Trusted Server Pools
If you’ve hesitated to implement cloud computing because of
security concerns, you are not alone. Security is one of the major
barriers for most organizations considering cloud initiatives.
With its heavy dependence on virtualization, cloud computing has
elastic boundaries that can push the perimeter of the enterprise far
beyond the data center. The traditional perimeter behind which data
and platform are constrained and protected—typically by firewalls,
physical separation, and isolation—doesn’t work well for dynamic
cloud architecture models.
Trust across Dynamic Virtualized Environments
You can build trust across dynamic environments with trusted
compute pools of virtualized servers that can be validated or
attested by external entities based on known, trustworthy
signatures. This pool of resources can provide a level of security for
virtual machines before movement to the platform and enable the
dynamic migration of VMs from one trusted pool to another.
A trusted compute pool is built from servers that can demonstrate
high integrity grouped together by creating policies. The pool
substantially reduces the security risks of using a remote or
virtualized infrastructure. With a more secure platform, you can add
tenants and restrict sensitive workloads to the trusted compute
pools to enhance the protection of these workloads.
Protected VM Migration
Trusted pools prevent a compromised virtual machine (VM)
from one physical host from compromising another host.
Trusted pools are an important part of cloud security practices—in your own private cloud, but also as part of the data center operations and
security provided by cloud service providers. You need to be able to trust that public clouds are built on this same level of technology.