homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. What is Cloud Infrastructure?
ChrisEdmundson_370x370.png
Chris Edmundson

What is Cloud Infrastructure?

It’s a bit like “Tetris”

July 31, 2023

What is Cloud Infrastructure?

Cloud infrastructure is the choreography of servers, storage, network, and other resources hosted by a public or private cloud provider to enable the delivery of on-demand cloud computing services supporting various applications and data storage needs.

Cloud infrastructure might best be compared to the game Tetris by orchestrating the use of a variety of structured building blocks mixed with the elasticity of "silly putty" for constructing an organization's data processing needs. One of the biggest drivers for the movement to the cloud is to reduce the need for a significant investment in development & infrastructure, so many organizations are choosing to buy versus build their infrastructure, avoiding much of the administrative overhead with an on-premise solution. Additionally, many organizations are empowered by adopting cloud infrastructure so they can rapidly bring new capabilities to market with a flexible and scalable platform for storing, managing, and accessing data via applications over the Internet. In this blog post, we'll discuss the inner workings of cloud infrastructure, discovering its key components, benefits, and its value to various industries.

Cloud Infrastructure vs. Cloud Architecture

While a symbiotic relationship exists between cloud infrastructure and cloud architecture, they are distinctly different concepts within the realm of cloud computing. Cloud infrastructure is generally the objects, the physical and virtual resources provided by a cloud service provider to host and manage applications, data, and services – typically identified by the hardware components such as servers, storage, networking devices, and data centers, along with the virtualization layer.

Whereas cloud architecture applies to the design and orchestration of these resources to create a scalable, reliable, and efficient cloud environment. Cloud architecture includes making design decisions about the deployment of applications, the storing, processing, and access of data, the network layout, and the application of security controls to ensure compliance. Cloud infrastructure forms the foundation based on the cloud architecture’s prescription; while cloud infrastructure focuses on the raw resources, cloud architecture focuses on their strategic arrangement to achieve specific business goals defined by the requirements of an organization.

Components of Cloud Infrastructure

Cloud infrastructure encompasses many of the same components or services organizations are accustomed to in their on-premises data center, including, but not limited to:

  • Physical Hardware: includes various hardware such as networking devices, like switches, routers, firewalls, and load balancers, storage arrays, backup devices, and servers.
  • Compute: accountable for the virtualization layer; the execution and maintenance of virtual machines, containers, and other activities.
  • Storage: typically, redundant disk arrays or large storage area networks (SAN) which can scale out exponentially & provide high-speed network access to volumes for virtualized disks, backups, and other object stores.
  • Networking: beyond the physical network hardware, many cloud providers leverage software defined networking; allowing customers control over layer 3-7 of the OSI Reference Model.
  • Security: a wide range of capabilities, including, but not limited to encryption, identity & access management, web application firewalls, credential stores, hardware security modules, and monitoring.
  • Management: cloud infrastructure management most frequently leverages a web-based console; however, the command line (CLI) interface can also be leveraged for automating most of the management tasks.

These combined components are the foundation that several cloud service providers offer as a product known as the infrastructure as a service (IaaS) cloud computing model. A very popular approach for many organizations is to "lift and shift" their on-premise solutions by migrating their applications, infrastructure, and associated data to the cloud with minimal or no changes -- leveraging the IaaS cloud computing model. The key difference is now the cloud service provider is primarily responsible for maintaining and optimizing these robust and flexible components for your organizational benefit. Another key difference for most consumers and relevant from a security perspective is a shared infrastructure, such as the storage, compute, and networking capabilities which are shared by multiple customers.

Key Features and Benefits of Cloud Infrastructure

Cloud infrastructure enables organizations to quickly scale their cloud computing resources up or down, providing the elasticity to meet their business needs. This scalability of infrastructure offered by cloud service providers promises efficient resource utilization, budgetary optimization, and increased agility. Both vertical scaling, the concept of adding/removing resources to an existing virtual machine and horizontal scaling, the method for increasing/decreasing the number of virtual machines in a resource pool, are commonly used across the various providers (see Figures 1 and 2). Additionally, when well architected, cloud infrastructure offers reliability through highly available and fault tolerant systems, minimizing downtime and increased uptime for service availability across the cloud service provider's availability zones and regions. Most importantly, the security components offered can provide strong security controls, including data encryption, access controls, backup & recovery mechanisms, enhancing data protection and compliance.

Figure 1. Vertical Scaling1

Figure 2. Horizontal Scaling1

Types of Cloud Infrastructure

Cloud infrastructure can be categorized into three main types: public, private, and hybrid. Public cloud infrastructure is a managed service provided by third-party cloud service providers (i.e., AWS, Azure, and GCP) where consumers can subscribe to offerings, utilizing a shared cloud infrastructure, and typically connecting to the resources over the Internet. Private cloud infrastructure is a dedicated environment usually for a single organization using on-premise equipment allowing for enhanced control and security over their sensitive data often to accommodate regulatory requirements. Hybrid cloud infrastructure blends the characteristics of both public and private clouds, permitting organizations to take advantage of the benefits of both models.

Practical Examples of Cloud Infrastructure

With any number of components inside cloud infrastructure, organizations can architect and construct a wide variety of systems. One of the most common use cases is the deployment of web applications, using load balancing to assist with fault tolerance, and some type of backend database for storing sensitive information. Here are a few examples that demonstrate the orchestration of many of the cloud infrastructure components from Azure, AWS, and GCP to further illustrate this common scenario.

Azure: Web application with Relational database2

AWS: Highly Available PHP Application3

GCP: Load Balancing4

Continue Your Cloud Infrastructure Journey with Cloud Security

Overall, cloud infrastructure is the backbone for business activities and data processing, providing organizations with the agility, scalability, resiliency, and cost efficiency necessary to flourish. A well-architected cloud environment, utilizing the components of cloud infrastructure, permits the organization to focus on its business objectives while transferring many of the complex tasks of infrastructure management to the cloud service providers.

Learn more about cloud infrastructure and the relationship with security practices from SANS Cloud Security training courses at sans.org/cloud-security/

References:

[1] https://learn.microsoft.com/en-us/azure/azure-monitor/autoscale/autoscale-overview

[2] https://learn.microsoft.com/en-us/azure/architecture/high-availability/ref-arch-iaas-web-and-db

[3] https://d1.awsstatic.com/architecture-diagrams/ArchitectureDiagrams/scaling-PHP-applications-on-AWS-ra.pdf?did=wp_card&trk=wp_card

[4] https://cloud.google.com/architecture/scalable-and-resilient-apps

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • LDR414: SANS Training Program for CISSP® Certification™
  • SEC549: Cloud Security Architecture
  • LDR516: Building and Leading Vulnerability Management Programs™

Tags:
  • Cloud Security

Related Content

Blog
SANS_Cloud_Security_340x340.png
Cloud Security
December 11, 2024
SANS Cloud Security Curriculum
The SANS Cloud Security Curriculum is growing fast – like the Cloud itself.
370x370_Frank-Kim.jpg
Frank Kim
read more
Blog
340x340.png
Cloud Security
September 30, 2024
A Visual Summary of SANS CloudSecNext Summit 2024
Check out these graphic recordings created in real-time throughout the event for SANS CloudSecNext Summit 2024
No Headshot Available
Alison Kim
read more
Blog
cloudsecnext_blog_image.png
Cloud Security, DevSecOps
October 16, 2023
A Visual Summary of SANS CloudSecNext Summit 2023
SANS CloudSecNext Summit was hybrid event for the cloud security community. Check out these graphic recordings of the talks created in real-time.
No Headshot Available
Alison Kim
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn