Common Technology Services (CTS)
DRAFT
Connecting your network to a cloud service
Â
Connect directly to cloud providers to improve speed, reliability and security of access to cloud services.
Decide what type of peering you want
This guidance from Common Technology Services is not intended to inform your organisation's buying decisions. Government Digital Service (GDS) does not recommend specific products.
Read this guidance to:
In some cases, organisations need to enhance their existing internet connectivity and use peering. Peering is when you voluntarily interconnect networks that are administratively separate, to exchange traffic directly between the users of each network. To initiate peering with one or more other networks, you need to enable a physical path between them and then exchange routing information using the Border Gateway Protocol (BGP).
Â
In public peering, the participating networks interconnect over a public exchange point. In private peering, the participating networks interconnect over a private exchange point.
For public peering, you need to:
Â
You can request provider independent IP addressing and public ASNs from the Public Services Network (PSN) team.Â
For private peering, you need to use a private ASN with RFC 1918 addresses.
You can connect to a cloud provider over the internet through public peering or with a dedicated private connection, depending on the cloud provider’s requirements. Â
Cloud providers use specific partners to install private connections. Ask your cloud provider for their approved list of service providers. Relevant service providers are available online for:
Private network connections to cloud providers offer:
It is possible to connect the cloud provider directly to the wide area network (WAN). Consider the security of this solution - the cloud provider could have access to every connected site, including offices and datacentres, within the organisation.
In the following diagram a cloud provider is directly connected to an organisation’s WAN with a firewall used to control access to the WAN and any corporate services connected to the WAN.
In the following diagram a cloud provider is connected to an organisation’s WAN with 2 connections to provide resilience. Access to the WAN is controlled by firewalls and network traffic can fail over from one link to the other without affecting the performance of the cloud services.   Â
Different cloud providers offer access to different products over different connectivity solutions. Check with the cloud provider which data is sent over the private connection and which data is sent over the internet.
For example, an application’s dynamic data could be sent over a dedicated private connection, but static content over an internet connection using a content delivery network (CDN). Having a private connection does not mean that all the data will be sent over it. Â
The following diagram outlines a hybrid of direct peering connectivity and internet connectivity. The organisation will connect to different services using the different types of connectivity. The internet link provides some resilience in the event of a connection failure.
Consider how to make the connections resilient by having:
Traffic path selection
Organisations should determine which paths they use to access the cloud provider by changing the BGP attributes applied to their edge routers.
You can alter the path taken for:
Â
Evaluate cloud architecture to meet your security requirements.
Â
Consider:
Â
Most networks operate a perimeter model with security devices such as firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS).
Â
Before leaving the network, traffic from cloud based workloads flows through the security appliances in the perimeter network for policy enforcement, inspection, and auditing purposes. The perimeter network should operate perimeter controls between the cloud networks and the on-premise networks.
Â
Even with peered connectivity, it is still advisable to authorise different individuals to access the perimeter network security infrastructure and be application development, deployment, or operations administrators. Keeping these groups separate prevents a single person from bypassing both application security and network security controls.
When evaluating the connection to the cloud provider, consider:
Find out if:
Consider:
Find out if the cloud provider supports:
Â
When evaluating the location of the cloud provider, consider:
Â
When evaluating the service of the cloud provider, consider:
When purchasing peered connectivity, consider:
Â
Before entering into a contract, think about the exit implications. Consider:
To find out how to control and secure your users when accessing cloud services over the internet then read:
E​mail contact.cts@digital.cabinet-office.gov.uk to​:
Return to the Common Technology Services page.