Amazon does virtual private clouds

Next step, real private EC2 clouds?


Early this morning, the Amazon Web Services division of online retailing giant Amazon announced something that more than a few businesses have been waiting for: a complete virtual private cloud hosted on the company's Elastic Compute Cloud.

With the new Amazon Virtual Private Cloud, or VPC for short, the company is carving out a chunk of its EC2 cloud and isolating it, then giving enterprises the ability to directly link to the virtual server infrastructure through a virtual private network (VPN) link over the Internet and use the same firewalls, intrusion detection systems, and other security resources they deploy for their internal and external IT equipment and users. From the standpoint of system and network administrators, this makes a chunk of EC2 virtual machines logically indistinguishable from the other infrastructure they manage every day.

Right now, only the EC2 compute cloud service is available through the VPC offering, but other AWS services are expected to be delivered with the VPC packaging at some undefined point in the future. The VPC service allows companies to create EC2 instances and assign them internal (to the company) IP address ranges and subnets and then link internal IT servers, storage, and networks to these EC2 resources using an encrypted IPsec VPN link.

Under the VPC bundle, you don't have to make lengthy commitments, just as it’s the case with the EC2 and other AWS cloud services. The VPN link costs 5 cents per connection-hour, and it costs 10 cents per GB to move data into the EC2 instances through the VPN and data flow out of the EC2 instances into the data center varies depending on the volume.

It costs 17 cents per GB for the first 10 TB of data per month coming out of the EC2 images, and the price can get as low as 10 cents per GB if customers move over 150 TB per month in aggregate. (That's not chump change, but rather $15,000. A nice piece of business for Amazon, if it gets customers moving that much data.)

You can find out more about Amazon VPC here.

What would probably make some enterprise shops more comfortable is to actually be able to get an Amazon cluster running inside their own data centers, and then let Amazon VPN into these boxes and manage them locally to the company and actually put them inside the corporate firewalls. For server-hugging, security-wary CIOs, even having a VPN is not enough when you are talking about mission-critical applications and corporate data. They want the data to only be on the physical disks in their physical data center, and for the applications to be running there, too.

It would be interesting to see Amazon AWS move from cloud to virtual private cloud to on-site private clouds as it builds out its business, and if customers are hesitant to use the VPC offering except for application test and development and maybe some Web services, it is reasonable to expect that Amazon will start deploying infrastructure locally for the big IT organizations that are willing to pony up the space and cash to get it.

In addition to the VPC announcement, Amazon said that it is now allowing multi-factor authentication, which requires AWS users to provide a six-digit, rotating code provided by a physical device supplied by Amazon before they can make changes to their AWS virtual infrastructure settings. AWS MFA will be available in a few weeks, and you can find out more here.

Amazon also said that in the fall, the company will allow multiple AWS accounts to be consolidated, so companies with many AWS users can get one bill instead of many each month from Amazon. The consolidated bills will offering the ability to drill down and see which account is doing what, which is what the bean counters and managers need. ®

Similar topics


Other stories you might like

  • Millions of people's info stolen from MGM Resorts dumped on Telegram for free
    Meanwhile, Twitter coughs up $150m after using account security contact details for advertising

    Miscreants have dumped on Telegram more than 142 million customer records stolen from MGM Resorts, exposing names, postal and email addresses, phone numbers, and dates of birth for any would-be identity thief.

    The vpnMentor research team stumbled upon the files, which totaled 8.7 GB of data, on the messaging platform earlier this week, and noted that they "assume at least 30 million people had some of their data leaked." MGM Resorts, a hotel and casino chain, did not respond to The Register's request for comment.

    The researchers reckon this information is linked to the theft of millions of guest records, which included the details of Twitter's Jack Dorsey and pop star Justin Bieber, from MGM Resorts in 2019 that was subsequently distributed via underground forums.

    Continue reading
  • DuckDuckGo tries to explain why its browsers won't block some Microsoft web trackers
    Meanwhile, Tails 5.0 users told to stop what they're doing over Firefox flaw

    DuckDuckGo promises privacy to users of its Android, iOS browsers, and macOS browsers – yet it allows certain data to flow from third-party websites to Microsoft-owned services.

    Security researcher Zach Edwards recently conducted an audit of DuckDuckGo's mobile browsers and found that, contrary to expectations, they do not block Meta's Workplace domain, for example, from sending information to Microsoft's Bing and LinkedIn domains.

    Specifically, DuckDuckGo's software didn't stop Microsoft's trackers on the Workplace page from blabbing information about the user to Bing and LinkedIn for tailored advertising purposes. Other trackers, such as Google's, are blocked.

    Continue reading
  • Despite 'key' partnership with AWS, Meta taps up Microsoft Azure for AI work
    Someone got Zuck'd

    Meta’s AI business unit set up shop in Microsoft Azure this week and announced a strategic partnership it says will advance PyTorch development on the public cloud.

    The deal [PDF] will see Mark Zuckerberg’s umbrella company deploy machine-learning workloads on thousands of Nvidia GPUs running in Azure. While a win for Microsoft, the partnership calls in to question just how strong Meta’s commitment to Amazon Web Services (AWS) really is.

    Back in those long-gone days of December, Meta named AWS as its “key long-term strategic cloud provider." As part of that, Meta promised that if it bought any companies that used AWS, it would continue to support their use of Amazon's cloud, rather than force them off into its own private datacenters. The pact also included a vow to expand Meta’s consumption of Amazon’s cloud-based compute, storage, database, and security services.

    Continue reading

Biting the hand that feeds IT © 1998–2022