Cloud Delivery Models at a Glance
Cloud delivery models used by enterprise organizations generally fall into three types, each with its own unique advantages and disadvantages in terms of security. Model Private Description An internal infrastructure that leverages virtualization technology for the sole use of an enterprise behind the firewall Can be managed by the organization or by a third party Located on-premises or off-premises on shared or dedicated infrastructure Resources dynamically provisioned over the Internet, via web services, or from a third-party provider Located off-premises, typically on a shared (multitenancy) infrastructure May offer dedicated infrastructure as a response to growing security concerns Advantages and Disadvantages Most control over data and platform Potential for multitenancy of business units to cause compliance and security risk May lack bursting capabilities when additional performance or capacity is required Public Potential for greater cost savings if infrastructure owned and managed by public provider Loss of control of data and platform Potential for multitenancy with other organizations to cause security risk Third-party security controls possibly not transparent (and may cause unknown risks) Often a compromise: o Retention of control over the most mission-critical data, but relinquishing that control when additional capacity or scale is required during peak or seasonal periods o May involve retention of control for mission-critical data at all times while taking advantage of public cloud provider services for less sensitive areas Potential for complexity to cause unknown vulnerabilities (and unknown risks) Hybrid A combination of private and public cloud services Organizations that often maintain mission-critical services privately with the ability to cloud burst for additional capacity or add selective cloud services for specific purposes Located on-premises and off-premises depending on the architecture and specific services 8 Intel IT Center Planning Guide | Cloud Security
Cloud Computing Security Planning Guide - Page 0001.html
Cloud Computing Security Planning Guide - Page 0002.html
Cloud Computing Security Planning Guide - Page 0003.html
Cloud Computing Security Planning Guide - Page 0004.html
Cloud Computing Security Planning Guide - Page 0005.html
Cloud Computing Security Planning Guide - Page 0006.html
Cloud Computing Security Planning Guide - Page 0007.html
Cloud Computing Security Planning Guide - Page 0008.html
Cloud Computing Security Planning Guide - Page 0009.html
Cloud Computing Security Planning Guide - Page 0010.html
Cloud Computing Security Planning Guide - Page 0011.html
Cloud Computing Security Planning Guide - Page 0012.html
Cloud Computing Security Planning Guide - Page 0013.html
Cloud Computing Security Planning Guide - Page 0014.html
Cloud Computing Security Planning Guide - Page 0015.html
Cloud Computing Security Planning Guide - Page 0016.html
Cloud Computing Security Planning Guide - Page 0017.html
Cloud Computing Security Planning Guide - Page 0018.html
Cloud Computing Security Planning Guide - Page 0019.html
Cloud Computing Security Planning Guide - Page 0020.html
Cloud Computing Security Planning Guide - Page 0021.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia