I’ve just returned from a long tour of Australia and New Zealand (ANZ), where some exciting developments are worth capturing. Both countries are island nations, and one thing Darwin noted in “On the Origin of Species” is that islands can become crucibles of evolution. Australia is evolving a new way to leverage cloud, and New Zealand is evolving a new efficiency model for government security services. Both countries share one aspect with the rest of the world: challenges around encryption.
Australia is evolving multi-cloud
For the last five years, no one has embraced cloud more fully than the Australians. The financial services industry is usually the last to the Cloud party in most regions, but not in Australia. Down Under, the financial services industry has been leading the way with cloud-first policies. Now the Australians are aggressively pursuing the multi-cloud strategy as well.Multi-cloud employs multiple public clouds; AWS, Google, and Azure are among the three largest. It has advantages over a simple cloud-first policy, but security isn’t one of them.
Australians see two main benefits of adopting multi-cloud architecture. Adaptive utility cost is the first. Different cloud providers charge different rates, and these can vary day to day, or even hour to hour. An agile architecture can take advantage of these price differences by shifting compute and storage loads to the current cheapest compute and storage providers.
Second, the Ozzies are keen to avoid a single point of failure; just because cloud is “someone else’s computer” doesn’t mean it is somehow magically immune to operational error. For example, Microsoft’s Azure public cloud suffered a global failure when one of its SSL certificates expired unnoticed. Customers using only Azure during the outage would have been left high and dry. But those with a multi-cloud strategy, in theory, would see their business processes increase production in the other two public clouds to compensate.
One Australian customer wants to build an application with five components, each of which can be in a different public cloud at any time. The components can shift from public cloud to public cloud to take advantage of utility pricing or to avoid outage.
The difficulty here lies in securing the application components when they’re shifting from cloud to cloud. Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted. Each component must treat each of the others as untrusted.
The nascent cloud access security broker (CASB) industry is trying to take on this problem by wrapping each component in its own tunnel and providing layer 2 tunnels to each. This is an interesting approach, but the fact that the CASB provider has to build a virtual cloud among the public cloud reintroduces the single point of failure: the CASB provider itself.
Multi-cloud security is a difficult problem to solve--one that the Australians are graciously tackling before the rest of the world has to.
New Zealand is evolving Telecom-as-a-Service (TaaS)
Managed service providers and resellers in New Zealand are banding together to form a TaaS consortium. TaaS is a new concept in selling both kit and maintenance specifically to sovereign government agencies. With TaaS, the buyer chooses the components (and vendors) of a technical solution, but rents them instead of owning them. The managed service provider also runs the management and operations of the solution.
The driver for TaaS is a change in the way the New Zealand government is allocating funds: capital expenditure is almost impossible to get approved, where operating expenses get approved quite easily. Therefore government agencies are moving toward the TaaS model, where they don’t own the kit or manage the services but still get to choose the solutions. This hasn’t been tried anywhere else in the world (that I know of), so we’ll be keen to see how it works out. The billing model sounds complicated. The consortium is preparing to launch the TaaS model in Australia as well.
Encrypting Down Under
Even though both countries are pioneering these new frontiers, they do have something in common with the rest of the world: challenges around encryption and security. Nearly every organization I visited was excited about F5’s new SSL Recommended Practices (SSL RP). Released late last year, the SSL RP provides a detailed, exhaustive guide for dealing with the encryption challenges that so many organizations are facing as they work to “encrypt everything.”
The SSL Recommended Practices topics include:
- How to get an A+ from Qualys SSL Labs.
- Four ways to perform certificate revocation.
- Three ways to mirror SSL data for high availability.
- Configuring F5 as a forward proxy to support SSL inspection.
- When should an organization use Forward Secrecy?
- Boosting security posture with Strict Transport Security.
The PDF of the SSL Recommended Practices can be downloaded from the F5.com site.
Thanks to the crucial crucibles
The island nations of Australia and New Zealand can be evolutionary crucibles for new technologies. If TaaS succeeds in New Zealand and migrates to Australia, it might grow enough to spread to the rest of the world. Ironing out the wrinkles in the multi-cloud fabric may take longer than the development of TaaS. But if the Australians figure out how to smooth multi-cloud, it's easy to see the entire developed world moving toward it for the betterment of services everywhere. It will take some time, though.
About the Author
Related Blog Posts

Accelerate Kubernetes and AI workloads with F5 BIG-IP and AWS EKS
The F5 BIG-IP Next for Kubernetes software will soon be available in AWS Marketplace to accelerate managed Kubernetes performance on AWS EKS.

The everywhere attack surface: EDR in the network is no longer optional
All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.
F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.