Our last blog introduced the Cloud, and some of the advantages that it can bring to your business. A formal definition of it was also provided. However, although migrating and using the Cloud to house your IT Infrastructure does ensure a much better level of Security than having it On Premises. There are some Security vulnerabilities that need to be addressed, and the use of Biometrics can help in this regard.
In this blog, we review the first layer of the Cloud, the “Infrastructure as a Service”, or the “IaaS” for short, and how Biometrics can be used to further protect it.
As its name implies, the IaaS provides the framework or the foundation from which all of the IT assets and IT resources can be leveraged towards the end user, whether it is a business or a corporation, or even just an individual.
The IaaS, in particular, includes the hardware, network connectivity, all of the software applications (which includes for example, all of the VoIP applications, E-Mail applications, database applications, software development applications, etc.) as well as the other “raw” tools which helps to comprise this Infrastructure.
So as one can see, the IaaS platform is literally stored in physical servers, and then are partitioned off into instances of virtual servers that each end user will have of their own.
How Can Biometrics Be Used to Protect the IaaS?
Since these servers are probably stored in large data centers, having superior levels of secure Physical Access Entry points is key. At the current time, most of the security measures that are used to protect the rooms in which the IaaS servers are stored in make use of smart cards, ID badges, using a secure FOB, etc. But these have their inherent security weaknesses. For instance, what if any of these mechanisms are lost or stolen, or worst yet, what if another employee gives out their credentialing tools to another employee so that they can gain access as well, when they are not supposed to?
In these instances, you need a device which not only let’s just authorized users to enter the area in which the IaaS resides in but can also 100% confirm their identity as well. Probably the best suited tool for this situation is the Hand Geometry Scanner.
From here, the end user (which is typically the employee), would align their hand into the pegs, which is outlined in the picture.
At this point, over 96 measurements of the hand are taken in a rapid, successive fashion. From here, the raw image is compiled, and the unique features are then extracted. This same process is used to compile both the Enrollment and Verification Templates.
So, if an employee wants to gain access to the secure area which houses the IaaS servers, he or she would have their hand scanned, in a process that takes under two seconds. If there is enough statistical correlation between the two Templates as just described, the employee is allowed access to the IaaS servers.
It should be noted that the Hand Geometry Scanner would be wired to an electromagnetic lock strike, and upon successful identification of the employee, this lock strike would then automatically open the door for the employee to enter into.
Our next blog will examine how Biometrics can be used to protect the next layer of the Cloud, which is the “Platform as a Service”, or “PaaS”.