Monday, May 4, 2020

Child Protection Resource Management

Question: Discuss about theChild Protection for Resource Management. Answer: Introduction Remote Administration, Resource Management and SLA Management Because the company has to move to cloud technology, so there is need to configure and administer the application on the cloud with the help of cloud tools and the user interfaces. This can be done by a remote administration system by providing a portal that can manage the resources as well as SLAs. This system can also be used for modifying the online features of portal. In order to establish such system, following would be needed: Set up of cloud services. Access control mechanism. Tracking the mechanism. Configuring cloud computing technology. Supplying the IT resources on cloud. Setting up the PaaS cloud model for deployment. Tracking if everything is done according to Service Level Agreements and Quality of Service. Managing the security such as credentials, authorization control, authentication mechanisms, user accounts, and the access control. Checking if the services can be accessed on cloud internally as well as externally or not. Item _ User specific credentials provided by AWS Identity and Access Management (IAM). _ Amazon Elastic Block store is used once backup and recovery options are understood. _ AWS will employ dynamic IP addressing once components of application are started. _ For managing operating system and requirements of database, Amazon Elastic Compute cloud could be used. _ Backing up of Amazon EC2 from time to time. _ Regular testing of instances of Amazon EC2 via Amazon Machine Images. _ Deployment of key components of application via Elastic Zone Balancing. _ Testing of patches and updating of security for operating systems, AMI services. _ Non-sharing of critical private keys of instances of AWS. _ Implementation of security rules according to hierarchy of topology _ Removal of confidential information like authorized key files. _ Testing of complete WS-hosted application before go-live. _ Incorporation of trusted AWS advisor reports. _ Sign-off of AWS support (production) for enterprise support. (Morad, Dalbhanjan, 2013) Following is the checklist for operations of the organization: Category Description Security and accessibility Strategy development for API management, network access, operating system. Assets management Strategy development for cloud service tracking and identification Billing Management of accounts and bills. Backup To make sure that solution meets the data recovery and backup management Application resilience To meet high levels of availability and application requirements. Configuration and change management Strategy development for change management Deployment and release Strategy development of integration of release and system deployment according to the approach of configuration and change management Resilience, Backup and Disaster Recovery Applications that need to be built again on a cloud technology need to make sure that they are not affected by any failures. To make cloud applications failure resilient, Elastic Cloud computing model is used by Amazon EC2 as the model is comprised of such tools that dont let failures occur. The demand for such a resilient network is getting increased day by day. Cloud technology takes care of business continuity approach for minimizing the downtime even if some disaster occurs. But Amazon guarantees to give an uptime of around 99% (Carlson, 2012). Resilience of AWS: In order to prevent the client from any component failures, Amazon makes use of block level storage approach over the instances of Amazon EC2 because of which volume of every block can be duplicated automatically for some particular availability. Backup by AWS: Amazon usually raises the need of the back-up for the multiple data centers, remote branches and also whole infrastructure back up is required at the main data center and that main data center is controlled by the organization. Every site has a gateway for storage so that data can be recovered rapidly in case some disaster occurs. To provide user endpoint protection, storage gateways are used as it can be used to create the backups by automating storage and to encrypt the information, for throttling bandwidth, deduplication of data, and to synchronize the data (Csb,. 2016). Disaster recovery by AWS: For recovery from disaster, AWS makes use of the storage gateway that has the compressed version of data of server and the data which has been reduplicated. This can be done by internet. Decryption is used for recovering the information after the data is obtained. In case of disaster, storage gateway is usually transferred from AMI to cloud so to make the deployment easier. The strategy of storage gateway has lots of benefits like decrease in the cost of networks, high throughput, and the flexible connection (Howell, 2013). SLA Assessment of AWS Some ethical codes are to be adhered by the service provider. These includes: Privacy honoring of clients, data integrity, competency, competency and honesty. Amazon SLA assessment The SLAs of Amazon AWS clearly depict the system reliability via assurance of 99% monthly uptime. It is mentioned in the agreement. According to the policies of Amazon, security of the cloud is given highest priority and also developers have come up with the security model to permit the companies to adopt AWS in a secure environment. Following are key strengths of SLAs of AWS (Morad, Dalbhanjan, 2013): AWS permits the users to establish a control over the topologies of network and connections via VPC (Virtual Private Cloud) and Direct connect. Various options are available across zones which enable data servers at the closest client locations. In order to enable controls and DevOps, the agreement of AWS has access control, security documents and customized alert services. To provide customization, there are various tools such as Beanstalk, CloudFormation, Opworks. AWS SLA include various valued services like content delivery network, DNS, relational database etc. AWS also contain huge scaling ability along with various offers as add-on on software. There are some advantages to SLA solution which may act as an obstacle before making a decision in adopting the AWS: Though Amazon shows all the information regarding tis services on its website but there is still not a single SLA available. In addition to this, these SLAs do not have any versioning system which makes it difficult for the client to take appropriate actions in case of violation of contractual issues. In spite of these drawbacks, the service reputation of Amazon is very strong and it is also committed to improvise the architecture of AWS in future times. If there are any issues in the SLA, the organization will accept them and aids customers in mitigating the impacts of such issues (Gartner, 2014). Hence, it can be concluded that Amazon SLA for AWS is a good agreement as it considers the reputation and accessibility and availability of documentation. This makes it a fair proposition for the organization to implement AWS as its cloud service. References Gartner. (2014). Amazon Web Services Bottom-Line Assessment. Gartner. Carlson, J. (2012). Resilience: Theory and Applications. Retrieved 8 September 2016, from https://www.ipd.anl.gov/anlpubs/2012/02/72218.pdf Csb,. (2016). Human Resource Management. Retrieved 8 September 2016, from https://www.csb.gov.hk/english/publication/files/e-hrmguide.pdf Howell, M. (2013). Data Backups and Disaster Recovery Planning. Retrieved 8 September 2016, from https://www.cs.umsl.edu/~sanjiv/classes/cs5780/projects/F03/howell.pdf Marilly, E. (2016). Requirements for Service Level Agreement Management. Retrieved 8 September 2016, from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.454.6303rep=rep1type=pdf Morad, S. Dalbhanjan, P. (2013). Operational Checklists for AWS. Retrieved 8 September 2016, from https://media.amazonwebservices.com/AWS_Operational_Checklists.pdf Zechmeister, C., Tomic, A., Ravirala, R., Nunn, J. (2014). Enterprise Backup and Recovery On-Premises to AWS. Amazon.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.