{"id":24946,"date":"2015-03-09T13:18:03","date_gmt":"2015-03-09T17:18:03","guid":{"rendered":"https:\/\/blogs.solidworks.com\/solidworksblog\/?p=24946"},"modified":"2015-03-09T13:18:03","modified_gmt":"2015-03-09T17:18:03","slug":"not-all-clouds-are-the-same","status":"publish","type":"post","link":"https:\/\/blogs.solidworks.com\/solidworksblog\/2015\/03\/not-all-clouds-are-the-same.html","title":{"rendered":"Not all Clouds Are the Same"},"content":{"rendered":"<p>The other day, while the dense, grey clouds were dumping enough snow in Boston to push the winter snowfall over the \u201c100<sup>th<\/sup> inch\u201d mark, I was relaxing on the beach in Miami looking at the fluffy, soft clouds scattered across the blue sky, and reflecting on one of the cruel realities of life, \u2013 not all the clouds are the same. This is especially true when it comes to the clouds you are using for your business and product development process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-24967\" src=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy1-300x168.png\" alt=\"cloudguy1\" width=\"300\" height=\"168\" srcset=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy1-300x168.png 300w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy1-615x344.png 615w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy1-120x67.png 120w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy1.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Every day, cloud-based services are playing bigger and more important role in our personal and work lives. \u00a0Cloud offerings are becoming so much more than just renting and accessing hardware, owned by someone else, while you provide, install and manage the software. Today, \u2018<strong>The Cloud<\/strong>\u2019 is the whole, inclusive <em>experience<\/em> of using Software as a Service (SaaS), to enable your business and product development process. \u00a0The cloud experience requires that any software or applications used in the SaaS environment must be designed and developed with this in mind \u2013 developed for being deployed and used in the cloud environment.<\/p>\n<p>Being <strong>safe<\/strong> in the cloud is a combination of many aspects of your overall cloud experience and includes infrastructure security, software architecture, user and access management capabilities, collaboration workflows, etc. All of these components must work in synch in order to give you a secure solution, and more importantly, peace of mind.<\/p>\n<p>Different cloud providers deploy different security strategies. One of the leading security concepts relies on the fact that several independent mechanisms are put in place in order to mitigate any single risk. An unlikely failure to block the malevolent action will therefore not result in a threat but will be subsequently blocked by a different mechanism. This approach provides the \u2018<strong>Security in Depth<\/strong>\u2019 aspect of a cloud environment.<\/p>\n<p>In order to be protected from Internet attacks, Cloud providers should deploy several security layers to ensure that only intended traffic and activities are actually let through and processed. All incoming Internet traffic is filtered by independent mechanisms ensuring reliability and lack of vulnerability cascading. Moreover, the internet-scale hosting environment should be resistant to Distributed Denial of Service attacks.<a href=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-24968\" src=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy2-300x173.png\" alt=\"cloudguy2\" width=\"317\" height=\"183\" srcset=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy2-300x173.png 300w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy2-615x356.png 615w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy2-120x69.png 120w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/cloudguy2.png 1024w\" sizes=\"auto, (max-width: 317px) 100vw, 317px\" \/><\/a><\/p>\n<p>There also could be attempts to intercept your communication and steal your data while in transit. Encryption and secure communication\u00a0channels between the cloud environment and the customer\u2019s device should be used, to ensure the confidentiality and integrity of the transferred data.<\/p>\n<p>These and many more security measure aligned with industry standards and best practices &#8212; such as ISO 2700x standards, NIST 800 series, OWASP methodologies, CobIT framework, etc. &#8212; \u00a0should be in place in order for your cloud to be secure and protected from the outside attacks. \u00a0There has been a lot of work in recent years to condense these security concerns and protocols into a global standard, but it is still work in progress.<\/p>\n<p>But what about security that can only be achieved by specific architecture and capabilities of the application deployed on the cloud? Consider the following:<\/p>\n<ul>\n<li>On your cloud, can other users see you?<\/li>\n<li>When you store your data, where is it?<\/li>\n<li>Can it be accessed by other users and companies?<\/li>\n<li>What about \u201cexternal\u201d people on your team?<\/li>\n<li>It is hard to imagine any product being developed today without collaboration between different teams \u2013 internal and often external such as your customers, suppliers, etc.<\/li>\n<li>How safe is your cloud?<\/li>\n<\/ul>\n<p>To truly counter threats of hacking, the security countermeasures must be at the heart of the application (application design and capabilities, and development processes) hosted on the cloud itself. For example, here at Dassault Syst\u00e8mes the R&amp;D Organization uses the Open Web Application Security Project standard (OWASP), MITRE CWE (Common Weakness Enumeration), etc. as a starting point of our extensive security efforts.<\/p>\n<p>This all starts with your log-in. While your user name and password are critical, there is so much more that protects you. Users should be fully authenticated to be able to access the cloud, but also assigned specific product licenses and policies. Dassault Syst\u00e8mes 3DEXPERIENCE\u00ae Platform capability gives you the power to decide and manage who has these licenses. There is a strong password policy and strong user policy for access control lists in order to protect the 3DEXPERIENCE cloud against brute force, privilege escalations, and session hijacking. The way you log-in to the platform matters.<\/p>\n<p><strong>What about your data on the cloud?<\/strong> Each customer accessing the 3DEXPERIENCE cloud works on an instance that is independent from the other cloud systems. Such an approach protects from cross-customer data access. This compartmentalization is also hardcoded at the application level. Besides that, you also control the access to your data by explicitly specifying which user has access to what data. Again there are multiple layers of protection behind this simple capability as access is restricted via access lists to only the exact combination of multiple parameters such as the user name, roles, organizations, and\/or collaborative spaces, etc.<\/p>\n<p><strong>What about collaboration?<\/strong> As part of collaborative product development we often invite \u201cexternal\u201d people (customers, partners, suppliers, etc.) to join our product development efforts. While your own employees might\/should have access to all of your IP and data, this is often not the case for external people, especially if there are concurrent projects going on with competing customers. The 3DEXPERIENCE cloud gives you the power to clearly flag external users thus applying yet another layer of access control to your cloud environment and data, and raising awareness among internal users about possible risks.<\/p>\n<p><a href=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/blog3-new.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-24954\" src=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/blog3-new-615x326.png\" alt=\"blog3-new.png\" width=\"615\" height=\"326\" srcset=\"https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/blog3-new-615x326.png 615w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/blog3-new-300x159.png 300w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/blog3-new-120x64.png 120w, https:\/\/blog-assets.solidworks.com\/uploads\/sites\/2\/2015\/03\/blog3-new.png 1306w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/a><\/p>\n<p>All of these mechanisms are implemented in the application business logic and the database to help ensure data integrity and strict confidentiality throughout your product development.<\/p>\n<p>The <strong>3DEXPERIENCE platform<\/strong> uses strong universal best practices for authentication, access control, encryption, injection detection and prevention, auditing and server hardening, as part of the effort to protect the confidentiality, integrity, and availability of data.<\/p>\n<p>No \u2013 Not all the clouds are the same. We not only deploy the latest cloud security measures of our cloud infrastructure and protocols, but we also develop our own products with security and safety as one of the highest requirements. With peace of mind, 3DEXPERIENCE cloud-based applications are the right choice for product developers like you.<\/p>\n<p>Read analyst firm, IDC&#8217;s, perspective on addressing the cloud security dilemma.\u00a0<a href=\"https:\/\/www.solidworks.com\/sw\/products\/3dexperience\/idc-product-development-cloud-form.htm\" target=\"_blank\"><strong>https:\/\/www.solidworks.com\/sw\/products\/3dexperience\/idc-product-development-cloud-form.htm<\/strong><\/a><\/p>\n<p>Read more about how Dassault Syst\u00e8mes\u00a0provides security in the cloud: <a href=\"https:\/\/www.3ds.com\/products-services\/catia\/resources\/whitepaper-cloud-security\" target=\"_blank\"><strong>https:\/\/www.3ds.com\/products-services\/catia\/resources\/whitepaper-cloud-security<\/strong><\/a>\/<\/p>\n<p>You can aldo learn more about\u00a0<strong>SOLIDWORKS 3DEXPERIENCE\u00a0<\/strong>solutions on the SOLIDWORKS website:\u00a0<a href=\"https:\/\/www.solidworks.com\/sw\/products\/3dexperience\/solidworks-3dexperience-overview.htm\" target=\"_blank\"><strong>https:\/\/www.solidworks.com\/sw\/products\/3dexperience\/solidworks-3dexperience-overview.htm<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The other day, while the dense, grey clouds were dumping enough snow in Boston to push the winter snowfall over the \u201c100th inch\u201d mark, I was relaxing on the beach in Miami looking at the fluffy, soft clouds scattered across<\/p>\n... <a href=\"https:\/\/blogs.solidworks.com\/solidworksblog\/2015\/03\/not-all-clouds-are-the-same.html\">Continued<\/a>","protected":false},"author":164,"featured_media":24968,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[563],"tags":[28,1916,1886,1897,1876],"class_list":["post-24946","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","tag-cloud","tag-security","tag-solidworks-conceptual-designer","tag-solidworks-industrial-designer","tag-swid"],"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/posts\/24946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/comments?post=24946"}],"version-history":[{"count":0,"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/posts\/24946\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/media\/24968"}],"wp:attachment":[{"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/media?parent=24946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/categories?post=24946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.solidworks.com\/solidworksblog\/wp-json\/wp\/v2\/tags?post=24946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}