The previous section outlined the cloud security operational principles that should apply to all operational activities. This section examines the key attributes thatimage characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured services.

For each of these attributes, this section:

  • Identifies the potential impact of the attribute on the design of the operational security in your private cloud.
  • Describes how the cloud security operational principles apply to the operational activities that support the cloud attribute.

This paper outlines the new and different security challenges that you should address when you are planning and executing your operational procedures in a private cloud infrastructure. It examines the essential attributes of cloud architectures (resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured services), and identifies for each of these attributes the potential impact it has on the operational security of your private cloud.


Note:
This document is part of a collection of documents that comprise the Reference Architecture for Private Cloud document set. The Solution for Private Cloud is a community collaboration project. Please feel free to edit this document to improve its quality. If you would like to be recognized for your work on improving this document, please include your name and any contact information you wish to share at the bottom of this page


Private cloud security operations challenges are addressed in the following areas:   

Resource Pooling

Broad Network Access

On-demand Self Service

Rapid Elastisity

Measured Services

REFERENCES:

ACKNOWLEDGEMENTS LIST:
If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below:
[Enter your name here and include any contact information you would like to share]

Return to Operations Guide for A Solution for Private Cloud Security

Return to A Solution for Private Cloud Security


Return to Reference Architecture for Private Cloud

Move forward to Private Cloud Operations Challenges - Resource Pooling

Table of Contents for A Solution for Private Cloud Security