Sei sulla pagina 1di 20

Want to have all the issues of Data Center magazine?

Need to keep up with the latest IT news?


Think you’ve got what it takes to cooperate with our team?

Check out our website and subscribe to Data


Center magazine’s newsletter!

Visit: http://datacentermag.com/newsletter/
DataCENTER
FOR IT PROFESSIONALS

MAGAZINE
Content issue 01/2011

basics
4. Website Security – The Basics
Rufino Managhaya

6. SQL injection
Josiah Tullis

security
8. SELinux applied to data security
Lucas do Amaral

10. What’s missing from the


„best practices” for Unix/Linux
security that host Oracle
database systems?
Steve Hodge

12. Hackers know! Security


standards ensure compliance...
David Kane

cloud computing
14. Cloud computing architecture
Richard Batka

17. Cloud computing economy


Richard Batka

Dear Readers,
I have a great pleasure to introduce to you the first issue of the Data Center online ma-
gazine. Each month we will provide you with the latest, professional information from
the data center area, hoping that you will find them useful and interesting.
In this issue we focused on the Security topic: if you are interested in website security or
SQL injection, check our „Basics” section. Need to know more about Cloud computing?
Richard Batka described its architecture and economical issues connected with this area
in his article.
You can also find the information about SELinux applied to data security and if you
need to know what’s missing from the „best practices” for Unix/Linux when it comes
to security, read the Steve Hodge’s article.
I wish you a good lecture!
Magdalena Mojska
Editor in Chief
http://datacentermag.com

Data Center 1/2011 3


Basics

Website Security
– The Basics
Having a website means that you have a file container open to the
public, and what the public does or does not see concerns the basic
website security.
Showing Your Home Page
The first unhidden file being opened by your
browser is the default home page of your
website. This file is usually the index.html fi-
le, but it can be different in different servers.
You will know that a certain file is being used
as default home page when you try to browse
your website and the contents of the said file
get displayed by your browser. For example, if
your website is example.com, you access this
URL in your browser: http://example.com or
www.example.com.
If the file is the corret default home page,
you will see its contents even if its filename
does not appear in the URL.
If you did not succeed with the filename public your hidden files through their search webserver what these files are through the
«index.html», try «default.html», «index.htm» engines. To prevent these entities from show- Files statement in .htaccess. For example, to
or «index.php». ing your hidden files, use the file robots.txt. hide files ending in «inc» from the public, in-
If you somehow failed and you want to tell clude these lines in .htaccess:
the server the name of the file that should be Learning About robots.txt
the default home page of your website, you The file robots.txt should be put in your main <Files *.inc>
use a hidden file, .htaccess. folder (also called root directory, symbolized Deny from All
by «/», a forward slash). Once created and pla- </Files>
Learning About .htaccess ced in «/», the search engines would read ro-
The file .htaccess is used in webservers run- bots.txt for folders ar files that you disallow (You can include more than one Files state-
ning Apache, but it can can also be used in them to read. For example, to disallow rea- ment in .htaccess.)
other Linux-run webservers. It is a hidden fi- ding the directory «images» and file «my_no- This method will prevent even you, the site
le, that is why it has a dot (period) as the first tes.html», you include in robots.txt: owner, from viewing the said files through
character in its filename. your browser, so be careful when you use the
To define «index.html» as your default User-agent: * Files statement in .htaccess.
home page, you put this line inside .htaccess: Disallow: /images/
directoryindex index.html. Disallow: /my_notes.html Showing All Files
You can also use «index.htm» or «index. (* means «all search engines».) If the webserver will allow, you can force it to
php». However, if the said file is already being show all files that you put in your site by pla-
used as home page by your server, there is no Remember that «/» means your root directory. cing in .htaccess:
need to use .htaccess for defining it. In a browser, the said folder and file should
appear as: Options +Indexes
Hiding Files (This will have an effect if the Apache web-
Once you have your default home page wor- • http://example.com/images/ server has allowed override commands.)
king in your site, the other files are not auto- • http://example.com/my_notes.html This is the lazy method of showing to the
matically displayed by the user’s browser un- public your files without the need to write at-
til you include it in your home page, either They will still be viewable in your browser (if tractive and technically correct pages (home
as inline image (if it is an image file) or URL the directory «images» has a home page, and page, especially).
(if it is another HTML file). Some people do the file «my_notes.html» is not blank). But
a lazy method of hiding files in a folder by they should not appear in search engines.
placing in it an empty home page file (like an Rufino Mananghaya,
empty index.html). Hiding Files, Absolutely eMinima Project Chairman,
But there are site indexing entities like ya- There are files that the public should not be University of the Philippines
hoo.com or google.com that can show to the able to access directly. You tell the Apache Los Banos

4 Data Center 1/2011


Security in the Data Center

Security in the Data Center


T
he security of a Data Center has many hosting sites, data centers, and applications of like a hacker in order to identify these types
common characteristics to comput- any type. Many APTs take advantage of zero-day of vulnerabilities and plan attacks. The ARE
ing environments of businesses, cor- vulnerabilities as was the case in the recent Goo- process includes steps to identify application
porations, governments, and even individuals. gle Aurora attack. APTs represent a new level vulnerabilities (new and old) and then plan
The basic differences are risks and degrees of of sophistication of attacks and appear to be in- attacks in technologies used therein.
countermeasures. For example, does an indi- creasing in numbers of security incidents. • Application Lifecycle Vulnerabilities – Sup-
vidual require each person that comes into his APTs typically involve application attacks al- pose that an Internet application has one
home to wear a badge indicating proof of ap- though Application attacks are not new. The or more installable components. An astute
proved access? Probably not, but the homeowner Open Web Application Security Project (www. hacker might examine the entire applica-
certainly guards his premises. The risk of a friend owasp.org) has played a key role in making web tion lifecycle looking for vulnerabilities in
stealing personal information is somewhat dif- application security visible. OWASP issues their any part of the application lifecycle; e.g.,
ferent from someone stealing Intellectual Prop- Top 10 Most Critical Web Application Security download, installation, initial access, opera-
erty (IP) from a government/company R&D lab. risks periodically (previous being 2007 and cur- tional use, updates, and administration. The
Thus, although this article discusses Data Cent- rent 2010). Most of these threats occur in the hacker might discover that intercepting the
ers, the article is applicable to computing environ- application layer and while most fall into the ex- download request might expose vulnerabil-
ments in general. tended rudimentary attacks, really clever attacks ities in the install request/download proc-
Industries that rely on computing environ- that combine multiple elements in unexpected ess; or the hacker might interrupt the install
ments (and, in particular, Data Centers) have and highly effective ways are APTs and pose real process at the client to create an unstable ap-
made progress in defending against malicious threats to data access. plication state that bypasses security poli-
attacks from hackers. They have accomplished Ethical Intruder specializes in APTs. Our team cies implemented in the client. The essential
this through the following: of ethical hackers is composed of seasoned point is that one has to think out-of-the-box
software engineers and security professionals in order to identify the application vulnera-
• Implementation and monitoring of effec- each with 20+ years of experience in building bility and then plan and execute the attack.
tive and responsible security policies and and securing applications. Team backgrounds Again, the ARE process provides the oppor-
procedures, include work with Global 200 corporations, US tunity for this out-of-the-box thinking.
• Certification of compliance to industry se- military contractors and the FBI. Our specialty is • Bypassing Security Policies – Suppose that
curity related standards and regulations, the reverse engineering of applications in order a server application delegates certain secu-
• Intensive use of commercially-off-the-shelf to identify vulnerabilities in applications that 1) rity policies to its client. A hacker might be
security products for firewalls, intrusion de- originate from the inherent technologies in the able to modify the client application in order
tection/prevention, viruses, malware, and a application and 2) that result from the integra- to bypass those security policies and access
variety of software code vulnerability detec- tion of those technologies. We designed our “Ap- confidential data; for example, a password
tion tools and services, and plication Reverse Engineering” (ARE) process retry limit. This type of attack is innovative
• Use of personnel dedicated to security, pen- specifically to identify, attack, and risk evaluate and not applicable to vulnerability detection
etration testing, and ethical hacking. vulnerabilities in business applications and their software but falls out of the Ethical Intruder
supporting computing infrastructures. ARE process.
Yet, the fact remains that malicious hackers The sophistication of vulnerabilities in business
continue to access personal and confidential applications characterized by APTs varies from The Ethical Intruder approach is to think like
data of employees, customers, and anyone else. the highly targeted and customized malware of the hacker – not limited by test scripts and not
By what means do they accomplish this? What the Google Aurora attack to holes left from the limited by checklists. Each application has its
trends indicate that the problem is growing or integration of application technologies as illus- own particular integration of technologies al-
shrinking? What can I do to protect myself? trated in the following examples: beit most applications use similar technologies.
The Computer Security Institute (www.goc- Our ethical hackers use knowledge gained over
si.com) indicates that companies in 2010 lar- • Information Leakage – Suppose that an In- the years as a foundation for innovative and out-
gely guard against rudimentary attacks such ternet application uses the Web Services of-the-box thinking for compromising appli-
as phishing, port scans, password cracking, Description Language (WSDL) for describ- cation technologies as illustrated by the above
and unsophisticated viruses. Companies have ing its web services. An astute hacker might examples. We believe that this approach will
mixed successes with extended rudimentary at- examine data returned from the server ap- help defend against the sophisticated hackers
tacks (e.g., malware, targeted phishing, and vul- plication via WSDL and, thus, bypassing the of the future. The Ethical Intruder approach is
nerabilities in software versions). Extended at- application to determine if the server appli- also technology, vendor, product and platform
tacks are more sophisticated than rudimentary cation returns more information than the agnostic which means that remediation conside-
attacks. Most threats today are these extended, application client normally displays. If true, rations are only based on your true secure state
more sophisticated rudimentary attacks. this “information leakage” might contain and not contractual or financial considerations
While progress against these attacks is good sensitive information that a hacker could of our partners.
news, new threats are emerging that the CSI use on its own or use to access other corpo-
calls “Advanced Persistent Threats” (APT). APTs rate information. The key here is that vul-
are sophisticated and potentially multi-connec- nerability detection software tools do not
ted targeted malware that can burrow deep into look for this type of attack. One has to think

Data Center 1/2011 5


Basics

SQL Injection
Most people think SQL injection is no longer a threat thanks to easily-
implemented patches that most web hosting services have used for
years, but as we explore the vulnerability further we see that it is
both very real and severely dangerous.

I
t seems our government has a reputation often embedded in HTML and other program-
for covering up embarrassing security flaws, ming languages. This allows for easy creation,
which is why you probably didn’t hear about organization, retrieval, or removal of data on
the NSA website defacement that took place just a SQL server. Wikipedia provides this analysis
last October. The National Security Agency was, of SQL queries. When logging into an admin or
understandably, more than a little annoyed, but user page on a website we are usually prompted
kept the incident on the down low, since, well for the following credentials. Users and admin-
it should be obvious why the National Security istrators overlook this prompt as a secure way to
Agency wouldn’t want people knowing that they access data on a website. A hacker, on the other
couldn’t even manage their web site security. hand, sees user input fields as access to servers-
The hacker, SQL_master, a hacktivist likely pro- portals to “protected” data. XSS, Buffer Over-
testing the NSA’s involvement in various cyber- flow, and SQL attacks all involve hackers inject-
security roles, attacked the site via a well known ing malicious server-side code via input fields.
exploit commonly called SQL injection. When you make a request to view adminis-
trator or user data using this prompt the server
SQL sends an SQL query to the database that looks
SQL, often pronounced ‘Sequel’, stands for like this: The asterix following SELECT sets the output
Structured English Query Language. Created to return all columns from the the specified
by IBM developers in the mid ‘70’s, SQL is the SELECT * FROM [TABLE] WHERE USER = table, in this case “[table]”. $_POST denotes
single most popular language for Database Man- ‘$_POST[‘user’]’ AND PASSWORD = that the variables “user” and “pass” are being
agement and Data retrieval. SQL statements are ‘$_POST[‘pass’]’ taken as input. This means that when user “Al-

The NSA recruitment website as it appeared

6 Data Center 1/2011


SQL Injection

ice” logs in with the password “secret” the web


server enerates the following query:

SELECT * FROM [TABLE] WHERE USER =


‘Alice’ AND PASSWORD = ‘secret’

This returns Alice’s user data.

The Attack
Now, knowing how SQL queries are gener-
ated, it becomes very easy to manipulate the
server into executing malicious code that re-
turns private data. Since SQL uses the single The NSA recruitment website.
quote as an escape character, it is only a matter SELECT * FROM [TABLE] WHERE USER = vulnerability and the survey performed by
of including that in your input followed by ex- ‘admin’ AND PASSWORD = ‘foo’ OR a=a #’ Acuentix to determine this is questionable.
ecutable code. For instance, we could use the Nevertheless, as we saw with the NSA web-
SQL comment character, the ash’ symbol, (‘#’) Last I checked, ‘a’ does in fact equal ‘a’. Ad- site in October of last year, SQL is still a very
to comment out an input field: ditionally, we comment out the final single real threat – particularly in older websites.
quote since we injected our own. A more recent example is the November 8th,
SELECT * FROM [TABLE] WHERE USER = 2010 attack on the British Royal Navy web-
‘admin’ #’ AND PASSWORD = ‘comment’ Checking site. Acunetix offers a website vulnerability
for Vulnerable Targets scanner for a minimal fee. Hewlett Packard
In this case, since the password credential is com- Acunetix security has advertised that 70% offers a free SQL injection scanner called
mented out, we could type anything in that field of all websites are vulnerable to SQL injection Scrawl for free. You can also perform a man-
and successfully have bypassed user login. and cross site scripting or similar vulnerabili- ual test like this.
Furthermore, we could manipulate the SQL ties. This is hard to believe since SQL injec- On vulnerable websites this will generally
query by creating a logical truth. tion is considered an ancient, nearly obsolete return a code 500 server error. This way you
can contact the administrator alerting them of
the vulnerability without having ever viewed
sensitive data or broken into the server.
It is worth noting that injection can also take
place in the URL box of a website by annexing
code onto the site address. More sophisticated
SQL attacks also exist and sometimes a hack-
er can launch a command prompt or terminal
on a vulnerable server and further exploit it.

The Defense
How can you defend your website against SQL
injection? SQL was defeated by a function called
addslashes(). Addslashes would basically just
add a backslash in front of any user submitted
quotation mark. This made it impossible for a us-
er to escape from sending data. In newer versions
of SQL addslashes is implemented automatically,
making the vulnerability incredibly rare. How-
ever, in a world were unpatched and outdated
web servers can go overlooked by system ad-
ministrators it’s important to know how SQL
injection works and how to defend yourself.
Josiah Tullis

Data Center 1/2011 7


Security

SELinux applied
to data security
S
ecurity-Enhanced Linux (aka SELinux)
was developed by RedHat, based on a
National Security Agency (aka NSA)
solution called Flask, they call it a “Result of
several previous research projects [1] in the
area.
SELinux consists on a flexible architecture
called Madatory Access Control (aka MAC),
this policy covers all processes running on the
machine, as in if they have privileges to do
such task or not. Here’s a flowchart of MAC’s
way of doing things (Grapshic 1).
The MAC is likely superior than Discretion-
ary Access Control (aka DAC), due to it’s large
amount of limitations. If you’re using DAC,
the owner of a file/object get a potential risk
of corrupting the files he/she owns. A user can
expose files or directories to security flaws us- es and or objects are controlled by the kernel using the Linux Security Modules Framework
ing an inappropriate chmod with an non ex- itself, and the user decision (aka LSM). Initially, it’s implementation uti-
pected propagation of it’s access rights. A proc- making is based on the available informa- lized identifiers (ID’s or PSID’s) stored on the
ess initialized by the user with a CGI script tion, instead of using only the user’s identity. free inodes of the ext2 filesystem. This numer-
can make whatever he wants with any file By using this kind of process, we can assure ical representation was mapped by SELinux
onwed by the user. For example, a webserver, that the due process get’s only the privileges it as security context label. But that would need
can do any operation with the files owned by need to run properly on the system. an mod in each filesystem for supporting the
it’s group, crackers or malwares can gain root A practical example: A user expose his data ID’s and PSID’s, weren’t a scalable solution.
access running process as root or using setuid using chmod and yet they are protected by the So, the next step of SELinux evolving process
or setgid. fact of his data has an unique type, associat- was a loadable 2.4 Kernel module, which stores
The DAC has only two user types the ad- ed to his home directory and other processess the PSID’s in a normal file, making SELinux
mins and the non-admins. For some services can’t touch this files without permission in- supported by every filesystem that exists.
to run properly, they need to be started with side the policy. However, this solution started to compromise
admin privileges, threatening to undo all our SELinux’s decisions are made based on la- system performance as in every process run-
work to maintain system’s security. bels, which includes a variety of relevant in- ning on the machine would have to get it’s
The MAC allows how certain process will formations. The SELinux decisions policy’s PSID on the disk, which is pretty slower, com-
interact with certain system parts, like devic- logic is encapsulated inside a simple compo- pared to system RAM.
es, sockets, ports and yet, another processes. nent, called Security Server with an general So, whem the SELinux where finally inte-
This is done by a security policy administra- security interface. grated to the 2.6 Kernel with total support for
tively set over all the processes. These process- SELinux was integrated in the Linux kernel, LSM, containing atributes (xattrs) on the ext3
filesystem and some minor mod’s to use xattrs
as security info storage.
The applications of SELinux in a linux sys-
tem is almost inifite, you can protect a webser-
ever from it’s own users, as in a user can’t touch
another user files, certain directory can’t be ac-
cessed via this user or via apache.
This aproach avoid’s many securty flaws cre-
ated by programming languages, framework
and stuff like that.
Another aplication you can use SELinux is
on virtualized environments. When services
are not virtualized, machines are physically
separated. Any exploit is usually contained
to the affected machine, with the obvious
exception of network attacks. When services
are grouped together in a virtualized environ-

8 Data Center 1/2011


SELinux applied to data security

ment, extra vulnerabilities emerge in the sys-


tem. If there is a security flaw in the hypervi-
sor that can be exploited by a guest instance,
this guest may be able to not only attack the
host, but also other guests running on that
host. This is not theoretical; attacks already ex-
ist on hypervisors. These attacks can extend
beyond the guest instance and could expose
other guests to attack.
sVirt is an effort to isolate guests and limit
their ability to launch further attacks if ex-
ploited. This is demonstrated in the follow-
ing image, where an attack can not break out
of the virtual machine and extend to another
host instance: [2]
You can find out more about SELinux,
by taking a sneek peek at it’s docs @ redhat:
http://docs.redhat.com/docs/en-US/Red_Hat_
Enterprise_Linux/6/html/Security-Enhanced_
Linux/index.html and here: http://docs.redhat.
com/docs/en-US/Red_Hat_Enterprise_Linux/6/
html/Security-Enhanced_Linux/sect-Security-En-
hanced_Linux-Further_Information-Other_Re-
sources.html.
Lucas do Amaral

[1] http://www.nsa.gov/research/selinux/background.shtml
[2] http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_
Linux/6/html/Security-Enhanced_Linux/chap-Security-En-
hanced_Linux-sVirt.html

Data Center 1/2011 9


Facilities

What’s missing from “best


practices” for Unix/Linux
Security that host Oracle database systems?

Some database administrators happily install a new Oracle database,


port the schemas and data across (with DataPump) and proceed
worry-free, unaware of the system’s potential threats and exploits.

T
hey follow the usual suggestions: keep command: “Grant DBA To Scott;” and wait for example, a DBA can shut off access after
up with patches for the operating sys- the one of the DBAs to login to the database number of invalid attempts to access a da-
tem and database vendors, use hard- on the Unix/Linux machine. In all Oracle da- tabase schema with an incorrect password.
to-gue ss passwords, maybe employ encryp- tabase versions, the glogin.sql and login.sql are Again, in Oracle 11g, the default profile
tion, but with a little work they could make run whenever you login to the database. permits an unlimited number of attempts
their system much more secure. DBAs should eliminate such opportuni- to login. However, one can create a profile
ties by revoking PUBLIC access to UTL_ to temporarily lock the account after 5 un-
Curtailing abundant database TCP, UTL_HTTP, UTL_SMTP, UTL_FILE, successful tries:
privileges DBMS_SQL packages. Only developers who
In Oracle 10g, the privilege to execute pow- really need them will request access to these CREATE PROFILE sec_profile LIMIT
erful packages that read/write across the net- packages. Note of caution: because APEX 3.0 FAILED_LOGIN_ATTEMPTS 5
work without having to drop to the command and 4.0 hold privileges to these packages as PASSWORD_LOCK_TIME 1/24 ;
line was in the hands of every user. For exam- well to make their web developers and appli-
ple, with execute privileges on the UTL_TCP cations happy, reviewing the web applications and keep them from logging in again (even
database package, one could commit all kinds before they go live is a great way to check for with the correct credentials for at least an
of mayhem with TCP/IP: grab a web-page, exploits. hour). To apply the policy to Pawel, just issue
manipulate its text, probe and download en- the following command:
tire websites, and generate spam – all under Pro-active steps
programmatic control and without the aid or Other preventive measures – some easy, ALTER USER PAWEL
knowledge of a database administrator. some not – can help bolster security. For PROFILE sec_profile ;
With Oracle 11gR2, the same execute privi-
leges on UTL_TCP, UTL_HTTP, UTL_SMTP,
are by default granted to the PUBLIC, in other
words to all database users. They won’t work,
however, unless a database administrator al-
lows the database to connect and resolve the
network access layers using the DBMS_NET-
WORK_ACL_ADMIN package, however an
individual can still download and install their
own Oracle database and as the SYS user be-
come the next Sir Spam-a-lot.

Great Scott!
Someone connecting as a demo user SCOTT
with the pre-installed password name TIGER
can take over the database using methods sim-
ilar to the Oracle Voyager worm in 2006. Be-
cause Scott has the CREATE DIRECTORY
system privilege, and access to the UTL_FILE
package is publicly provided, he could logical-
ly map a directory to the $ORACLE_HOME/
sqlplus/admin directory and replace the
glogin.sql script with one that contains a SQL

10 Data Center 1/2011


What’s missing from «best practices» for Unix

In addition to login and password controls, the user profile. Only TCP traffic is permitted. JDK 1.4.2, 1.3.1, Java 5
user’s session and resource usage constraints Other protocols, including TCPS aren’t sup- (latest available),
can be configured for a user profile. ported. Java 6 (latest available)

Restrict access via IP address Closer to Home then it might not cause any problem, but making
Via the Oracle Connection Manager (part of Restricting access by nodes can be configured a fresh install of Oracle 10g Internet Direc-
the Oracle Net services product), a systems in one of the database listener’s configura- tory, Oracle 10g Internet Management, Ora-
administrator can create a proxy server that tion files ($ORACLE_HOME/network/ad- cle 10g Grid Control may bring these prob-
screens traffic to a public database by apply- min/sqlnet.ora) and its TCP.VALIDNODE_ lems to light if the operating system has the
ing one or more rules to those requesting ac- CHECKING parameter. If set, then the TCP. latest patches and made the transition, while
cess. Depending upon the origin of the request EXCLUDED_NODES and TCP.INVITED_ the Oracle system has not (during the March
and the requested destination, database traffic NODES settings are used to screen out or only transition) or the other case where the Ora-
may be allowed, rejected, or connections sim- allow named nodes to communicate with the cle-based system has made the change, but
ply dropped by processing the directives in the database. the operating system is still in daylight sav-
Connection Manager’s RULE_LIST found in ings time in late October! Your alternatives
the $ORACLE_HOME/network/admin/ Is it Time Yet? are to patch everything or stay down. More
cman.ora file. Restricting access by time of day can be done information on this issue can be found at ht-
For example, in the following rule list, all with a logon trigger. If you knew that no-one tp://www.oracle.com/technetwork/java/javase/
of the clients in the ip address subnetwork could access the database except during day- timezones-137583.html.
206.2.4.* that request connections through the light hours, it might make you feel more se-
proxy server are accepted and allowed to pro- cure. If so, then this logon trigger should do Tracking who has modified
ceed to the main_db1 database server to reach the trick. compiled code via system triggers
the database service advertised as “orcl”. After making sure that the database initia-
A single connection, from ip address 1 CREATE OR REPLACE TRIGGER lization parameter _system_trig_enabled is
206.1.10.10 is allowed to connect to a service block_access_after_hours set to TRUE, a number of significant DDL
known as “cmon”. 2 AFTER LOGON ON DATABASE changes can be detected and prevented. That
3 DECLARE includes attempts to grant privileges, drop
CMAN1= 4 v_hour CHAR(2); or create a table, schema, alter (or recompile)
(CONFIGURATION= 5 BEGIN a stored code object. A the very least you
(ADDRESS=(PROTOCOL=tcp) 6 SELECT DISTINCT could log its occurrence and notify security
(HOST=proxysvr)(PORT=1521)) TO_CHAR(SYSDATE,’HH24’) personnel. You could easily prevent these
(RULE_LIST= INTO v_hour things from occurring when they’re not
(RULE=(SRC=206.2.4.*) 7 FROM sys.v_$session supposed to. The Puget Sound Oracle User
(DST=main_db1)(SRV=orcl)(ACT=accept) 8 WHERE audsid = USERENV(‘SESSIONID’) Group has published a great demo for track-
(ACTION_LIST=(AUT=on) 9 AND audsid <> 0 ing all kinds of system events. http://psoug.
(MCT=120)(MIT=30))) 11 IF v_hour > 22 or v_hour < 7 org/reference/ddl_trigger.html. A separate
(RULE=(SRC=206.1.10.10) 12 THEN trigger can be defined for each type of sys-
(DST=proxysvr)(SRV=cmon) 13 RAISE_APPLICATION_ERROR(-20099, tem event. The IP address, username, actual
(ACT=accept)))) ‘After hours connections not SQL being presented, and details you might
permitted here.’); expect in an audit trail are available for cap-
The connection manager can be placed in 14 END IF; ture. Your response could include expiring
a public zone, or a DMZ, while the database 15 END; and disabling accounts that seem to be un-
actually resides behind a firewall on another der attack while trying to catch the perpetra-
network or subnetwork. Keep it Private tor, yet stopping the elevation of privileges
Other parameters are set in the ACTION_ If you are controlling access to your data cent- or replacement of code.
LIST such as maximum connect time (MCT), er’s applications via an application server,
maximum idle time (MIT) that mimic the then using a combination of technologies Summary
such as single sign-on and LDAP to use on- Ways to protect the data center include re-
ly encrypted passwords can protect private moving public access to a few database pack-
login credentials. ages that allow powerful network access to
the database, expiring and locking accounts
Daylight Savings Time Issues such as SCOTT, creating and applying user
Sometimes you might think you have a denial profiles that lock automatically after succes-
of service attack going on, but it may turn out sive login failures, screening access to web ap-
to be an issue with the different software com- plications through proxy servers, employing
ponents in the stack having different notions LDAP and encryption to protect passwords
of what time it is. Even timezone environment from flowing being discovered, and subvert-
variables set at the operating system level don’t ing attacks with pro-active database triggers
alleviate trouble. Certain Oracle 10g products to prevent changes that don’t occur via the
released in the United States prior to the Oc- usual channels.
tober 2007 change over can have latent DST
problems. If you have the following software Steve Hodge
installed:

Data Center 1/2011 11


Security

Hackers Know!
Security Standards
Ensure Compliance…
Not the Safety of Your Data and Information

Most organizations today strive to keep up with the data and


information security standards within their own industry and as
regulated through areas such as HIPAA, SOX, and PCI DSS. Industries
have made progress toward secure environments by following many
of the core rules and values found within the various compliance
methodologies.

O
rganizations today are routinely When assessing the state of security in your 2. The standard practice of using network
successful in defending against organization, consider the following common and application scanner products to de-
rudimentary and most extended missteps many organizations make…you may tect known vulnerabilities may not be
threats. Newer threats that are more com- find you are in good company. enough to counter the innovative think-
plex are often escaping the accepted secu- ing of the hacker.
rity. Increasingly, these more advanced vul- 1. Infrastructure and network profession- While the use of scanner products to
nerabilities reside outside of the networks als are assigned to review and evaluate detect known vulnerabilities and threat
and instead reside in the software applica- the security of business applications. signatures is a valid and needed proc-
tions made to run your business as well as in Companies often use systems and net- ess, the process is akin to treating hack-
the systems that support them. Compliance, work administrators as their primary ers like your anti-virus protection. Vi-
regulation, and audit approaches keep infor- application protectors. Most often, these rus protection is meant to protect or-
mation inside your organization and out of security personnel have infrastructure ganizations from wide ranging attacks
the hands of hackers. While following these and network IT backgrounds. A more ro- that have already been created and that
standards can make you compliant and re- bust team may include application archi- are meant to spread from one organiza-
duce your chances of fines, the jury is still tects and engineers who have a deep un- tions system to another. While hackers
out whether or not these standards alone derstanding of the structure of systems may choose to attack multiple systems
keep your organization secure. and applications who could play a com- at the same time, their focus is often on
If we accept that being compliant is not plementary role within the team. Pro- particular systems within one organi-
the same as being secure, it may make you fessionals who architect/design applica- zation. Hackers often create unique at-
wonder if your organization’s current path tions have the best chance to build cre- tacks (often exploiting zero-day vulner-
is ending with insecure data, and you may ative exploits that matches the skills of abilities) with little visibility. Accord-
want to reconsider what you can do to in- top hackers. Those who have experience ing to the 2010 CSI report, these emerg-
crease data and information security. Orga- building secure applications and systems ing specific system threats are sophisti-
nizations can start by deconstructing many have dedicated considerable time to un- cated, multi-connected, and highly cus-
of the procedures and practices that are derstanding how one interacts with an tomized. Sophisticated hackers can use
aiding hackers to uncover additional vulne- application and what the application these attacks to rob you blind, and you
rabilities in their systems. user should expect from it. By default, will not even know it until your reputa-
This does not mean that your organization they have an innate sense of how to “get tion is tarnished.
has done anything wrong. It does mean around” or re-engineer an application to Many organizations use ethical hacking
that there may be opportunities in organi- make it do something it was not inher- and even penetration-testing processes
zations using the common “accepted solu- ently supposed to do. These same pro- as a best practice, but the name of the
tions” to increase their protection against fessionals can play an important adviso- approach alone does not coincide with
hackers. ry role and complement your team. secure practices. Even penetration test-

12 Data Center 1/2011


Hackers Know! Security Standards Ensure Compliance…

ers are often too script oriented and re- into the unknown. They will consid- ways a malicious intruder may try to get
strained from creative attacks. Much of er the demands of an application devel- to this vital information. Often, vulner-
the testing by these individuals relies opment team and the goals of a securi- abilities are overlooked in the password
primarily on pre-programmed scans. ty team; then, they will work with busi- reset option of an application, or even in
This tactic helps to keep Hackers suc- ness leaders to address areas they feel the way passwords are stored in compu-
cessful. Hackers know the signatures of may cause them financial and reputa- ter memory that can be scrapped by the
attacks that companies monitor and use tional harm. nightly cleaning crew. These attacks are
their ingenuity to reverse engineer appli- 4. Protecting data and information is avoidable as long as there is a dedicated
cations at a level similar to those who de- more often about guarding the gates focus on evaluating their existence.
veloped them. When a hacker has access than protecting a secret recipe. 6. Wiki Leaks was not a hack and not re-
to a system, the hacker may be more fa- There is a certain famous fast-food res- lated to my organization or me.
miliar with the structure of the system taurant that has discovered financial Most individuals in the security space
than the security team who is trying to gold in their chicken’s secret recipe. know that a significant portion of at-
defend it. That recipe is the key to the company’s tacks originate from inside knowledge.
Another issue with the reliance on scan- reputation and possibly the single repre- Anyone that knows about Wiki Leaks
ning methodologies performed by those sentation of their biggest risk for finan- understands this…and it can happen to
who have not built applications is the cial loss if exposed. Now, think of se- anyone. Employee attacks are still hacks,
gap in understanding what makes a typ- curity like an onion, and that organiza- and organizations should reconsider
ically safe technology not as safe. A scan tion’s secret recipe is in the middle. Like the type and level of access they give to
review may look at components and the fast-food restaurant’s need to pro- their employees. For example, need to
deem them to be secure, updated at cur- tect its core recipe, data and informa- have read/write privileges. It may make
rent patch levels, and free of know vul- tion security should be about looking sense to prevent copying to a CD or
nerabilities. The use of safe technolo- beyond the onion peel and focusing on zip drive. Or you may consider disabling
gies may not cause an organization con- the risks at the heart of your business. write capabilities while certain files are
cern, but the organization may be more It is easier to secure confidential data running or disabling USB drives when
concerned about vulnerabilities that re- and information when business units certain applications are open. There are
sult from the integration of those tech- identify what is important and what is some great new ways in the market to
nologies. Professionals who architect/de- not. Too many times, companies spread share files and give privileges where the
sign applications have the best chance to their resources too thin by trying to pro- user cannot copy, edit, save, or print
build their own creative exploits. These tect all data as critical, while the appli- screen the documents. Consider them all
same professionals play an important cation or security departments are po- and make the best decision for your
advisory role and complement to your tentially unaware that a compromise business.
team. Again, a complementary team of your “secret recipe” would cause tre-
who can build their own attacks, un- mendous reputational and financial Audits, compliance, and regulations are nec-
derstand source code, work at all archi- harm. The most secure organizations fo- essary truths to doing business. At the same
tectural levels and components there- cus not only on guarding the gates, but time, it is critical to understand that these
in (video memory and kernel program- also on protecting the secret recipe at efforts alone may not lead to secure data and
ming, et al) can find all sorts of com- the deepest layers. Security and Appli- information. The most secure organizations
promises that a standard scan approach cation development departments that leverage complementary teams with a back-
may never uncover. work with business units tend to know ground in building the systems that are be-
3. The goals of the core application devel- their secret recipes. Your best bet? Hire ing breached, who can apply that knowledge
opment team do not often align with a team to “steal” your secret recipe. If to defeat malicious intruders. These teams
the goals of the security team…or those they can “steal” it, they can tell you how help bridge and align internal business unit
of a Hacker. to remediate based of what is best for goals with the priorities of the business lead-
Typical Application Development team your security. ers. Ultimately, companies need to under-
goals include on-time product delivery 5. Password and log on information is im- stand what it is they are most trying to pro-
and on-budget product delivery that ex- portant, but the company should focus tect and put their resources where they are
ceed expectations. Security team goals more on the sophisticated hack. needed most.
include securing company confidential Focus on protection from sophisticat- Today, companies need to balance the tra-
information and meeting compliance ed attacks is a common theme when dition of prioritizing regulations, audits,
guidelines. All the while, Hackers want it comes to security. As a result, many and compliance aspects of security with the
to inflict financial harm and reputation- companies build intricate ways to iden- need to evaluate best practices…bridging
al loss and achieve financial gain. tify legal and illegal access to their back- the gap between maintaining compliance
While these goals may seem diverse end system. But if a hacker obtains cre- and avoiding fines and creating a dedicated
and unaligned, they can come togeth- dentials of an application user, how long focus to keeping malicious Intruders away
er to meet the needs of the business. To would it take before you knew that from your most sensitive digital assets.
align these diverse goals, start with the person was not who they say they are? While you are reading this article, hackers
unknown…the Hacker… and work back- Hackers that access your password and may be working on how to get around your
wards. Consider a team who can per- logon information do not need any addi- standards, checklists, and core methodolo-
form the hacker role and bridge your tional elaborate or sophisticated attacks. gies. Isn’t it time to get to work?
team goals. The complementary team They’re in!
should understand systems and appli- Organizations should focus on not on- David Kane
cations and will look beyond the known ly password strength, but also all of the CO-CEO Ethical Intruder

Data Center 1/2011 13


Cloud Computing

CLOUD COMPUTING
ARCHITECTURE
Above them we have users trying to use these
WHAT YOU WILL LEARN WHAT YOU SHOULD KOW things and get them done. In front we have a
whole host of company’s trying to help them
• Ephemeral & persistent clouds • Application architecture do that. These company’s however have a de-
• State migration • Server hardware fined set of viewpoints and biases that you
• High frequency,low latency • Basic cloud need to be very aware of.
• Server motion • Basic enterprise architecture On the ground working each and every day
• Hypervisor vs. operating system • Basic internetworking are these companies with there internal beliefs
and biases.
Customers end up being assaulted by these
INTRODUCTION makes no difference because what most busi- service providers and their automation pro-
Clouds are very popular these days. It seems nesses want to do is solve a problem and they vider rhetoric. The service providers see eve-
like everyone has a cloud and we’re not just will use the simplest tool . rything from down below and everything they
talking about the ones for sale from the ven- see is about making the physical virtual.
dors (Amazon, Microsoft, Google, Salesforce, CLOUD & CLOUD RISKS Automation providers see things from
etc.). Everyone has his own cloud. The con- How the enterprise is thinking about using above. They sit above multiple clouds and
stant that I’m seeing in the industry is that pri- the cloud? Today it exists as a simple three they see a “smooth landscape of innovation”
vate enterprises and governments have their part model. and sometimes they don’t take into account all
own clouds and all of these clouds are not in- On the basis of the above graphic is the world the dirty mess that it takes to get to get to that
teroperable. of physical infrastructure. Above that is the en- level of abstraction.
terprise IT or collocation providers (ISP’s, ASP’s, A common complaint from people using
INTEROPERABILITY MSP’s, etc.) These are the people that have all the Amazon cloud service goes like this: “We
One cloud will not work with another cloud. the server rack and stack experience. Above had an EC2 instance that we’ve been using for
In addition, everyone has an API. You can talk that we have Citrix on the desktop, VMware a few months to do some development, and for
to any vendor you choose and the conversation on the server side, and now increasingly Ama- some reason the instance is no lover available
will quickly turn to that vendor’s API This zon. These are the organizations that have made on AWS. We had to shut it down yesterday be-
works well if you only need to deal with one all the money (in the middle layer) “marking the cause we were no longer able to access it, and
vendor and that vendors API is open and well physical virtual” so far. Now the battle is making we were planning to follow up on this today,
documented but as we all know that’s not al- it easier to own and operate. but we logged in an hour ago, and the instance
ways the case.

QUESTIONS TO THINK ABOUT

• What happens if I need to consume mul-


tiple clouds?
• Do I need to track the evolution?
• Do I need to track the way that these
API’s evolve over time?

TIP
The Delta Cloud Project is an abstraction layer
that exists above API’s and since everyone has
an angle and an API, the Delta Cloud project
is gaining momentum.

SOLUTION LOCK IN
This is a difficult problem to solve and it exists
because enterprises are far too willing to lock
themselves into a solution or a given course
of action. We keep seeing this over and over
again. In my view, this increases overall risk
even though in the grand scheme of things it

14 Data Center 1/2011


CLOUD COMPUTING ARCHITECTURE

was no longer there. How can we recover from • “You should make something that moves type of cpu and sub cpu to exactly the
this?” Well, it’s an instant store cloud that’s that data really fast somewhere else” and same type somewhere else
part and parcel of this kind of approach. “The problem with the cloud is you have
Another common complaint is “we had a to manage where your data is.” Nothing You’re going to need to know everything about
spot instance for the last couple of months new here. We have been dealing with all the physical infrastructure. A complete under-
setup for testing and we’re in the middle of these issues for a very long time. The most standing of the physical infrastructure will
moving data off the server and late today it common request I get is for me (or a ven- need a key virtualization strategy. In the wild, I
disappeared.” Well, here we see that the spot dor) to “make something” that can move see that this initiative is frequently overlooked,
price got hit. After all you’re using a pricing the data out of the cloud really fast, like and like “state”, it’s ignored.
mechanism in the Amazon system that says 100x faster, and this is where you get in-
they can shut your instance down if your price to the realm of Physics. You just have to CLOUD ARCHITECTURE:
gets hit. manage where your data is. SERVER MOTION = COPYING
This is a critical cloud architectural concept.
EPHEMERAL CLOUDS & PERSISTENT CLOUD ARCHITECTURE: STATE All server motion is the process of copying
CLOUDS When it comes to cloud architecture, “state” is something somewhere. The metaphor of
Then there are “persistent clouds” where you the big problem; however this is not unique to “moving” is what gets people confused because
bring up an image, save it, and it’s always there cloud computing so if you embark on a cloud they say “oh, they moved it” and you point to
(in the cloud) effectively on the cloud hard strategy, and you expect the cloud to magically other strategies, wait, that’s not really fair, you
drive until you delete it. solve your state problem, then you’re putting kind of copied it.
There are also “ephemeral clouds” and Ama- the emphasis in the wrong place. There are With the types of stateless architectures we
zon behaves as both. This is causing problems thousands of vendors who get up every day have today (remember the state of those state-
on both ends of the spectrum. Ephemeral im- and work to solve specific state problems, for less Apache web servers? A few weeks ago
ages disappear (leading to confusion) and the specific architectures, for specific verticals. those could have been copied to another cloud.
persistent ones are being treated as low cost State is the problem and it’s not unique to The state of those stateless JBoss servers? Well
blade servers. cloud computing. So for someone that worries those could have been to another cloud two
Customers will have Apache Server 1, about milliseconds of latency like a high fre- weeks earlier as well.) You can look at other
Apache Server 2, Apache Server 3 - all saved quency, low latency, trading network capabil- techniques that look more like a stateless serv-
on the virtual cloud hard drives at a hosting ity for trading center- thinking about millisec- er motion. These techniques won’t require
provider and now a few months later, Apache onds of state motion between two locations short network distances, can be cross cloud,
server 2 is not the same as Apache server 1. is something they have been thinking about and you still get the same capability.
This occurs because they have moved a server it forever and they will continue to do so. It’s Look beyond the simple capabilities. Re-
blade procurement/operational model to the something you’ve been managing forever and member your point of view: cloud users point
cloud and *not* a development/operational it’s something you are going to need to con- of view vs. service provider’s point of view.
model to the cloud. tinue to manage. How are you doing to do mobility vs. how they
are going to do mobility?
TIP CLOUD ARCHITECTRE:
Move development/operations based models SERVER MOTION TECHNOLOGY CLOUD ARCHITECTURE:
to the cloud and not blade based models. Welcome to vMotion, XenMotion and the HYPERVISOR vs. THE OPERATING
world of server motion technology. SYSTEM
DATABASE & STATE MIGRATION When it comes to marketing hype, the people
Large enterprises are quickly discovering that FACT behind the “you don’t need a server operating
if you put a lot in, it’s increasingly more dif- All the big vendors have some form of mo- system anymore” win the prize for creative
ficult to get it out and they blame the cloud tion. writing. If you do infrastructure or you’ve set
architecture. The principle behind server motion tech- up private cloud before then you’ve heard all
nology is that If my physical server is about to this before “You only need a ‘thin layer of soft-
DATABASE & STATE MIGRATION: fail, I now have the ability to move the serv- ware’ we call a ‘hypervisor’ [sometimes called
BLAME THE CLOUD er’s load somewhere else. This sounds simple a VMM virtual machine monitor]” This is
This is one of those unique things about the and very interesting however when you talk effectively something like a Linux Kernel or
cloud. The cloud gets blamed for things we’ve to the people that use it every day, you see a a Linux Distro or something very close to it
been dealing with forever and sometimes peo- set of interesting use cases and these use cases except your just buying it from your virtuali-
ple think that operations folks come with the are pretty reduced compared to what you will zation vendor.
cloud to handle all the system administration find from the vendors.
work and they don’t. TRIVIA
Let’s think about the following real world CLOUD ARCHITECTURE: The term “hypervisor” is not new. It was first
statements: KEY MOTION DESIGN used in 1965 to refer to software that shipped
CONSIDERATIONS with an IBM RPQ for the IBM 360/65.
• “Did you know, if you have 1TB of data in Well at this point, Mr. Hypervisor custom-
EC2, you can’t get it out in 30 seconds?”- • Network distances need to be very small er is on the phone and he would like to have
Of course not! If I have 1TB of data in my • Links should be at least 10GB per second a word with Mr. Operating system and he’s
Downtown, NY (proprietary/private/ • Create a specialized network just for the a little upset. The reason he’s upset is that all
blade datacenter) I can’t get that out in 30 act of moving the server current Linux operating systems can run vir-
seconds either. • Shared SAN between the devices tual machines (complements of KVM and of
• Moves must occur from exactly the same course Windows Server can run virtual ma-

Data Center 1/2011 15


Cloud Computing

chines as well) so from a marketplace point of You could blow away 3 of the apache servers, 3 be some opportunity for redo just not massive
view, the two dominant marketplace operating of the web logic servers, and part of the oracle redo.
system families can all run virtual machines cluster and this thing still runs. You need to build your plan around the
and we have a lot of system administrators That means that in terms of operational reuse of people and their skills. Again, in the
who know how to handle operating systems.. windows, you can bring down any of these world of system administration and operations
We have a lot of well established infrastruc- servers and your load balancers and proxy serv- (2+ million people) do you think they like the
ture in development infrastructure/operation- ers will deal with it. You only have to worry sense of infinite risk, change, and pain? No.
al infrastructure for installing operating sys- about state. At the end of the day, this type of However that’s how it’s going to be perceived
tems so the question of how much do you need loosely coupled architecture works really well when you say you have to redo everything. Do
a “specialized mechanism” is going to be an in- in the cloud if you don’t have to drag your en- those people know how to do Bash scripts?
teresting part of the battle moving forward. tire datacenter with it. So if you can move this Can they learn a new scripting language? Sure.
type of infrastructure to the cloud and treat Do they know config files, do they know client
CLUD ARCHITECTURE: that could deployment as a subnet of your VPN’s, Lan-To-Lan VPN’s? Yes. The monitor-
DOING NOTHING datacenter network you will be successful be- ing tools that you use? Your network security?
Please don’t underestimate the power of doing cause now you don’t have to move: Yes. All of that should be brought to bear end
nothing. Just going along and listening to all reused where possible.
the things from the various providers and not • DAP In general, renovation is the watchword in-
committing. Re-architect everything for the • Single sign-on stead of revolution, unless you’re one of these
clouds? We’re not in that place yet- and here is • License manager new businesses that’s “antiprise” (anti-enter-
why. So the myth is “of course as you look at it • Media repository prise). A company who’s born in the cloud,
from above, wouldn’t it be grand if you could • Installer, etc. your entire staff is in the cloud, you effective-
redo everything.” but how many enterprises ly have no infrastructure in place, then for you
“redo everything”? Not many. Now all of a sudden the cost of renovation, of this is an opportunity for company’s of that elk
using a cloud deployment for this type of ar- to take the lead and take the floor- I wouldn’t
CLOUD ARCHITECTURE: chitecture, is very low. You have already done a recommend it for the average enterprise.
RE-ARCHITECTING lot of the re-architecting over the last 10 years. What’s generally happening around us
Re-Architecting for the clouds? When you Keep that in mind as you move to this type of now, again, from an enterprise specific point
talk about risk of failure x the outcome x the architecture. of view is just the beginning of the long slow
threat, etc. how often do you want to launch migration of the traditional enterprise to ag-
projects where you redo everything? It’s just CLOUD ARCHITECTURE: TOOLS ile infrastructure; whether public, private or
not a fun thing to do and to the degree that Myth- “You absolutely need new monitoring hybrid cloud. The industry is on board with
you need to redo everything, you’ve already tools.” Not always the case. If you have net- large amounts of capital and some very smart
been doing it over the last 10 years. Enterprise work extent to your cloud servers, then why people are working on this endeavor:you can
architecture has slowly evolved to cloud ready can’t you continue to monitor them with the benefit from this momentum.
application architecture. existing mechanisms? You can. We can go into
more detail in subsequent articles but in es-
SAMPLE APPLICATION sence you’re dealing with the same amount of RESOURCES
ARCHITECTURE & REDUNDANCY: latency. So if you currently use Tivoli for that
And to the degree that you need to redo every- application I would say that you’re doing some- • The Delta Cloud Project
thing, you already did (over the last 10 years) thing wrong if you don’t continue to use Tivoli http://www.deltacloud.org.
• GoGrid http://www.gogrid.com.
the evolution of the enterprise cloud ready ar- for that application (or Nagios, or Microsoft • Amazon Elastic Compute Cloud
chitecture has already arrived. Let’s take a look Operations center, etc.) (Amazon EC2) http://aws.amazon.com/ec2.
at a plain old application that consists of: • Microsoft Cloud Services http://www.Mi-
SUMMARY crosoft.com/Cloud.
• APACHE (5 servers) Your enterprise internal view is really driven • NIST - National Institute of Standards
and Technology http://www.nist.gov/
• WEBLOGIC (6 servers) <-LINK TO-> by your idiosyncratic history. That being said
index.html.
ABC CORP. EMS (6 servers) — please don’t feel like you shouldn’t rethink a • Book - The Challenge of the computer
• ORACLE DB (4 servers) few things because you should and there will utility by Douglas Parkhill.
• Book - The Mythical Man-Month: Essays
on Software Engineering by Fred Brooks.
• InterviewTomorrow. Net - Helping
America get to work. Free access to the
2011 executive recruiter database.

ABOUT THE AUTHOR


Richard C. Batka is a business & technology execu-
tive who is based in New York. Mr. Batka has wor-
ked for global leaders such as Microsoft, Pricewa-
terhouseCoopers, Symantec, Thomson Reuters,
and JPMorgan Chase. A graduate of New York
University he can be reached at rbusa1@gmail.
com of followed on Twitter at http://twitter.com/
RichardBatka.

16 Data Center 1/2011


CLOUD COMPUTING ARCHITECTURE

CLOUD COMPUTING
ECONOMY
A BRIEF TIMELINE OF CRM
WHAT YOU WILL LEARN WHAT YOU SHOULD KNOW
• EARLY 1980’s: Innovation of CRM
• Economical issues surrounding cloud • Basic cloud architecture & billing • MID 1980’s: Custom built systems and
computing • CapEx & OpEx terms database driven marketing
• Basic project management • EARLY 1990’s: Product development and
maturity
• TODAY: Utility services of salesforce.com

INTRODUCTION called The Challenge of The Computer Utility Business activities (including cloud) can be
Before we design the cloud and secure it, we by Douglas Parkhill where he predicted that mapped to the following lifecycle which starts
need to ask two questions. future computer resources will be provided with innovation and ends with utility:
just like electricity through large providers.
• What are we buying? Further, these large utilities will have the fol- • Innovation
• How much will this cost? lowing characteristics: • Custom Built
• Product
These days when I look at what the smart peo- • Online • Commodity
ple are doing, my client budget allocations for • Elastic (as needed) • Utility Services
next year, and listen to ‘vetted’ edicts from top • Charged on a utility basis
executives, architects, and engineers-- they say • Cover multiple deployment models (pri- You will notice that this also applies to other
the same thing: “Our top priority is Cloud.” vate, public, community, and government types of resources like Electricity for example.
which is quickly followed by “and Security.” utilities)
• Include everything from hardware to ap- ELECTRICITY
WHAT IS CLOUD COMPUTING plications
One definition from the Network National • Innovation of Walliston
Institute of Science & Technology (NIST) in IS THE CLOUD SOMETHING OLD PRE- • Early products like Hippolyte Pixii (1808
a nutshell says that cloud is still an evolving SENTED AS SOMETHING NEW? –1835)*
paradigm. To answer this question we need to take a look • Introduction of the first utility grids
at changes in business activities. We need to • Formation of the national Grid.
CLOUD: THE EVOLVING PARADYME? compare Ubiquity (how commonplace a busi- [*Hippolyte Pixii was an instrument mak-
Steve Ballmer’s recent comments on cloud: ness activity is) to Certainty (the certainty of er in France. He built one of the first al-
“The real thing to do today is to capture, what the activity and how well defined and under- ternating current electric generators.]
are the dimensions of the thing that literal- stood it is).
ly, I will tell you, we’re betting our company Plotting Ubiquity on the Y-axis and Certainty ALL OF THE FOLLOWING BUSINESS ACTIVI-
[Microsoft] on, and I think pretty much eve- on the X-axis. TIES ARE EVOLVING ALONG THE S CURVE
rybody in the technology industry is betting Importing data in the form of product matu-
their companies on.” Translation? Cloud is an rity) we will see an S curve relationship exists • Electricity
evolving paradigm and Microsoft is invested. between ubiquity and certainty. • CRM
In my view Mr. Ballmer is an extremely intel- • HR Systems
ligent chief executive and when he says he • Infrastructure
wants to look at “the dimensions,” competi- • Search
tors should run for the hills because any keen
observer will recognize the classic Microsoft ALL are moving along the curve and becoming
strategy in play here-- to take a few market per- commoditized.
centage points per year, year after year until
they own the market. COMMODITIZATION
Why does commoditization occur? Any busi-
FAVORITE QUOTE nessman will tell you that business is a nothing
My favorite cloud quote. “…open up exciting more than warfare and as soon as one company
new prospects for the employment of com- gains some form of technological advantage,
puters in ways and on a scale that would have We see a pathway between a rarely understood then all its competitors will follow suit. This
seemed pure fantasy only five years ago.” The innovation over time as it becomes common ultimately creates a constant demand for any-
problem with this quote is that it was written and ultimately a well defined commodity. thing that is useful but it also creates a compe-
in 1966 and comes from a landmark book A great example of this is CRM. tition to support all of this new stuff.

Data Center 1/2011 17


Cloud Computing

FACT • Time to procure and install 64 Node cessive toner and paper consumption. Reality
Introduces something new, somebody else Cluster 2,166/Hours is consumption of toner and paper increased.
will come up with a better version.
There is a constant drive for improvement DEPLOYMENT TIME AFTER SOME PEOPLE DONT LIKE CLOUDS
(supply competition). These two forces IMPLEMENTING PUBLIC AND Not everyone is happy about cloud technol-
(ubiquity) and (certainty) drive the process of PRIVATE CLOUD ogy because the cloud is highly disruptive to
commoditization. Information Technology software vendor income. The big product ven-
is a huge group of activities that were once in- • Time to install a New Server 7 Min dors who have not yet enabled their applica-
novations, but more recently have evolved in- • Time to install a 64 Node Cluster 15 Min tion architectures to transition into cloud op-
to products (with feature differentiation),so erations will experience the greatest level of
ubiquitous, so wide spread, and they have As we can see, the cloud promises us so much discomfort. These vendors are hooked on the
now migrated up the curve--, becoming power and agility but with great power comes big financial boost quarterly numbers get from
suitable for utility service provision—and great confusion. The ability to create and de- selling licenses and the inherent (constant) up-
that is the answer to our question: “What stroy such large infrastructures at will, across grade cycle.
is cloud?” multiple providers will create its own prob-
lems. We’re going to see questions such as SUMMARY
SO ANSWER THE QUESTION: “Where did I leave that 200 Node cluster” Take time to evaluate your current CapEx and
WHAT IS CLOUD? OpEx costs. Understand your OpEx budg-
Answer: Cloud is the ultimate end state of a COST etary discretion (flexibility). Evaluate your
finite set of business activities With the increased agility that we get from go- OpEx cost vs. cloud vendor projected utility
These business activities are products that have ing into the cloud we are also the recipients of cost (at current demand/load levels).
migrated to utility services, spanning across massive efficiency and economies of scale but Request a detailed walkthrough of the cloud
the computing stack, and are composed of ap- don’t confuse this with saving money. The cur- vendor datacenter(s) with your key operation-
plication, platform, and infrastructure. This is rent prevailing industry view is that although al folks and get a feel for how efficient (oper-
no different from what happened in the elec- you save on upfront CapEx cost, you may not ationally speaking) the cloud operations is.
tric industry and why we often use the anal- save that much and might actually pay more in Forecast your future demand (quarter/year).
ogy and why Douglas Parkhill’s predictions of OpEx cost. If the CapEx cost was small, or in When you go to the cloud, make sure you
1966 are so timely even today. organizations that have more OpEx flexibility, adapt your existing project management
going to the cloud may not pay off. methodologies and other internal systems to
WHY MOVE TO THE CLOUD Potential savings will be focused around the include toll gate/metered check points where
Why is the cloud happening today and more efficiency of an organizations current data- you can detect slight increases in demand/re-
importantly why didn’t it happen back in center operations vs. that of a cloud provider’s quests/load as this will have a very real impact
1966? We needed a number of elements to datacenter operations. The belief is that the on your cloud computing costs.
be in place before widespread cloud comput- operations of a cloud provider will be more ef-
ing adoption could occur. ficient because they spend all day just thinking
about cloud. RESOURCES
• [OK] The concept-- We’ve have had it for
40 years IT GETS DEEPER: COST CONTINUED • The Delta Cloud Project http://www.delta-
• [OK] The suitability of activities at a volume When we look at human behavior regard- cloud.org.
level suitable to support the utility provid- ing the consumption of resources (like cloud • GoGrid http://www.gogrid.com.
ers-- We’ve had it for the last 10 years for example) the increased efficiency and in- • Amazon Elastic Compute Cloud (Ama-
• [OK] The technology to achieve this-- creased agility given to you by going to the zon EC2) http://aws.amazon.com/ec2.
We’ve had that for the last 20 years cloud is most likely going to result in addi- • Microsoft Cloud Services http://www.Mi-
• [LOADING…] A change in business atti- tional consumption of cloud. crosoft.com/Cloud.
tude and a willingness to adopt these new • NIST - National Institute of Standards and
models – Please hit any key to continue JEVONS PARADOX Technology http://www.nist.gov/index.html.
– A change in business attitude is the criti- William Stanley Jevons best known for Jevons • Book - The Challenge of the computer
cal part which has only recently occurred. Paradox states that technological progress that utility by Douglas Parkhill.
increases the efficiency with which a resource • Book - The Mythical Man-Month: Essays
INCREASED AGILITY is used, tends to increase the rate of consump- on Software Engineering by Fred Brooks.
The commoditization of any activity offers tion of that resource. • InterviewTomorrow.Net - Helping Amer-
a promise of increased agility through the use Jevons was talking about steam engine man- ica get to work. Free access to the 2011 ex-
of standardized components. We have seen ufacturing and by making steam engines more ecutive recruiter database.‑
this in many industries and cloud computing efficient they believed they would use less coal.
is no different. Let’s take a look at a sample This turned out not to be the case, they just ABOUT THE AUTHOR
server and node cluster core deployment be- found new uses for steam engines. Cloud tech- Richard C. Batka is a business & technology ex-
fore and after the cloud in a Fortune 500 large nology is unlikely to save you money because ecutive who is based in New York. Mr. Batka has
scale enterprise environment. you will just end up doing more stuff. worked for global leaders such as Microsoft, Price-
waterhouseCoopers, Symantec, Thomson Reuters,
DEPLOYMENT TIME BEFORE CLOUD LASER PRINTERS and JPMorgan Chase. A graduate of New York
Remember when “efficient” printers were in- University he can be reached at rbusa1@gmail.
• Time to procure and install New Server troduced to the market? Manufactures touted com of followed on Twitter at http://twitter.com/
1,200/Hours more efficient printing as the solution to ex- RichardBatka.

18 Data Center 1/2011

Potrebbero piacerti anche