dcsimg
All
All

Protection Options for Virtualized Infrastructures in IaaS Cloud

410 KB | 3 files | null PDF

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

IT Download image

Infrastructure as a service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (virtual machines or VMs), virtual network, storage and utility programs (DBMS). Any large-scale offering of this service is feasible only through a virtualized infrastructure at the service provider.

At the minimum, this infrastructure is made up of resources such as virtualized hosts together with associated virtual network and hardware/software for data storage An IaaS’s consumer's total set of interactions with these resources constitute the set of use cases for IaaS cloud service. These use cases have associated security requirements and these requirements are met by protection options enabled by available security solutions/technologies.

The purpose of this paper is to analyze these protection options from the viewpoint of: (a) security functionality they can provide and (b) the architecture that governs their deployment, so that IaaS consumers can decide on the most appropriate security configuration for their VM instances depending upon the profile of the applications running in them.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • ProtectionOptionsVIIaaSC.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

DataCtr5 Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions. ...  More >>

DataCtr1 BIOS Protection Guidelines for Servers

The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS code. ...  More >>

Infrastructure Buying, Supporting, Maintaining Software and Equipment

This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial negotiation. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.