Private Cloud Security Challenges
The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes thathttp://blogs.technet.com/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-85-24-metablogapi/5658.image_5F00_64BCDD48.png characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured services. For each of these attributes, this section:
- Identifies the potential impact of the attribute on the design of the security functionality in your private cloud.
- Describes how the cloud security design principles apply to the detailed design of the features that support the cloud attribute.
We will cover the following private cloud security challenges:
- Private Cloud Security Challenges - Resource Pooling
- Private Cloud Security Challenges - Broad Network Access
- Private Cloud Security Challenges - On Demand Self Service
- Private Cloud Security Challenges - Rapid Elasticity
- Private Cloud Security Challenges - Measured Services
RESOURCES:
ACKNOWLEDGEMENTS LIST:
If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below:
[Enter your name here and include any contact information you would like to share]
Return to Design Guide for Private Cloud Security
Return to A Solution for Private Cloud Security
Return to Reference Architecture for Private Cloud
Move forward to Private Cloud Security Challenges - Resource Pooling