How secure is a cloud?

cur­rent:

Hear­ing Sen­ate
France 2025

read now

Many com­pa­nies are think­ing about obtain­ing some of these ser­vices from the cloud in the future. Well-known providers include Ama­zon, Microsoft, Google etc. The advan­tages for the com­pa­ny are

  • Low­er hard­ware costs per location
  • More secu­ri­ty against failures
  • Small­er eco­log­i­cal footprint
  • Eas­i­er step-by-step scal­ing if required

Large play­ers from the USA have dom­i­nat­ed the cloud from the pub­lic sec­tor. Many com­pa­nies appre­ci­ate the abil­i­ty to con­ve­nient­ly obtain cloud ser­vices, regard­less of where the asso­ci­at­ed data cen­tre is locat­ed. How­ev­er, the move to the cloud is not only being dri­ven by the big tech giants. Swiss providers are in an extreme­ly favourable posi­tion to offer their cus­tomers greater secu­ri­ty. Pri­vate cloud providers can dis­pel many cloud con­cerns.

Let’s take data pro­tec­tion. Not all com­pa­nies want their data to be stored on US or Chi­nese servers. Pub­lic cloud cus­tomers have no say in the loca­tion. What if a secret ser­vice asks the provider, for what­ev­er rea­son, to hand over your customer’s data? This is a par­tic­u­lar­ly sen­si­tive issue when it comes to sen­si­tive data. This is pre­cise­ly where Swiss cloud providers stand out from for­eign providers.

Cloud providers that offer their ser­vices from a pri­vate, Swiss cloud infra­struc­ture use the «Swiss­ness fac­tor» to assert them­selves against inter­na­tion­al tech giants. With a Swiss provider, cus­tomers can be sure that their data will remain in Switzer­land. This is a deci­sive fac­tor for many companies.

Bro­ker­Star is also oper­at­ed in a Swiss pri­vate cloud. Most cus­tomers use this ser­vice. The Swiss Host­ing label ensures that the data remains exclu­sive­ly in Switzerland. 

Cloud providers require a data cen­tre from which the ser­vices offered, such as Soft­ware-as-a-Ser­vice, are pro­vid­ed. This requires the fol­low­ing components.

- Vir­tu­alised stor­age
Stor­age capac­i­ty is pooled from sev­er­al phys­i­cal sys­tems and offered to users as indi­vid­ual, cen­tral­ly con­trol­lable stor­age. The phys­i­cal stor­age is copied and made avail­able as a vir­tu­al «Stor­age Attached Net­work» (vSAN) pool. The appli­ca­tions used from this pool run on vir­tu­al machines (VMs).

- Vir­tu­alised serv­er
With serv­er vir­tu­al­i­sa­tion, CPU pow­er is vir­tu­alised instead of mem­o­ry. Phys­i­cal servers are divid­ed into sev­er­al sep­a­rate vir­tu­al serv­er envi­ron­ments using vir­tu­al­i­sa­tion soft­ware. The users work inde­pen­dent­ly on each vir­tu­al server.

- Vir­tu­alised net­work
Net­work vir­tu­al­i­sa­tion ensures that phys­i­cal net­works in sev­er­al vir­tu­al envi­ron­ments are man­aged inde­pen­dent­ly of each oth­er. Routers or switch­es are man­aged centrally.

- ICT secu­ri­ty
And then you need all kinds of secu­ri­ty devices, from fire­walls with DMZs to virus pro­tec­tion, intru­sion detec­tion and oth­er mea­sures to pro­tect devices, soft­ware and data from mali­cious attacks