Task
Map the security workload to the appropriate cloud delivery model and hosting models under consideration. Purpose Now that you understand the importance of your asset, you can evaluate the risks associated with various deployment models. Additional Considerations Are you considering a private, public, or hybrid cloud delivery model? For a private cloud, will your deployment be: o On-premises? o Off-premises with a dedicated or shared infrastructure? For hybrid models, where will the various components, functions, and data reside? How will you mitigate risk within the cloud delivery model? What are the specific requirements for handling regulated data? Determine whether the available services are capable of meeting your requirements for handling data, especially for compliance purposes. Map the data flow, especially for public or hybrid cloud providers. At this point, you need to understand your risk tolerance for the workload. If you have a cloud service provider in mind, you can conduct a more detailed risk assessment. You need to know how data moves in and out of the cloud. For specific deployment options, you should understand how data will flow between your organization, the cloud services, and any customers (or other areas). Can the provider continue to deliver protection as the workload continues to evolve? 7 Intel IT Center Planning Guide | Cloud Security
Cloud Computing Security Planning Guide - Page 0001.html
Cloud Computing Security Planning Guide - Page 0002.html
Cloud Computing Security Planning Guide - Page 0003.html
Cloud Computing Security Planning Guide - Page 0004.html
Cloud Computing Security Planning Guide - Page 0005.html
Cloud Computing Security Planning Guide - Page 0006.html
Cloud Computing Security Planning Guide - Page 0007.html
Cloud Computing Security Planning Guide - Page 0008.html
Cloud Computing Security Planning Guide - Page 0009.html
Cloud Computing Security Planning Guide - Page 0010.html
Cloud Computing Security Planning Guide - Page 0011.html
Cloud Computing Security Planning Guide - Page 0012.html
Cloud Computing Security Planning Guide - Page 0013.html
Cloud Computing Security Planning Guide - Page 0014.html
Cloud Computing Security Planning Guide - Page 0015.html
Cloud Computing Security Planning Guide - Page 0016.html
Cloud Computing Security Planning Guide - Page 0017.html
Cloud Computing Security Planning Guide - Page 0018.html
Cloud Computing Security Planning Guide - Page 0019.html
Cloud Computing Security Planning Guide - Page 0020.html
Cloud Computing Security Planning Guide - Page 0021.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia