taking advantage of this change to implement recommendations.

For example, Amazon Web Services strongly encourages integrating and paying attention to identity and access management, an essential component of the security of an information system or a website. And to support you, the AWS cloud provides you with a very wide range of native tools to aid secure your environments.

Privilege isolated infrastructures with Amazon Virtual Private Cloud, and find out about cryptography tools (Amazon CloudHSM, etc.), access monitoring and logging solutions (Cloud Trail, etc.), interior action tracking (CloudWatch), etc.

Another strong point of AWS is that this cloud gives great freedom of automation. By using more and more automation, the risk of human error is reduced, which improves security. Amazon internet Services itself has intends to cut operations that are manual 80% each year!

AWS, therefore, poses as helpful tips towards securing your systems, but above all, don’t grow the tools without global thinking! Security is a procedure that really must be thought of as an entire, whether your surroundings are on a cloud or on-premise.

Think about migration to AWS using the security that is best

Once you understand the protection of AWS, you understand you are building on a strong foundation. You also know that you have to create and manage your own security policy, specially as a result of the equipment and services provided by the cloud provid er.

To implement this security policy, give attention to your challenges. This is a step that is necessary as indicated in our article “how to consider migration on AWS? »: Just take the time to include the safety aspect in your thinking. To limit the risks to your data, create a criticality matrix. This will allow you to determine the level of sensitivity of your data, and whether it can be migrated to the public cloud or not, sufficient reason for what level of safety.

This mapping done, all things are a relevant question of access control, code quality … in short, compliance with good security practices! 100% security does not exist, the thing that is important to know important computer data and applications well, to recognize the risks involved and the procedure to follow to fix or control them.

Ways to get into AWS safety, in accordance with AWS Transformation teams day:

• Understand AWS security

• Build on strongly compliant, strong fundamentals

• Integrate identity and access management

• Allow detection checks

• Establish data localization and system security

• Implement data protection

• Optimizing change management

• Automate security functions