0% found this document useful (0 votes)
95 views15 pages

Running Head: CLOUD FIREWALL 1 Cloud Firewall Author Names University

The document discusses cloud firewalls, including their types and benefits. There are two main types of cloud firewalls: SaaS firewalls and next-generation firewalls. SaaS firewalls are intended to protect an organization's network and users, running software in the cloud. Next-generation firewalls provide more advanced threat prevention and user control capabilities compared to traditional firewalls. Cloud firewalls offer benefits like flexibility, availability, and extensibility over traditional on-premise firewalls, as they can automatically scale based on network usage and provide near constant uptime.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views15 pages

Running Head: CLOUD FIREWALL 1 Cloud Firewall Author Names University

The document discusses cloud firewalls, including their types and benefits. There are two main types of cloud firewalls: SaaS firewalls and next-generation firewalls. SaaS firewalls are intended to protect an organization's network and users, running software in the cloud. Next-generation firewalls provide more advanced threat prevention and user control capabilities compared to traditional firewalls. Cloud firewalls offer benefits like flexibility, availability, and extensibility over traditional on-premise firewalls, as they can automatically scale based on network usage and provide near constant uptime.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Running head: CLOUD FIREWALL 1

Cloud Firewall

Author Names

University
CLOUD FIREWALL 2

Table of Contents

Cloud Firewall.................................................................................................................................3

Cloud Firewall benefits................................................................................................................5

Cloud Firewall types....................................................................................................................6

SaaS Firewalls.........................................................................................................................6

Advantages and disadvantages of using SaaS...................................................................7

Next Generation Firewalls.......................................................................................................8

Main benefit of a Next-generation firewall.....................................................................10

How does Next-Generation Firewalls implement User Control?....................................10

How do Next-Generation Firewalls enforce Threat Prevention?....................................11

Difference between a cloud firewall and a next-generation firewall (NGFW).........................11

Network perimeter.....................................................................................................................12

Does cloud computing affect the network perimeter?...............................................................12

Do cloud-based firewalls fit into a SASE framework?..............................................................13

Cloud Firewall Risks.................................................................................................................13

Importance of Cloud Firewalls..................................................................................................14

References......................................................................................................................................15
CLOUD FIREWALL 3

Cloud Firewall

What is Cloud? The cloud alludes to servers that are gotten to over the Internet, and the

product and databases that is working on those servers. Cloud servers are situated in data centers

everywhere on world. By utilizing distributed computing, clients and organizations don't have to

oversee physical servers themselves or run programming applications on their own machines.

The cloud empowers clients to induce to similar documents and applications from practically any

gadget. This is the reason why clients can sign into their Facebook account on another phone

after their old phone breaks and still locate their old record set up. The cloud resembles a manage

an account with dissipated assets, yet rather than cash, the cloud stores information and

computational force.

What is a Firewall? A firewall is a security item that channels out malignant traffic.

Customarily, firewalls have run in the middle of a confided in network and an untrusted network.

Model between a private organization and the Internet. Early firewalls were physical

apparatuses that associated with an association's on-premises framework. Firewalls hinder and
CLOUD FIREWALL 4

permit network traffic as per an inward arrangement of rules. A few firewalls permit heads to

redo these principles.

Since we already know what is Cloud and Firewall now let’s discuss about Cloud

Firewall. Cloud Firewalls are software-based, cloud deployed network devices, built to stop or

mitigate unwanted access to private networks. As a new technology, they are designed for

modern business needs, and sit within online application environments. Cloud firewalls block

cyber-attacks directed at these cloud assets. As the name implies, a cloud firewall is a firewall

that is hosted in the cloud. Cloud-based firewalls form a virtual barrier around cloud platforms,

infrastructure, and applications, just as traditional firewalls form a barrier around an

organization's internal network. Deploying a cloud firewall is like replacing a bank's local

security cameras and a physical security guard with a global 24/7 security center that has a

centralized staff and security camera feeds from all the places where a bank's assets are stored.
CLOUD FIREWALL 5

Cloud Firewall benefits

Most importantly, cloud-based firewalls are significantly more secluded than ordinary

firewalls. They’re intended to deal with all various type’s interchanges. For instance, on the off

chance that you need to coordinate client traffic through a firewall, a cloud-based firewall can do

that. On the off chance that you need something that can shield you from assaults, it can do that,

as well. The firewall can scale to your request; state what you need from it, and it’ll do it.

Since sending is a lot more straightforward, associations can change the size of their

security arrangement without the disappointments inborn with on location establishment, support

and updating. As transfer speed builds, cloud firewalls can consequently change in accordance

with look after equality. For instance, distributed denial-of-service (DDoS) assaults can be

moderated without stressing over transmission capacity limits. What makes a cloud-put together

firewall unique about a concerning preface firewall (other than being off-premise) boils down to

three things: adaptability, accessibility, and extensibility. Versatility: Cloud-based firewall

suppliers convey administrations to different clients, and at the center of their administration,

they use firewalls intended to scale to satisfy an ever-expanding need. From the endeavor

viewpoint, this adaptability becomes possibly the most important factor when data transmission

increments. Dissimilar to an on-premise firewall that needs substitution when transfer speed

surpasses firewall throughput, cloud-based firewalls are intended to scale as client data

transmission increments—or possibly any equipment redesign must be made straightforward to

clients. Accessibility: Cloud-based firewall suppliers offer very high accessibility (> 99.99%)

through a framework with completely repetitive force, HVAC, and organization administrations,

just as reinforcement systems in case of a site disappointment. Conversely, on-premise firewalls

are just as dependable as the current IT foundation, which may not be an issue at the data center;
CLOUD FIREWALL 6

however, it could be at the branch. High accessibility is unquestionably conceivable, yet relying

upon the producer, high-accessibility can twofold the equipment's expense and make activities

more mind-boggling. Extensibility: Cloud-based firewalls are accessible anyplace the

organization administrator can give an ensured correspondence way. Given interconnection

arrangements between network suppliers, the impression of administration may broaden well

past the limits of any single specialist co-op's organization. An on-premise firewall then again

might be conveyed at any corporate area, with the related capital cost (higher for excess)— if

there are sufficient space and the important out-of-band the executives association.

Cloud Firewall types

There are two kinds of cloud firewalls – with the differentiation being

characterized by what clients need assistance making sure about. The two kinds exist as cloud-

based programming that screens all approaching and active information bundles and channels

this data against access strategies to obstruct and log dubious traffic.

SaaS Firewalls

The First one is Software-as-a-Service or SaaS is a cloud-based technique for giving

programming to clients. SaaS clients buy into an application instead of buying it once and

introducing it. Clients can sign into and utilize a SaaS application from any viable gadget over

the Internet. The real application runs in cloud workers that might be far eliminated from a

client's area. SaaS Firewalls are intended to make sure about an association's organization and its

clients – similar to a customary on-premises equipment or programming firewall. The main

contrast is that it's sent off-site from the cloud. This sort of firewall can be called Software-as-a-
CLOUD FIREWALL 7

service firewall or SaaS firewall, Security-as-a-service or SECaaS and Firewall-as-a-service or

FWaas.

Firewall-as-a-Service or FWaaS is another called for cloud firewalls. Like other "as-a-

Service" classes, for example, Software-as-a-Service or Platform-as-a-Service, a FWaaS runs in

the cloud and is gotten to over the Internet, and outsider sellers offer them as an assistance that

they refresh and keep up.

Advantages and disadvantages of using SaaS

The SaaS model has various advantages and disadvantages, in spite of the fact that for

present-day organizations and clients, the masters of SaaS regularly exceed the cons. Here is a

portion of the focal points and impediments of utilizing SaaS applications:

The favorable position is that clients can access from anyplace, on any gadget.

Commonly, clients can sign into SaaS applications from any gadget and any area. This offers a

lot of adaptabilities – organizations can permit representatives to work around the world, and

clients can get to their documents regardless of what they are. Likewise, most clients utilize

various gadgets and supplant them frequently; clients don't have to reinstall SaaS applications or

buy new licenses each time they change to another gadget. There is no requirement for updates

or establishments. The SaaS supplier updates and fixes the application on a continuous premise.

The SaaS supplier handles scaling up the application, for example, including more information

base space or more figure power as use increments. SaaS likewise reduces down on inner IT

expenses and overhead. The SaaS supplier keeps up the workers and framework that help the

application, and the main expense to a business is the membership cost of the application.

The Disadvantages are the requirement for more grounded admittance control.

SaaS applications' expanded availability also implies that checking client character and
CLOUD FIREWALL 8

controlling access levels becomes significant. With SaaS, hierarchical resources are not, at this

point, kept inside an inner organization, separate from the rest of the world. Rather, client access

depends on client character: on the off chance that somebody has the privilege login

qualifications, they are conceded admittance. Solid character confirmation in this way gets

significant—merchant lock-in. A business may turn out to be excessively dependent on the SaaS

application supplier. Now is the ideal time burning-through and costly to move to another

application if an association's whole information base is put away inside the old application:

security and consistency. With SaaS applications, the obligation with respect to guaranteeing

those applications and their data moves from inside IT gatherings to the external SaaS providers.

For little to medium-sized organizations, this is, to a lesser extent, a burden, as huge cloud

suppliers commonly have more assets for setting up solid security. Be that as it may, this can be

a test if an enormous business faces tight security or administrative norms. Now and again,

organizations will not be able to survey their applications' security themselves, for example, by

performing entrance testing. Basically, they need to take the outside SaaS supplier's statement

that the application is secure.

Next Generation Firewalls

Next-Generation Firewall or NGFW is cloud-based administrations planned to send

inside a virtual server farm. They ensure an association's own workers in a platform-as-a-service

or (PaaS) In this model, organizations don't pay for facilitated applications; rather, they pay for

the things they have to assemble their own applications. PaaS merchants offer all things needed

for building an application, including advancement apparatuses, foundation, and working

frameworks, over the Internet. PaaS can be contrasted with leasing all the devices and hardware
CLOUD FIREWALL 9

essential for building a house, rather than leasing it. PaaS models incorporate Heroku and

Microsoft Azure.

Infrastructure-as-a-service (IaaS) model. In this model, an organization leases the

workers and capacity they need from a cloud supplier. They, at that point, utilize that cloud

framework to manufacture their applications. IaaS resembles an organization renting a plot of

land on which they can fabricate anything they desire – however, they have to give their own

structure gear and materials. IaaS suppliers incorporate Digital Ocean, Google Compute Engine,

and OpenStack. The firewall application exists on a virtual worker and makes sure about

approaching and active traffic between cloud-based applications. It gives abilities past that of a

stateful network firewall, which was first spearheaded in 1994 with a Check Point Software

Technologies. A stateful firewall is a network security gadget that channels approaching and

active network traffic dependent on Internet Protocol (IP) port and IP addresses. By shrewdly

reviewing certain bundles' payload, new network solicitations can be related to existing real

associations. A new generation firewall includes extra highlights, for example, application

control, incorporated interruption anticipation (IPS), and frequently further developed danger

counteraction abilities like sandboxing.

A next generation firewall incorporates:

 Application and client control

 Integrated interruption anticipation

 Advanced malware identification, for example, sandboxing

 And use danger insight takes care of


CLOUD FIREWALL 10

Main benefit of a Next-generation firewall

The primary advantage of an NGFW is the capacity to securely empower the utilization

of Internet applications that enable clients to be more beneficial while hindering less attractive

applications. Cutting-edge firewalls accomplish this by utilizing profound parcel investigation to

recognize and control applications paying little mind to the application's IP port.

A network firewall's average security strategy is conveyed at the border of an association

blocks inbound associations and permits outbound associations. A few cutoff points might be

applied, however outbound Web traffic is by and large permitted. Applications have figured out

how to utilize accessible open ports like Web port 80 to the Internet to give their clients a

consistent client experience. This is valid for applications that empower representatives to work

all the more proficiently and applications that are less attractive to the organization's interests.

New-generation firewalls give organizations greater perceivability into what applications their

workers utilize and authority over their application use.

A security strategy rule of a network firewall says a connection from this source to this

objective is permitted or denied. The source and objective are customarily characterized as an IP

address doled out to a PC or is a bigger organization address that incorporates different clients

and workers. This static location strategy definition is hard for people to peruse, yet additionally

doesn't function admirably to set security strategy for clients who have diverse IP addresses as

they meander all through the organization and when working off-site.

How does Next-Generation Firewalls implement User Control?

Cutting edge network firewall sellers fathom this by incorporating with outsider client

catalogs, for example, Microsoft Active Directory. The dynamic, character-based approach gives
CLOUD FIREWALL 11

granular perceivability and control of clients, gatherings, and machines and is simpler to oversee

than static, IP-based strategy. In a solitary, bound together support chairmen characterize the

articles once. When network firewalls see an association unexpectedly, the IP is planned to the

client and gathering by questioning the outsider client index. This dynamic client to IP planning

liberates executives from continually refreshing the security strategy.

How do Next-Generation Firewalls enforce Threat Prevention?

Danger anticipation capacities are a characteristic expansion of new-generation firewalls

profound bundle investigation abilities. As the traffic goes through the organization's firewall

gadget, they likewise review the traffic for known endeavors of existing weaknesses (IPS).

Records can be shipped off gadgets to be imitated in a virtual sandbox to identify pernicious

conduct (sandbox security). As security dangers keep developing, organizations are changing

ceaselessly from Next-Generation Firewalls and moving towards another firewall innovation that

Gartner alludes to as the "Organization Firewall." Organization Firewalls furnish ongoing danger

insight alongside extra security capacities over the server farm, cloud, versatile, endpoint, and

IoT.

A firewall is a fundamental part of any association's security design that can help ensure

delicate information, meet consistent necessities, and guide associations towards accomplishing

advanced change.

Difference between a cloud firewall and a next-generation firewall (NGFW)

A new-generation firewall (NGFW) is a firewall that incorporates new advances that

weren't accessible in prior firewall items, for example,


CLOUD FIREWALL 12

Intrusion prevention system (IPS): An interruption avoidance framework recognizes and

hinders cyber assaults.

Deep packet inspection (DPI): NGFWs investigate information bundle headers and

payload, rather than simply the headers. This guides in identifying malware and different sorts of

malignant information.

Application control: NGFWs can control what singular applications can access, or

obstruct applications out and out.

NGFWs may have other progressed capacities also.

"Next-generation firewall" is a comprehensively applied term, yet NGFWs don't really

run in the cloud. A cloud-based firewall may have NGFW capacities, yet an on-premises firewall

could be like an NGFW.

Network perimeter

The network perimeter is the division between the inward organization an association

oversees and the organization access gave by an outside merchant, normally an Internet specialist

co-op (ISP). All in all, the organization edge is the edge of what an association has to command

over. Organizations can be truly secured, too: a representative of an organization may be in the

workplace and utilize an organization oversaw device to associate with the corporate

organization. Firewalls were at first intended to control this sort of organization edge and not let

anything noxious through.

Does cloud computing affect the network perimeter?

In cloud computing, the network perimeter basically vanishes. Clients access

administrations over the uncontrolled Internet. Matter the client's physical area anymore, and

once in a while, the gadget they're utilizing does not matter. It's hard to put a layer of security
CLOUD FIREWALL 13

around corporate assets since it's practically difficult to figure out where the security layer should

go. A few organizations resort to joining various distinctive security items, including customary

firewalls, VPNs, access control, and IPS items, yet this adds a ton of intricacy to IT and is hard

to oversee.

Do cloud-based firewalls fit into a SASE framework?

Secure access administration edge, or SASE, is cloud-based systems administration

engineering that joins organizing capacities, similar to programming characterized WANs, with

many security administrations, including FWaaS. Not at all like customary systems

administration models, where the border of on-premise server farms must be ensured with on-

premise firewalls, SASE offers far-reaching security and access control at the organization edge.

Inside a SASE organizing model, cloud-based firewalls work with other security items to

protect the organization from assaults, information breaks, and other digital dangers. Instead of

utilizing various outsider merchants to convey and keep up each help, organizations can recruit a

solitary seller that packs FWaaS, cloud access security specialists (CASB), secure web doors

(SWG), and zero-trust network access (ZTNA) with SD-WAN capacities.

Cloud Firewall Risks

Cloud-based firewalls additionally have their more vulnerable side. One of them would

be that the cloud-based firewalls truly don't have the foggiest idea who the guest truly is. The

cloud-based firewall has no comprehension of how the site functions, the product explicit

conditions, who is confirmed, and which consents they have. Since cloud-based firewalls
CLOUD FIREWALL 14

regularly have conventional use cases, numerous product explicit weaknesses (for example,

module weaknesses) probably won't be impeded.

One expected drawback of any cloud-based help (particularly concerning cloud firewalls)

is that clients need to depend on their FaaS supplier's accessibility. Any degree of vacation for a

cloud firewall specialist co-op can open up various associations to security breaks, with no quick

well-being accessible. Along these lines, many specialist co-ops keep up security groups

responsible for reacting to significant issues. Locales behind a cloud-based together firewall

additionally depend totally concerning the specialist organization. If the cloud-based firewall

supplier has administration downtime, your site will be down also. As a rule, cloud-based

firewalls can likewise be skirted totally if the site is gotten legitimately through IP as opposed to

through space name.

Importance of Cloud Firewalls

Cloud-based firewalls are an astounding alternative for any individual who needs

versatile assurance. If you employ a firewall or make your own, they can be an important

resource as your organization's security edge gets bigger and bigger. Companies have moved

away from running applications from on-prem workers' running applications – rather picking to

utilize virtual machines and compartments. This has prompted fast development in endpoints, all

of which require to be secured. This consistent motion of endpoint introduction has required a

move away from conventional organization security arrangements.


CLOUD FIREWALL 15

References

(2003 - 2020). Retrieved from Barracuda: https://www.barracuda.com/glossary/cloud-firewall

Alge, W. (2009). Retrieved from informationsecuritybuzz:

informationsecuritybuzz.com/articles/firewalls-in-the-cloud-2/

Alltasks IT. (2014, March 30). Retrieved from https://alltasks.com.au/benefits-of-a-cloud-based-

firewall/

checkpoint software technologies LTD. (1994-2020). Retrieved from checkpoint software

technologies: https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-

firewall/

cloudflare, Inc. (2020). Retrieved from cloudflare:

https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/

You might also like