October is National Cybersecurity month and I want to take the opportunity to highlight how Clustered Data ONTAP (cDOT) can enable secure cloud deployments. First, let’s take a moment to consider what security is trying to achieve within the cloud and the answer is: management or reduction of risk. Cloud service providers are assuming an enormous amount of risk by allowing different users to deploy a variety of services on their infrastructure. A security incident in the cloud can shatter the integrity of a cloud provider causing a level of distrust with customers that cannot be regained.
So what can NetApp do to help secure cloud deployments?
Enter Clustered Data ONTAP.
cDOT has several features that can reduce our customer’s risk when deploying a cloud and I would like to highlight three new features that makes cDOT the number one storage OS for secure cloud deployments.
- Non-Disruptive Operations
The number one greatest new feature of cDOT is the ability to conduct non-disruptive operations. By clustering storage nodes together our customers can now move data between these nodes while still serving data. This means customer data can now be accessible regardless of the physical status of the underlying cluster. Cloud service providers can now move data to a storage node to meet a particular performance level, to perform routine maintenance, or to make it accessible during a Denial of Service attack – all non-disruptively.
- Secure Multi-Tenancy
Another built in feature of cDOT is secure multi-tenancy. Under the hood, what makes cDOT special is that we have virtualized the storage layer. This means we can create a separate storage virtual machine (SVM) for each tenant in the cloud. When combined with an architecture like FlexPod, cloud service providers can now logically segregate tenants at all levels of the stack – meaning customers only see the resources they are assigned.
- Quality of Service (Qos)
Quality of Service is a new feature of cDOT. Customers can now define IOP or bandwidth requirements for storage virtual machines, FlexVols, files or LUNs. This means cloud service providers can either throttle applications that are hogging resources, or guarantee resources to critical applications so customers can always get to their data. When combined with the two features above, cloud service providers can rest easy knowing they have several tools at their disposal to make data accessible – even in the event of a cyber attack.
Lee Vorthman, CTO, Civilian Agencies, NetApp U.S. Public Sector
Connect with Lee Vorthman on Twitter- @LeeVorthman