Skip to content

Cloud Blogs

Author – Madhusudhan Rao

Menu
  • Cloud What is & How to Series
  • Archived Blogs
    • Cloud-Blogs by Madhusudhan Rao
      • ADF
        • ADF based Android Apps
        • ADF CRUD Cascaded LOVs
        • ADF CRUD Operation
        • ADF for Dummies
        • ADF for Financial Services Software Development
      • Analytics & Visualization
        • Business Intelligence
        • Oracle BI & DV Cloud Service
        • setting up Oracle Analytics Cloud Instance and Data Visualization Techniques
      • App Servers & DevOps
        • How to deploy NodeJS Application on Oracle Application Container Cloud Service
        • Oracle Application Container Cloud Service
        • Oracle Java Cloud Service
      • Architecture
        • 01 Enterprise Business
        • 02 Content framework
        • 03 Enterprise Continuum
        • 04 Maturity Models
        • 05-Architecture Governance
        • 06-Preliminary Phase
        • 07-Architecture Vision
        • 08-Business Architecture
        • 09-Info Sys Architecture
        • 10-Tech Architecture
        • 11 Opportunities & Solns
        • 12-Migration Planning
        • 14 Implementation Governance
        • 15 Change Management
        • 16-Requirement Management
        • 17 Reference Models
        • Cloud Architecture Concepts
          • 01 Architecture Concepts – Regulatory Compliance, Security monitoring and Storage protocols
          • 02 Architecture – Network Concepts and Bare Metal
          • 03 Enterprise Solution Architecture – Best Practices
          • 04 Cloud Architecture Concepts
        • Value Selling Techniques
      • OCI Admin Blogs
        • Create Oracle Cloud Infrastructure Instance
        • ElasticSearch & Kibana – Must for All Search Engine Development
        • How to Create Oracle Bare metal Compute Instance
        • Measuring Latency and TraceRoute Details with Oracle Edge Services
        • OCI Oracle cloud infrastructure – Setting up a NAT Instances for Public Internet Access from a Private Subnet
        • Oracle Cloud Infrastructure – OCI Creating buckets and object storage – setting up self expiry URLs
        • Oracle Cloud Infrastructure OCI – Create Instance ,Attach Block Volume , Open Ports, Setup Firewall rules
        • Python Basics
        • setting up Apache Tomcat on Oracle Cloud Infrastructure OCI
        • setting up CloudFlare DNS & HAProxy on Oracle Cloud Infrastructure for High Availability
        • Setting up Django Python Web Environment on Oracle Cloud
        • setting up File Storage on OCI and uploading files through Filezilla FTP
        • Setting up GPU-enabled Narupa server on Oracle Bare Metal Cloud for Virtual Reality Clients
        • setting up LAMP Stack , PHP 5.6, PhpMyAdmin , FTP and Mail Server on OCI
        • setting up Load Balancer on Oracle Cloud Infrastructure
        • setting up MongoDB Enterprise version Instance on Oracle Cloud Infrastructure Baremetal
        • setting up MongoDB on Oracle Cloud Infrastructure Classic and Opening Ports
        • Setting up SSH , FTP and Opening Ports on Oracle Cloud PaaS and IaaS
        • setting up web infrastructure DNS and HTTPS for your cloud Infrastructure as a Service OCI
        • World of Slack Programming
      • OCI Classic Blogs
        • How to Create WordPress blog on Oracle Cloud
        • running Function as a Service on Oracle Cloud Infrastructure – fnproject.io
        • running Hadoop & Big Data on Oracle Cloud Infrastructure
        • running TensorFlow Machine Learning for Image Recognition on Oracle Cloud Infrastructure
        • Setting up Kubernetes on Oracle Cloud Infrastructure – Classic
      • Oracle BPM for Financial Services
        • BPM for FS
        • 1. Setting up the development environment
        • 2. Modeling a home loan business process
        • 3. Implementing a home loan business process
        • 4. Deploying and testing a process workflow
        • 5. Administering processes
        • 6. Changing a business process by the process analyst
        • 7. Creating business reports for process owners
        • 8. Participating in a business process
        • 9. Integrating with business partners
        • 10. Collaborating with customers and end users
      • Oracle JET Series
    • Database Series
      • Autonomous Data Warehouse and Analytics
        • 01 Preparing Client Machine
        • 02 Creating Autonomous Data Warehouse Instance
        • 03 Creating Tables into Autonomous Data Warehouse through SQL Developer
        • 04 Load Data into OCI Object storage and import that data into Autonomous Data warehouse
        • 05 Create Autonomous Analytics Cloud ADW Connection and create Data Visualization
      • Oracle Apex Cloud Service
      • Oracle Database Cloud Service
      • setting up and running Oracle Big Data PaaS
      • Setting up MySQL PaaS on Oracle Cloud
    • Dockers on OCI Series
      • Comprehensive Blog on Dockers running on OCI
      • running a Docker Container on OCI
      • opening OCI Ports for Docker Containers
      • Building a Docker Image by using Dockerfile
      • Committing changes made in a Docker without using Dockerfile
      • pushing image to Docker Hub
      • DevOps with Github, Docker Hub and Oracle Container Cloud Services
      • running Apache Kafka for continuous data streaming on Oracle cloud infrastructure
    • Oracle OKE Series
      • 01 Comprehensive Blog on Oracle Kubernetes Engine – getting started
      • 02 Configure Network Resources for Oracle Kubernetes Engine
      • 03 Creating 3 Worker and 2 Load Balancers Subnets for OKE
      • 04 Creating Oracle Kubernetes Cluster
      • 05 – Enable Cluster access through Command line interface
      • 06 – Getting onto Oracle Kubernetes Engine Dashboard
      • 07 Pod Configuration using a YAML Deployment
    • SOA BPM IDM Portal Series
      • FMW
        • Comprehensive Business Process Management – BPM 11g
        • FMW Install Startup Scripts
        • Oracle 11gR2 and 12c Database on Linux / OEL / Fedora
        • Oracle Identity Mangement
        • PS6, PS7, PS8 Install and Configuration
      • Webcenter Portal
        • Art of Webcenter Templating
        • Webcenter Sites Installation Linux
        • Webcenter Sites Look n feel
        • Webcenter Spaces
          • Custom Landing Page
        • Webcenter UCM Integration PS5
        • Webcenter, BPM Process Spaces – UCM PS5
        • BPM UCM and Webcenter PS5
      • BPM Series
        • 01-Simple BPM Task Initiator
        • 02-Business Rules and Exclusive Gateway
        • 03-Service Invocation Adapters
        • 04-BPM as a Web Service
        • 05-Mediator and Conditional Service Routing
        • 06-BPM Composer – Runtime Edit
        • 07-BPM and JMS Adapters
        • Oracle BPM 12c features
      • Process Cloud Service
        • Part 1 – Working with Process Cloud Service
        • Part 2 – How to Build Process , Data Persistence in Database Cloud Service
        • Part 3 – Invoking PCS Process from Oracle JET Framework
      • SOA Series
        • Oracle OSB 11g
        • Oracle SOA 11g Business Rules
        • Oracle SOA 11g DB Adapter
        • Oracle SOA 11g Mediator
        • SOA 11g AQ Adapters
    • Terraform on OCI Series
      • Create a Highly Scalable Cluster in the cloud using Terraform on OCI
      • Creating an Instance with New VNC Network
      • Managing the OCI Cluster with Slurm Workload Manager & Grafana
      • Terraform on OCI create instance
      • Terraform on OCI create load balancer
      • Terraform on OCI create non-federated user
      • Terraform on OCI create user, group, dynamic group and policies
      • Terraform on Oracle Cloud OCI
Menu

01 Architecture Concepts – Regulatory Compliance, Security monitoring and Storage protocols

HIPAA (Health Insurance Portability and Accountability Act of 1996)

HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

HIPAA Privacy Rule

The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes the first national standards in the United States to protect patients’ Personal Health Information (PHI). 

PHI includes:

  • Name, address, birth date and Social Security Number;
  • An individual’s physical or mental health condition;
  • Any care provided to an individual; or
  • Information concerning the payment for the care provided to the individual that identifies the patient, or if there is a reasonable basis to believe it can be used to identify the patient.

Regulatory compliance (HIPAA, PCI)

What is PCI Compliance?

The Payment Card Industry Data Security Standard (PCI DSS) applies to companies of any size that accept credit card payments. If your company intends to accept card payment, and store, process and transmit cardholder data, you need to host your data securely with a PCI compliant hosting provider.

Goal: Building and maintaining a secure network.

  1. Install and maintain a firewall configuration to protect cardholder data. Companies must create their own firewall configuration policy and develop a configuration test procedure designed to protect cardholder data. Your hosting provider should have firewalls in place to protect and create a secure, private network.
  2. Do not use vendor-supplied defaults for system passwords and other security parameters. This means creating, maintaining and updating your system passwords with unique and secure passwords created by your company, not ones that a software vendor might already have in place when purchased.
  3. Protect stored data.This requirement only applies to companies that store cardholder data. Specifically, companies that do not automatically store cardholder data are already avoiding a possible data security breach often targeted by identity theft.
  4. Encrypt transmission of cardholder data across open, public networks. Encrypted data is unreadable and unusable to a system intruder without the property cryptographic keys, according the PCI Security Standards Council. Cryptographic keys refers to the process in which plaintext, like the words seen here, are transformed into ciphertext. Ciphertext contains information unreadable to those without the cipher, or the specific algorithm that can decode the text

AADHAAR UID ( Unique Identitfication Authority of India ) Data Security – Compliance

Some of Aadhar regulations are

  1. The Authority shall perform authentication of the Aadhaar number of an Aadhaar number holder submitted by any requesting entity,
  2. ensure that the identity information of an individual is only used for submission to the Central Identities Data Repository for authentication.
  3. Types of Authentication.—
There shall be two types of authentication facilities provided by the Authority, namely:
    1. (i)  Yes/No authentication facility,
    2. (ii)  e-KYC authentication facility, which may be carried out only using OTP and/ or biometric authentication modes as specified in regulation 
  4. After collecting the Aadhaar number or any other identifier provided by the requesting entity, which is mapped to Aadhaar number and necessary demographic and /or biometric information and/ or OTP from the Aadhaar number holder, the client application shall immediately package and encrypt these input parameters into PID block before any transmission, 
  5. please refer this link for current details Link to Regulations 

Security monitoring – intrusion detection system (IDS)

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources, and uses alarm filtering techniques to distinguish malicious activity from false alarms.

The most common classifications are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is an example of a HIDS, while a system that analyzes incoming network traffic is an example of a NIDS. It is also possible to classify IDS by detection approach: the most well-known variants are signature-based detection (recognizing bad patterns, such as malware) 

Security monitoring – Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

DLP software products use business rules to classify and protect confidential and critical information so that unauthorized end users cannot accidentally or maliciously share data whose disclosure could put the organization at risk. For example, if an employee tried to forward a business email outside the corporate domain or upload a corporate file to a consumer cloud storage service like Dropbox, the employee would be denied permission.

Adoption of DLP is being driven by insider threats and by more rigorous state privacy laws, many of which have stringent data protection or access components. In addition to being able to monitor and control endpoint activities, some DLP tools can also be used to filter data streams on the corporate network and protect data in motion.

DLP products may also be referred to as data leak prevention, information loss prevention or extrusion prevention products.

Security monitoring – SYSLOG

In computing, syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the software type generating the message, and assigned a severity label.

Computer system designers may use syslog for system management and security auditing as well as general informational, analysis, and debugging messages. A wide variety of devices, such as printers, routers, and message receivers across many platforms use the syslog standard. This permits the consolidation of logging data from different types of systems in a central repository. Implementations of syslog exist for many operating systems.

Storage protocols – NFS

NFS means you access a file share like \\james\mySharedFolder, and you put files on it. In Windows, this is a mapped network drive. You access folders and files there, but you don’t see the network mapped drive in Computer Manager as a local drive letter. You don’t get exclusive access to NFS drives. You don’t need a separate network cable for NFS – you just access your file shares over whatever network you want.

Storage protocols –  ZFS

Oracle Intelligent Storage Protocol

ZFS is a local file system and logical volume manager created by Sun Microsystems Inc. to direct and control the placement, storage and retrieval of data in enterprise-class computing systems.

Oracle’s ZS4-4 features more than 120 processor cores (an increase from 80 in ZS3-4) and up to 3 TB of DRAM (up from 1.5 TB in the prior 3-4 release). The ZFS storage appliance serves 85% or more of the I/O out of DRAM through Oracle’s hybrid pool storage architecture for a distinct performance advantage, 

Storage protocols – iSCSI (Internet Small Computer System Interface)

 

iSCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.

iSCSI means you map your storage over TCPIP. You typically put in dedicated Ethernet network cards and a separate network switch. Each server and each storage device has its own IP address(es), and you connect by specifying an IP address where your drive lives. In Windows, each drive shows up in Computer Manager as a hard drive, and you format it. This is called block storage.

iSCSI works by transporting block-level data between an iSCSI initiator on a server and an iSCSI target on a storage device. The iSCSI protocol encapsulates SCSI commands and assembles the data in packets for the TCP/IP layer. Packets are sent over the network using a point-to-point connection. Upon arrival, the iSCSI protocol disassembles the packets, separating the SCSI commands so the operating system (OS) will see the storage as a local SCSI device that can be formatted as usual. Today, some of iSCSI’s popularity in small to midsize businesses (SMBs) has to do with the way server virtualization makes use of storage pools. In a virtualized environment, the storage pool is accessible to all the hosts within the cluster and the cluster nodes nodes communicate with the storage pool over the network through the use of the iSCSI protocol.

>> Network Architecture & Bare Metal

Log in
  • Cloud What is & How to Series
  • Archived Blogs
    • Oracle OKE Series
      • 01 Comprehensive Blog on Oracle Kubernetes Engine - getting started
      • 02 Configure Network Resources for Oracle Kubernetes Engine
      • 03 Creating 3 Worker and 2 Load Balancers Subnets for OKE
      • 04 Creating Oracle Kubernetes Cluster
      • 05 - Enable Cluster access through Command line interface
      • 06 - Getting onto Oracle Kubernetes Engine Dashboard
      • 07 Pod Configuration using a YAML Deployment
    • Dockers on OCI Series
      • Comprehensive Blog on Dockers running on OCI
      • running a Docker Container on OCI
      • opening OCI Ports for Docker Containers
      • Building a Docker Image by using Dockerfile
      • Committing changes made in a Docker without using Dockerfile
      • pushing image to Docker Hub
      • DevOps with Github, Docker Hub and Oracle Container Cloud Services
      • running Apache Kafka for continuous data streaming on Oracle cloud infrastructure
    • Terraform on OCI Series
      • Managing the OCI Cluster with Slurm Workload Manager & Grafana
      • Terraform on Oracle Cloud OCI
      • Terraform on OCI create instance
      • Creating an Instance with New VNC Network
      • Terraform on OCI create non-federated user
      • Terraform on OCI create user, group, dynamic group and policies
      • Terraform on OCI create load balancer
      • Create a Highly Scalable Cluster in the cloud using Terraform on OCI
    • Cloud-Blogs by Madhusudhan Rao
      • Oracle JET Series
      • OCI Classic Blogs
        • Setting up Kubernetes on Oracle Cloud Infrastructure - Classic
        • running TensorFlow Machine Learning for Image Recognition on Oracle Cloud Infrastructure
        • running Function as a Service on Oracle Cloud Infrastructure - fnproject.io
        • running Hadoop & Big Data on Oracle Cloud Infrastructure
        • How to Create WordPress blog on Oracle Cloud
      • OCI Admin Blogs
        • setting up Apache Tomcat on Oracle Cloud Infrastructure OCI
        • Setting up SSH , FTP and Opening Ports on Oracle Cloud PaaS and IaaS
        • setting up LAMP Stack , PHP 5.6, PhpMyAdmin , FTP and Mail Server on OCI
        • Create Oracle Cloud Infrastructure Instance
        • setting up File Storage on OCI and uploading files through Filezilla FTP
        • setting up CloudFlare DNS & HAProxy on Oracle Cloud Infrastructure for High Availability
        • setting up web infrastructure DNS and HTTPS for your cloud Infrastructure as a Service OCI
        • Oracle Cloud Infrastructure OCI - Create Instance ,Attach Block Volume , Open Ports, Setup Firewall rules
        • Setting up GPU-enabled Narupa server on Oracle Bare Metal Cloud for Virtual Reality Clients
        • Oracle Cloud Infrastructure - OCI Creating buckets and object storage - setting up self expiry URLs
        • OCI Oracle cloud infrastructure - Setting up a NAT Instances for Public Internet Access from a Private Subnet
        • setting up MongoDB on Oracle Cloud Infrastructure Classic and Opening Ports
        • ElasticSearch & Kibana - Must for All Search Engine Development
        • How to Create Oracle Bare metal Compute Instance
        • World of Slack Programming
        • Setting up Django Python Web Environment on Oracle Cloud
        • Measuring Latency and TraceRoute Details with Oracle Edge Services
        • setting up Load Balancer on Oracle Cloud Infrastructure
        • Python Basics
        • setting up MongoDB Enterprise version Instance on Oracle Cloud Infrastructure Baremetal
      • ADF
        • ADF CRUD Operation
        • ADF for Financial Services Software Development
        • ADF based Android Apps
        • ADF for Dummies
        • ADF CRUD Cascaded LOVs
      • Architecture
        • 08-Business Architecture
        • 04 Maturity Models
        • 09-Info Sys Architecture
        • 05-Architecture Governance
        • Value Selling Techniques
        • 10-Tech Architecture
        • Cloud Architecture Concepts
          • 01 Architecture Concepts - Regulatory Compliance, Security monitoring and Storage protocols
          • 02 Architecture - Network Concepts and Bare Metal
          • 03 Enterprise Solution Architecture - Best Practices
          • 04 Cloud Architecture Concepts
        • 11 Opportunities & Solns
        • 12-Migration Planning
        • 14 Implementation Governance
        • 15 Change Management
        • 16-Requirement Management
        • 01 Enterprise Business
        • 02 Content framework
        • 06-Preliminary Phase
        • 03 Enterprise Continuum
        • 17 Reference Models
        • 07-Architecture Vision
      • Oracle BPM for Financial Services
        • BPM for FS
        • 1. Setting up the development environment
        • 2. Modeling a home loan business process
        • 3. Implementing a home loan business process
        • 4. Deploying and testing a process workflow
        • 5. Administering processes
        • 6. Changing a business process by the process analyst
        • 7. Creating business reports for process owners
        • 8. Participating in a business process
        • 9. Integrating with business partners
        • 10. Collaborating with customers and end users
      • App Servers & DevOps
        • Oracle Application Container Cloud Service
        • Oracle Java Cloud Service
        • How to deploy NodeJS Application on Oracle Application Container Cloud Service
      • Analytics & Visualization
        • Business Intelligence
        • setting up Oracle Analytics Cloud Instance and Data Visualization Techniques
        • Oracle BI & DV Cloud Service
    • Database Series
      • setting up and running Oracle Big Data PaaS
      • Autonomous Data Warehouse and Analytics
        • 01 Preparing Client Machine
        • 02 Creating Autonomous Data Warehouse Instance
        • 03 Creating Tables into Autonomous Data Warehouse through SQL Developer
        • 04 Load Data into OCI Object storage and import that data into Autonomous Data warehouse
        • 05 Create Autonomous Analytics Cloud ADW Connection and create Data Visualization
      • Oracle Database Cloud Service
      • Oracle Apex Cloud Service
      • Setting up MySQL PaaS on Oracle Cloud
    • SOA BPM IDM Portal Series
      • FMW
        • PS6, PS7, PS8 Install and Configuration
        • FMW Install Startup Scripts
        • Oracle 11gR2 and 12c Database on Linux / OEL / Fedora
        • Comprehensive Business Process Management - BPM 11g
        • Oracle Identity Mangement
      • Webcenter Portal
        • Webcenter UCM Integration PS5
        • Webcenter, BPM Process Spaces - UCM PS5
        • Webcenter Spaces
          • Custom Landing Page
        • Webcenter Sites Installation Linux
        • Art of Webcenter Templating
        • Webcenter Sites Look n feel
        • BPM UCM and Webcenter PS5
      • Process Cloud Service
        • Part 1 - Working with Process Cloud Service
        • Part 2 – How to Build Process , Data Persistence in Database Cloud Service
        • Part 3 – Invoking PCS Process from Oracle JET Framework
      • BPM Series
        • 01-Simple BPM Task Initiator
        • 02-Business Rules and Exclusive Gateway
        • 03-Service Invocation Adapters
        • 04-BPM as a Web Service
        • 05-Mediator and Conditional Service Routing
        • 06-BPM Composer - Runtime Edit
        • 07-BPM and JMS Adapters
        • Oracle BPM 12c features
      • SOA Series
        • Oracle SOA 11g DB Adapter
        • Oracle SOA 11g Business Rules
        • Oracle SOA 11g Mediator
        • SOA 11g AQ Adapters
        • Oracle OSB 11g

"Technology has the shelf life of a banana. By the time you buy it, implement it and train people on it, it’s obsolete. … ” as said by Mr Scott McNealy

© 2022 Cloud Blogs | Powered by Minimalist Blog WordPress Theme