MarketplaceCommunityDEENDEENProductsCloud ServicesRoadmapRelease NotesService descriptionCertifications and attestationsPrivate CloudManaged ServicesBenefitsSecurity/DSGVOSustainabilityOpenStackMarket leaderPricesPricing modelsComputing & ContainersStorageNetworkDatabase & AnalysisSecurityManagement & ApplicationsPrice calculatorSolutionsIndustriesHealthcarePublic SectorScience and researchAutomotiveMedia and broadcastingRetailUse CasesArtificial intelligenceHigh Performance ComputingBig data and analyticsInternet of ThingsDisaster RecoveryData StorageTurnkey solutionsTelekom cloud solutionsPartner cloud solutionsSwiss Open Telekom CloudReferencesPartnerCIRCLE PartnerTECH PartnerBecome a partnerAcademyTraining & certificationsEssentials trainingFundamentals training coursePractitioner online self-trainingArchitect training courseCertificationsCommunityCommunity blogsCommunity eventsLibraryStudies and whitepaperWebinarsBusiness NavigatorMarketplaceSupportSupport from expertsAI chatbotShared ResponsibilityGuidelines for Security Testing (Penetration Tests)Mobile AppHelp toolsFirst stepsTutorialStatus DashboardFAQTechnical documentationNewsBlogFairs & eventsTrade pressPress inquiriesMarketplaceCommunity

0800 3304477 24 hours a day, seven days a week

Write an E-mail 

Book now and claim starting credit of EUR 250
ProductsCloud ServicesPrivate CloudManaged ServicesBenefitsPricesPricing modelsPrice calculatorSolutionsIndustriesUse CasesTurnkey solutionsSwiss Open Telekom CloudReferencesPartnerCIRCLE PartnerTECH PartnerBecome a partnerAcademyTraining & certificationsCommunityLibraryBusiness NavigatorMarketplaceSupportSupport from expertsHelp toolsTechnical documentationNewsBlogFairs & eventsTrade pressPress inquiries
  • 0800 330447724 hours a day, seven days a week
  • Write an E-mail 
Book now and claim starting credit of EUR 250

Cloud Firewall offers enhanced cloud security 

by Redaktion
Illustration mit Darstellungen von unterschiedlichen Sicherheitsmechanismen
The cloud requires different security mechanisms for an appropriate level of security.
 

In this article you will read about,

  • what is behind the new cloud security service,
  • what the cloud firewall can be used for
  • and how it helps to meet compliance requirements.

Is the cloud secure or insecure? Opinions differ widely on this. The fact is that the cloud – just like traditional on-premises systems - needs suitable security mechanisms to offer an appropriate level of security. With the Cloud Firewall, the Open Telekom Cloud offers a new top security package. With the combination of Cloud Firewall, Host Security Service and Database Security Service, cloud users receive a security package that no other cloud provider in Europe offers. 

Cloud security at a glance

A good level of security is particularly important for cloud workloads that support business processes - hardly any company will want services to be unavailable due to cyber attacks. Keyword: resilience. However, resilience is not only a corporate concern, but is also increasingly required by (European and national) directives. One example of this is the new IT Security Act (“systems for attack detection”, Section 8a (1a)).

In case of doubt, cloud users must prove to supervisory authorities that they are taking sufficient care to ensure the security of the cloud systems they use. In addition to the right architecture, this requires security concepts and mechanisms that are mapped using suitable tools. This can be time-consuming.

The cloud provider is responsible for “basic security”. But in the “shared responsibility” concept, the user company must also make a significant contribution to security. Cloud providers such as the Open Telekom Cloud do not leave their users to fend for themselves. They provide a wide range of security tools that can be used natively and easily on the platform. In 2024, for example, we introduced the Host Security Service (HSS). Among other things, it provides intrusion detection features at host level via agents (Host Intrusion Detection System, HIDS), but also protects virtual machines and containers against malware and scans them for vulnerabilities and insecure configurations in the operating system. At the beginning of 2025, the Open Telekom Cloud supplemented the HSS with a Cloud Firewall (CFW) at network level (Network Intrusion Detection System, NIDS). This provides Open Telekom Cloud users with a perfect all-round carefree package for attack detection.

What is the Cloud Firewall?

The Cloud Firewall (CFW) is a next-generation cloud-native firewall. It protects the Internet perimeter and the VPC perimeter in the cloud through real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit and tracing.

Essentially, the CFW covers three use cases:
 

  1. It controls data traffic from the internet to the cloud (north-south traffic)
    As an intrusion prevention system (IPS), the CFW detects malicious data traffic and blocks it before it reaches cloud resources in a user's virtual private cloud.
  2. It controls data traffic from the cloud
    With the functionality of the CFW, cloud administrators can prevent their own cloud resources from unauthorized access to external resources (e.g. those classified as dangerous or non-compliant).
  3. It monitors data traffic within the cloud (east-west traffic)
    The so-called Inter-VPC access control acts as an internal traffic control system to prevent unauthorized access to other resources within the Open Telekom Cloud.

Webinar recording: Securing your cloud

In our webinar, we introduced you to the new Cloud Firewall Service. Discover how to defend against threats and protect your data efficiently!

Watch the webinar


The security functions of the Cloud Firewall

The CFW is offered cloud-native via the console or API exclusively in a full Professional Edition, which performs all the functions of an intrusion detection system (IDS) or an intrusion prevention system (IPS). There is no limited “basic version”. Specifically, the CFW covers five functionalities: Access control, attack prevention, data traffic analysis, log management and system management.

All functions can be used with default settings or configured individually. The cloud firewall therefore offers maximum flexibility.

Access control
  • Control traffic at Internet and VPC boundaries based on IP addresses, regions and domain names
  • Use the policy wizard to quickly check protection rule matches
Attack defense
  • Intrusion Prevention System (IPS)
  • User-defined IPS signature database
  • Virtual patching
  • Sensitive directories and reverse shells
  • Antivirus
  • Security dashboard
The security dashboard visualizes the key metrics.
Analysis of data traffic
  • Incoming traffic
  • Outgoing traffic
  • Inter-VPC access
Log management
  • Attack event logs
  • Access control logs
  • Traffic logs
  • Log Tank Service (LTS) for recording all CFW logs
System administration
  • Alarm notification
  • Network packet capture
  • DNS configuration
  • Security report
Cloud Firewall provides detailed weekly security reports.

The CFW helps users of the Open Telekom Cloud to efficiently control the larger attack surfaces through cloud use. It offers transparency and control and enables compliance requirements such as PCI DSS, HIPAA and GDPR to be met.

With the release of the Cloud Firewall, the Open Telekom Cloud as a European provider offers an exclusive and (in combination with HSS) comprehensive security services package. Thanks to its attack detection functions, the CFW is on a par with the Azure Firewall (Premium), the Google Cloud NGFW (Enterprise) or the AWS Network Firewall (Advanced Inspection Endpoint).

Try it now!

A cloud firewall can protect up to 1,000 Elastic IPs (EIP) and 20 Virtual Private Clouds (VPS). It offers 1 Gbps bandwidth (200 Mbps Internet Border, 800 Mbit VPC Border). It is of course billed in an “as-a-service” cloud model (according to runtime and traffic). More information on the product page.


This content might also interest you
 

Stylization of a digital cloud with padlock and networking lines

Cloud Firewall

With its advanced features and capabilities, Cloud Firewall helps you create a secure and isolated environment for your applications and data while ensuring compliance with regulatory requirements.

 
Cloud security: Host Security Service protects servers and containers

New Cloud Security Services

Cloud security is a key issue when using the cloud. With the Host Security Service (HSS), the Open Telekom Cloud is introducing a new suite of security services that enables comprehensive, automated security management of complete application landscapes.

 
Hands of a man on a laptop keyboard, in the foreground of the picture a digital lock in a cloud

Gold standard in the cloud industry: Open Telekom Cloud certified according to BSI C5:2020, and SOC 1, SOC 2, SOC 3

The Open Telekom Cloud meets the strict requirements of the BSI C5:2020 cloud test certificates as well as the SOC 1, SOC 2 and SOC 3 requirements catalog.

 

The Open Telekom Cloud Community

This is where users, developers and product owners meet to help each other, share knowledge and discuss.

Discover now

Free expert hotline

Our certified cloud experts provide you with personal service free of charge.

 0800 3304477 (from Germany)

 +800 33044770 (from abroad)

 24 hours a day, seven days a week

Write an E-Mail

Our customer service is available free of charge via E-Mail

Write an E-Mail

AIssistant Cloudia

Our AI-powered search helps with your cloud needs.