What is it with cloud computing? Engage VM, disengage brain?

Nine bits of advice from our man Trevor

Remote control for virtualized desktops

Sysadmin blog The implosion of source-code hosting biz Code Spaces should have rung plenty of alarm bells.

A company with a loyal following and a bright-looking future suddenly disappeared, never to be seen again. What's worse, for the past several years a significant chunk of the IT community has been warning about exactly the sorts of issues that ultimately resulted in Code Spaces' failure.

I feel sorry for the real human beings affected by this incident; jobs lost, years of work evaporated.

Unfortunately, that's not all I feel. I also feel something almost, but not quite, entirely unlike schadenfreude. When I heard the news, the dark uncharitable part of my soul wanted to climb atop the tallest tower and bellow: "I told you so!" A release of years of pent up tension and frustration at watching company after company swallow cloud vendor marketing tripe hook, line and sinker.

A lot of people told the world so. Nobody listened.

Herd immunity

Just because your workload is in the public cloud doesn't mean you can stop worrying about it. In fact, you need to worry more. When you ran your workload on your own premises, you were part of a great big blob of stuff behind a load of IP addresses.

Will this IP hide a multimillion-dollar corporation, or will it hide a home business that sells knit sweaters and makes a few grand a year? What will the security look like? What services could be running there? Is it a researcher's honeypot, or the real deal?

There was some security to be had in that obscurity. If enough zebras run together then they all look the same. Predators must rely on attacking the weak and the infirm because they just can't get a lock on those who are able to keep up with the herd.

To contrast, cloud providers are great big fat targets. They run a lot of workloads that are very alike. They use common security applications and procedures and – most critically – they can all be accessed through a limited number of management interfaces.

Do you remember how Microsoft Windows became the target for every nefarious ass on the planet simply because it was used by everyone else on the planet? This is replaying right now, but with the big three public cloud providers playing the role of planetary target practice.

The cloud is not a free pass to disable your brain

Public cloud computing is marketed as a free pass to disable your brain, but that's a blatant lie. I don't care what your company does in the cloud, you still need a proper systems administrator – an IT operations specialist – to keep it all in line.

Most importantly you need to actually listen to that operations nerd and understand that just because the nice cloudy marketing advert says you don't need things like "backups" or "monitoring" or "security" doesn't mean it's true.

There are some basics that apply, regardless of whether you are using the public cloud, on premises equipment or have a hybrid approach. Here's what you need to know:

Intelligent flash storage arrays

More from The Register

next story
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Trio of XSS turns attackers into admins
prev story


Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.