The Service Design paper discusses private cloud security from the design perspective, offers guidance for creating a security design for a private cloud, and discussesimage some of the design decisions you will have to make. In some areas, this paper discusses specific products in relation to the security design, but many of the decisions organizations must make will use similar criteria in environments that use alternative products.

The overall focus of this paper is on private cloud security and the special considerations that these environments bring. Hence, this content covers only the differences between private cloud security and traditional data center security, rather than the entire security domain. This paper focuses on what is new and different in private cloud security by referring to the key cloud attributes identified by NIST:

  • Broad network access
  • Resource pooling
  • On-demand self-service
  • Rapid elasticity
  • Measured services

The relative importance of these attributes will be different in a private cloud as compared to a public cloud, but all five will have some impact on your security design.

Aim of this Paper

The aim of this paper is to help you create an effective security design for an enterprise private cloud infrastructure. The overall approach is to be product and technology agnostic, but in some places, this paper will refer to the way in which Microsoft technologies can be an integral part of the private cloud security design.


Note:
This document is part of a collection of documents that comprise the Reference Architecture for Private Cloud document set. The Solution for Private Cloud is a community collaboration project. Please feel free to edit this document to improve its quality. If you would like to be recognized for your work on improving this document, please include your name and any contact information you wish to share at the bottom of this page



The Design Guide for A Solution for Private Cloud Security contains two major sections:

Private Cloud Security Design Principles

Private Cloud Security Challenges

RESOURCES:

 

ACKNOWLEDGEMENTS LIST:
If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below:
[Enter your name here and include any contact information you would like to share]

Return to A Solution for Private Cloud Security

Return to Reference Architecture for Private Cloud

Move forward to Private Cloud Security Design Principles


Table of Contents for A Solution for Private Cloud Security