Running head: CLOUD FIREWALL 1
Cloud Firewall
Author Names
University
CLOUD FIREWALL 2
Table of Contents
Cloud Firewall.................................................................................................................................3
Cloud Firewall benefits................................................................................................................5
Cloud Firewall types....................................................................................................................6
SaaS Firewalls.........................................................................................................................6
Advantages and disadvantages of using SaaS...................................................................7
Next Generation Firewalls.......................................................................................................8
Main benefit of a Next-generation firewall.....................................................................10
How does Next-Generation Firewalls implement User Control?....................................10
How do Next-Generation Firewalls enforce Threat Prevention?....................................11
Difference between a cloud firewall and a next-generation firewall (NGFW).........................11
Network perimeter.....................................................................................................................12
Does cloud computing affect the network perimeter?...............................................................12
Do cloud-based firewalls fit into a SASE framework?..............................................................13
Cloud Firewall Risks.................................................................................................................13
Importance of Cloud Firewalls..................................................................................................14
References......................................................................................................................................15
CLOUD FIREWALL 3
Cloud Firewall
What is Cloud? The cloud alludes to servers that are gotten to over the Internet, and the
product and databases that is working on those servers. Cloud servers are situated in data centers
everywhere on world. By utilizing distributed computing, clients and organizations don't have to
oversee physical servers themselves or run programming applications on their own machines.
The cloud empowers clients to induce to similar documents and applications from practically any
gadget. This is the reason why clients can sign into their Facebook account on another phone
after their old phone breaks and still locate their old record set up. The cloud resembles a manage
an account with dissipated assets, yet rather than cash, the cloud stores information and
computational force.
What is a Firewall? A firewall is a security item that channels out malignant traffic.
Customarily, firewalls have run in the middle of a confided in network and an untrusted network.
Model between a private organization and the Internet. Early firewalls were physical
apparatuses that associated with an association's on-premises framework. Firewalls hinder and
CLOUD FIREWALL 4
permit network traffic as per an inward arrangement of rules. A few firewalls permit heads to
redo these principles.
Since we already know what is Cloud and Firewall now let’s discuss about Cloud
Firewall. Cloud Firewalls are software-based, cloud deployed network devices, built to stop or
mitigate unwanted access to private networks. As a new technology, they are designed for
modern business needs, and sit within online application environments. Cloud firewalls block
cyber-attacks directed at these cloud assets. As the name implies, a cloud firewall is a firewall
that is hosted in the cloud. Cloud-based firewalls form a virtual barrier around cloud platforms,
infrastructure, and applications, just as traditional firewalls form a barrier around an
organization's internal network. Deploying a cloud firewall is like replacing a bank's local
security cameras and a physical security guard with a global 24/7 security center that has a
centralized staff and security camera feeds from all the places where a bank's assets are stored.
CLOUD FIREWALL 5
Cloud Firewall benefits
Most importantly, cloud-based firewalls are significantly more secluded than ordinary
firewalls. They’re intended to deal with all various type’s interchanges. For instance, on the off
chance that you need to coordinate client traffic through a firewall, a cloud-based firewall can do
that. On the off chance that you need something that can shield you from assaults, it can do that,
as well. The firewall can scale to your request; state what you need from it, and it’ll do it.
Since sending is a lot more straightforward, associations can change the size of their
security arrangement without the disappointments inborn with on location establishment, support
and updating. As transfer speed builds, cloud firewalls can consequently change in accordance
with look after equality. For instance, distributed denial-of-service (DDoS) assaults can be
moderated without stressing over transmission capacity limits. What makes a cloud-put together
firewall unique about a concerning preface firewall (other than being off-premise) boils down to
three things: adaptability, accessibility, and extensibility. Versatility: Cloud-based firewall
suppliers convey administrations to different clients, and at the center of their administration,
they use firewalls intended to scale to satisfy an ever-expanding need. From the endeavor
viewpoint, this adaptability becomes possibly the most important factor when data transmission
increments. Dissimilar to an on-premise firewall that needs substitution when transfer speed
surpasses firewall throughput, cloud-based firewalls are intended to scale as client data
transmission increments—or possibly any equipment redesign must be made straightforward to
clients. Accessibility: Cloud-based firewall suppliers offer very high accessibility (> 99.99%)
through a framework with completely repetitive force, HVAC, and organization administrations,
just as reinforcement systems in case of a site disappointment. Conversely, on-premise firewalls
are just as dependable as the current IT foundation, which may not be an issue at the data center;
CLOUD FIREWALL 6
however, it could be at the branch. High accessibility is unquestionably conceivable, yet relying
upon the producer, high-accessibility can twofold the equipment's expense and make activities
more mind-boggling. Extensibility: Cloud-based firewalls are accessible anyplace the
organization administrator can give an ensured correspondence way. Given interconnection
arrangements between network suppliers, the impression of administration may broaden well
past the limits of any single specialist co-op's organization. An on-premise firewall then again
might be conveyed at any corporate area, with the related capital cost (higher for excess)— if
there are sufficient space and the important out-of-band the executives association.
Cloud Firewall types
There are two kinds of cloud firewalls – with the differentiation being
characterized by what clients need assistance making sure about. The two kinds exist as cloud-
based programming that screens all approaching and active information bundles and channels
this data against access strategies to obstruct and log dubious traffic.
SaaS Firewalls
The First one is Software-as-a-Service or SaaS is a cloud-based technique for giving
programming to clients. SaaS clients buy into an application instead of buying it once and
introducing it. Clients can sign into and utilize a SaaS application from any viable gadget over
the Internet. The real application runs in cloud workers that might be far eliminated from a
client's area. SaaS Firewalls are intended to make sure about an association's organization and its
clients – similar to a customary on-premises equipment or programming firewall. The main
contrast is that it's sent off-site from the cloud. This sort of firewall can be called Software-as-a-
CLOUD FIREWALL 7
service firewall or SaaS firewall, Security-as-a-service or SECaaS and Firewall-as-a-service or
FWaas.
Firewall-as-a-Service or FWaaS is another called for cloud firewalls. Like other "as-a-
Service" classes, for example, Software-as-a-Service or Platform-as-a-Service, a FWaaS runs in
the cloud and is gotten to over the Internet, and outsider sellers offer them as an assistance that
they refresh and keep up.
Advantages and disadvantages of using SaaS
The SaaS model has various advantages and disadvantages, in spite of the fact that for
present-day organizations and clients, the masters of SaaS regularly exceed the cons. Here is a
portion of the focal points and impediments of utilizing SaaS applications:
The favorable position is that clients can access from anyplace, on any gadget.
Commonly, clients can sign into SaaS applications from any gadget and any area. This offers a
lot of adaptabilities – organizations can permit representatives to work around the world, and
clients can get to their documents regardless of what they are. Likewise, most clients utilize
various gadgets and supplant them frequently; clients don't have to reinstall SaaS applications or
buy new licenses each time they change to another gadget. There is no requirement for updates
or establishments. The SaaS supplier updates and fixes the application on a continuous premise.
The SaaS supplier handles scaling up the application, for example, including more information
base space or more figure power as use increments. SaaS likewise reduces down on inner IT
expenses and overhead. The SaaS supplier keeps up the workers and framework that help the
application, and the main expense to a business is the membership cost of the application.
The Disadvantages are the requirement for more grounded admittance control.
SaaS applications' expanded availability also implies that checking client character and
CLOUD FIREWALL 8
controlling access levels becomes significant. With SaaS, hierarchical resources are not, at this
point, kept inside an inner organization, separate from the rest of the world. Rather, client access
depends on client character: on the off chance that somebody has the privilege login
qualifications, they are conceded admittance. Solid character confirmation in this way gets
significant—merchant lock-in. A business may turn out to be excessively dependent on the SaaS
application supplier. Now is the ideal time burning-through and costly to move to another
application if an association's whole information base is put away inside the old application:
security and consistency. With SaaS applications, the obligation with respect to guaranteeing
those applications and their data moves from inside IT gatherings to the external SaaS providers.
For little to medium-sized organizations, this is, to a lesser extent, a burden, as huge cloud
suppliers commonly have more assets for setting up solid security. Be that as it may, this can be
a test if an enormous business faces tight security or administrative norms. Now and again,
organizations will not be able to survey their applications' security themselves, for example, by
performing entrance testing. Basically, they need to take the outside SaaS supplier's statement
that the application is secure.
Next Generation Firewalls
Next-Generation Firewall or NGFW is cloud-based administrations planned to send
inside a virtual server farm. They ensure an association's own workers in a platform-as-a-service
or (PaaS) In this model, organizations don't pay for facilitated applications; rather, they pay for
the things they have to assemble their own applications. PaaS merchants offer all things needed
for building an application, including advancement apparatuses, foundation, and working
frameworks, over the Internet. PaaS can be contrasted with leasing all the devices and hardware
CLOUD FIREWALL 9
essential for building a house, rather than leasing it. PaaS models incorporate Heroku and
Microsoft Azure.
Infrastructure-as-a-service (IaaS) model. In this model, an organization leases the
workers and capacity they need from a cloud supplier. They, at that point, utilize that cloud
framework to manufacture their applications. IaaS resembles an organization renting a plot of
land on which they can fabricate anything they desire – however, they have to give their own
structure gear and materials. IaaS suppliers incorporate Digital Ocean, Google Compute Engine,
and OpenStack. The firewall application exists on a virtual worker and makes sure about
approaching and active traffic between cloud-based applications. It gives abilities past that of a
stateful network firewall, which was first spearheaded in 1994 with a Check Point Software
Technologies. A stateful firewall is a network security gadget that channels approaching and
active network traffic dependent on Internet Protocol (IP) port and IP addresses. By shrewdly
reviewing certain bundles' payload, new network solicitations can be related to existing real
associations. A new generation firewall includes extra highlights, for example, application
control, incorporated interruption anticipation (IPS), and frequently further developed danger
counteraction abilities like sandboxing.
A next generation firewall incorporates:
Application and client control
Integrated interruption anticipation
Advanced malware identification, for example, sandboxing
And use danger insight takes care of
CLOUD FIREWALL 10
Main benefit of a Next-generation firewall
The primary advantage of an NGFW is the capacity to securely empower the utilization
of Internet applications that enable clients to be more beneficial while hindering less attractive
applications. Cutting-edge firewalls accomplish this by utilizing profound parcel investigation to
recognize and control applications paying little mind to the application's IP port.
A network firewall's average security strategy is conveyed at the border of an association
blocks inbound associations and permits outbound associations. A few cutoff points might be
applied, however outbound Web traffic is by and large permitted. Applications have figured out
how to utilize accessible open ports like Web port 80 to the Internet to give their clients a
consistent client experience. This is valid for applications that empower representatives to work
all the more proficiently and applications that are less attractive to the organization's interests.
New-generation firewalls give organizations greater perceivability into what applications their
workers utilize and authority over their application use.
A security strategy rule of a network firewall says a connection from this source to this
objective is permitted or denied. The source and objective are customarily characterized as an IP
address doled out to a PC or is a bigger organization address that incorporates different clients
and workers. This static location strategy definition is hard for people to peruse, yet additionally
doesn't function admirably to set security strategy for clients who have diverse IP addresses as
they meander all through the organization and when working off-site.
How does Next-Generation Firewalls implement User Control?
Cutting edge network firewall sellers fathom this by incorporating with outsider client
catalogs, for example, Microsoft Active Directory. The dynamic, character-based approach gives
CLOUD FIREWALL 11
granular perceivability and control of clients, gatherings, and machines and is simpler to oversee
than static, IP-based strategy. In a solitary, bound together support chairmen characterize the
articles once. When network firewalls see an association unexpectedly, the IP is planned to the
client and gathering by questioning the outsider client index. This dynamic client to IP planning
liberates executives from continually refreshing the security strategy.
How do Next-Generation Firewalls enforce Threat Prevention?
Danger anticipation capacities are a characteristic expansion of new-generation firewalls
profound bundle investigation abilities. As the traffic goes through the organization's firewall
gadget, they likewise review the traffic for known endeavors of existing weaknesses (IPS).
Records can be shipped off gadgets to be imitated in a virtual sandbox to identify pernicious
conduct (sandbox security). As security dangers keep developing, organizations are changing
ceaselessly from Next-Generation Firewalls and moving towards another firewall innovation that
Gartner alludes to as the "Organization Firewall." Organization Firewalls furnish ongoing danger
insight alongside extra security capacities over the server farm, cloud, versatile, endpoint, and
IoT.
A firewall is a fundamental part of any association's security design that can help ensure
delicate information, meet consistent necessities, and guide associations towards accomplishing
advanced change.
Difference between a cloud firewall and a next-generation firewall (NGFW)
A new-generation firewall (NGFW) is a firewall that incorporates new advances that
weren't accessible in prior firewall items, for example,
CLOUD FIREWALL 12
Intrusion prevention system (IPS): An interruption avoidance framework recognizes and
hinders cyber assaults.
Deep packet inspection (DPI): NGFWs investigate information bundle headers and
payload, rather than simply the headers. This guides in identifying malware and different sorts of
malignant information.
Application control: NGFWs can control what singular applications can access, or
obstruct applications out and out.
NGFWs may have other progressed capacities also.
"Next-generation firewall" is a comprehensively applied term, yet NGFWs don't really
run in the cloud. A cloud-based firewall may have NGFW capacities, yet an on-premises firewall
could be like an NGFW.
Network perimeter
The network perimeter is the division between the inward organization an association
oversees and the organization access gave by an outside merchant, normally an Internet specialist
co-op (ISP). All in all, the organization edge is the edge of what an association has to command
over. Organizations can be truly secured, too: a representative of an organization may be in the
workplace and utilize an organization oversaw device to associate with the corporate
organization. Firewalls were at first intended to control this sort of organization edge and not let
anything noxious through.
Does cloud computing affect the network perimeter?
In cloud computing, the network perimeter basically vanishes. Clients access
administrations over the uncontrolled Internet. Matter the client's physical area anymore, and
once in a while, the gadget they're utilizing does not matter. It's hard to put a layer of security
CLOUD FIREWALL 13
around corporate assets since it's practically difficult to figure out where the security layer should
go. A few organizations resort to joining various distinctive security items, including customary
firewalls, VPNs, access control, and IPS items, yet this adds a ton of intricacy to IT and is hard
to oversee.
Do cloud-based firewalls fit into a SASE framework?
Secure access administration edge, or SASE, is cloud-based systems administration
engineering that joins organizing capacities, similar to programming characterized WANs, with
many security administrations, including FWaaS. Not at all like customary systems
administration models, where the border of on-premise server farms must be ensured with on-
premise firewalls, SASE offers far-reaching security and access control at the organization edge.
Inside a SASE organizing model, cloud-based firewalls work with other security items to
protect the organization from assaults, information breaks, and other digital dangers. Instead of
utilizing various outsider merchants to convey and keep up each help, organizations can recruit a
solitary seller that packs FWaaS, cloud access security specialists (CASB), secure web doors
(SWG), and zero-trust network access (ZTNA) with SD-WAN capacities.
Cloud Firewall Risks
Cloud-based firewalls additionally have their more vulnerable side. One of them would
be that the cloud-based firewalls truly don't have the foggiest idea who the guest truly is. The
cloud-based firewall has no comprehension of how the site functions, the product explicit
conditions, who is confirmed, and which consents they have. Since cloud-based firewalls
CLOUD FIREWALL 14
regularly have conventional use cases, numerous product explicit weaknesses (for example,
module weaknesses) probably won't be impeded.
One expected drawback of any cloud-based help (particularly concerning cloud firewalls)
is that clients need to depend on their FaaS supplier's accessibility. Any degree of vacation for a
cloud firewall specialist co-op can open up various associations to security breaks, with no quick
well-being accessible. Along these lines, many specialist co-ops keep up security groups
responsible for reacting to significant issues. Locales behind a cloud-based together firewall
additionally depend totally concerning the specialist organization. If the cloud-based firewall
supplier has administration downtime, your site will be down also. As a rule, cloud-based
firewalls can likewise be skirted totally if the site is gotten legitimately through IP as opposed to
through space name.
Importance of Cloud Firewalls
Cloud-based firewalls are an astounding alternative for any individual who needs
versatile assurance. If you employ a firewall or make your own, they can be an important
resource as your organization's security edge gets bigger and bigger. Companies have moved
away from running applications from on-prem workers' running applications – rather picking to
utilize virtual machines and compartments. This has prompted fast development in endpoints, all
of which require to be secured. This consistent motion of endpoint introduction has required a
move away from conventional organization security arrangements.
CLOUD FIREWALL 15
References
(2003 - 2020). Retrieved from Barracuda: https://www.barracuda.com/glossary/cloud-firewall
Alge, W. (2009). Retrieved from informationsecuritybuzz:
informationsecuritybuzz.com/articles/firewalls-in-the-cloud-2/
Alltasks IT. (2014, March 30). Retrieved from https://alltasks.com.au/benefits-of-a-cloud-based-
firewall/
checkpoint software technologies LTD. (1994-2020). Retrieved from checkpoint software
technologies: https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-
firewall/
cloudflare, Inc. (2020). Retrieved from cloudflare:
https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/