Published using Google Docs
Connecting your network to a cloud service
Updated automatically every 5 minutes

Mn0ZXu37_400x400.png

Common Technology Services (CTS)

DRAFT

Connecting your network to a cloud service

 

Connect directly to cloud providers to improve speed, reliability and security of access to cloud services.

Decide what type of peering you want

Consider connectivity options

Choose a cloud provider

Consider your exit strategy

This guidance from Common Technology Services is not intended to inform your organisation's buying decisions. Government Digital Service (GDS) does not recommend specific products.

Read this guidance to:

In some cases, organisations need to enhance their existing internet connectivity and use peering. Peering is when you voluntarily interconnect networks that are administratively separate, to exchange traffic directly between the users of each network. To initiate peering with one or more other networks, you need to enable a physical path between them and then exchange routing information using the Border Gateway Protocol (BGP).

 

In public peering, the participating networks interconnect over a public exchange point. In private peering, the participating networks interconnect over a private exchange point.

Decide what type of peering you want

For public peering, you need to:

 

You can request provider independent IP addressing and public ASNs from the Public Services Network (PSN) team. 

For private peering, you need to use a private ASN with RFC 1918 addresses.

Consider connectivity options

You can connect to a cloud provider over the internet through public peering or with a dedicated private connection, depending on the cloud provider’s requirements.  

Cloud providers use specific partners to install private connections. Ask your cloud provider for their approved list of service providers. Relevant service providers are available online for:

Private network connections to cloud providers offer:

Option 1: Wide area network extension

It is possible to connect the cloud provider directly to the wide area network (WAN). Consider the security of this solution - the cloud provider could have access to every connected site, including offices and datacentres, within the organisation.

In the following diagram a cloud provider is directly connected to an organisation’s WAN with a firewall used to control access to the WAN and any corporate services connected to the WAN.

WAN Connectivity.png

Option 2: private connectivity

In the following diagram a cloud provider is connected to an organisation’s WAN with 2 connections to provide resilience. Access to the WAN is controlled by firewalls and network traffic can fail over from one link to the other without affecting the performance of the cloud services.     

Private Connection.png

Option 3: hybrid connectivity

Different cloud providers offer access to different products over different connectivity solutions. Check with the cloud provider which data is sent over the private connection and which data is sent over the internet.

For example, an application’s dynamic data could be sent over a dedicated private connection, but static content over an internet connection using a content delivery network (CDN). Having a private connection does not mean that all the data will be sent over it.  

The following diagram outlines a hybrid of direct peering connectivity and internet connectivity. The organisation will connect to different services using the different types of connectivity. The internet link provides some resilience in the event of a connection failure.

Hybrid Connectivity.png

Resilience

Consider how to make the connections resilient by having:

Traffic path selection

Organisations should determine which paths they use to access the cloud provider by changing the BGP attributes applied to their edge routers.

You can alter the path taken for:

Security controls

 

Evaluate cloud architecture to meet your security requirements.

 

Consider:

 

Most networks operate a perimeter model with security devices such as firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS).

 

Before leaving the network, traffic from cloud based workloads flows through the security appliances in the perimeter network for policy enforcement, inspection, and auditing purposes. The perimeter network should operate perimeter controls between the cloud networks and the on-premise networks.

 

Even with peered connectivity, it is still advisable to authorise different individuals to access the perimeter network security infrastructure and be application development, deployment, or operations administrators. Keeping these groups separate prevents a single person from bypassing both application security and network security controls.

Choose a cloud provider

When evaluating the connection to the cloud provider, consider:

Find out if:

Consider:

Find out if the cloud provider supports:

 

When evaluating the location of the cloud provider, consider:

 

When evaluating the service of the cloud provider, consider:

When purchasing peered connectivity, consider:

Consider your exit strategy

 

Before entering into a contract, think about the exit implications. Consider:

Read more on this topic

To find out how to control and secure your users when accessing cloud services over the internet then read:

E​mail contact.cts@digital.cabinet-office.gov.uk to​:

Return to the Common Technology Services page.