Overview
There are three distinct cloud service delivery models: 1. Software-as-a-Service (SaaS), 2. Platform-as-a Service (PaaS) and 3. Infrastructure-as-a-Service (IaaS). These three models are distinct, at different stages
in their maturity lifecycle and have different security ramifications. For example, SaaS is the oldest, most
mature, secure and stable model and has been around since 1999. Salesforce.com is the founder of and
leader of the SaaS model. PaaS is the next most mature and stable delivery model. One of the “pure play”
PaaS providers is OpSource which has been in business since 2002. Many of the PaaS provides such as
Rackspace have been around for quite some time and were previously known as ASPs or MSPs. The IaaS
delivery model is much more recent and major entrants include Amazon, Microsoft, IBM and Google.
Amazon is the most established cloud entrant, however, their Elastic Compute Cloud (EC2) service has only
been generally available in the market since 2008.
SentryBlue SaaS Service
- One way encrypted passwords used for user authorization/authentication
- Secure Sockets Layer (SSL) – Digital certificate authority enabling secure e-commerce communications and interacting with web sites and intranets
- Information protection from unauthorized discovery over the network
- Ensuring that the data provided is secure and the employees of the SaaS provider are not in a position to misuse the data
- Payment Card Industry (PCI) Data Security Standard (DSS) for billing and payment processing
- Rapid bug fixes, enhancements and iterative releases go through extensive testing and are only published by trusted sources
- Data portability and separation from the application and PaaS platform
Northstar PaaS Service
- Offsite/off-premise for both private and special needs schools and SentryBlue for critical incident management and recovery
- Intrusion Detection Software (IDS) for firewall rule sets
- 1024 bit encryption to secure communication from the Web browser to the host computer
- Valid identity and connected device security policy compliance
- Frequent application of server hardening techniques including bug fixes, security patches, penetration testing, etc. to ensure that the underlying systems (i.e., Web, database, application servers) are secure
- Performance of both internal and external penetration testing
- Data security and privacy behind Northstar's firewall
- High availability and recovery
- Disaster recovery and business continuity planning – Addressing what happens in the event of a disaster and how quickly the application can be up and running in the event of a disaster
Northstar Facility and Monitoring
- Internal and external 24/7 security monitoring
- Ensuring valid identity and connected device security and compliance
- Multiple ISP connections and dual fiber entrances for redundancy
- Card key access system
- Power distribution monitoring and dual power feed
- Redundant generator backup
- Temperature and water monitoring
- Fire detection and suppression system
- Concrete enclosed facility rated to withstand an F3 Tornado
Regulatory and Compliance
- Third-party SAS 70 security and privacy audit compliance
- Payment Card Industry (PCI) Data Security Standard (DSS) for billing and payment processing