Private Cloud Security Challenges

The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes thathttp://blogs.technet.com/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-85-24-metablogapi/5658.image_5F00_64BCDD48.png characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured services. For each of these attributes, this section:

  • Identifies the potential impact of the attribute on the design of the security functionality in your private cloud.
  • Describes how the cloud security design principles apply to the detailed design of the features that support the cloud attribute.

We will cover the following private cloud security challenges:

RESOURCES:

ACKNOWLEDGEMENTS LIST:
If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below:
[Enter your name here and include any contact information you would like to share]

Return to Design Guide for Private Cloud Security

Return to A Solution for Private Cloud Security

Return to Reference Architecture for Private Cloud

Move forward to Private Cloud Security Challenges - Resource Pooling

Table of Contents for A Solution for Private Cloud Security