SHARE
Facebook X Pinterest WhatsApp

Identifying the Right Security Options for IaaS

When it comes to cloud services, infrastructure as a service (IaaS) finds its place near the top of the list. Many organizations partner with cloud providers to access virtual machines (VMs), cloud storage and database management systems (DBMS), and these resources are accessed via the service provider’s virtual infrastructure. When using IaaS, though, organizations must […]

Written By
thumbnail
Kim Mays
Kim Mays
Jul 1, 2014

When it comes to cloud services, infrastructure as a service (IaaS) finds its place near the top of the list. Many organizations partner with cloud providers to access virtual machines (VMs), cloud storage and database management systems (DBMS), and these resources are accessed via the service provider’s virtual infrastructure.

When using IaaS, though, organizations must also consider their own security requirements. Organizations rely on several protection options to ensure the best security. But often they lack the proper information to decide which solutions best meet their needs.

To help clarify the available options for security, the National Institute of Standards and Technology (NIST) has created a document that outlines the various protection options and provides analysis based on two points:

  • Security functionality provided
  • The type of architecture used to provide the service

 The paper is available for download in our IT Downloads area, under the title, “Protection Options for Virtualized Infrastructures in IaaS Cloud.”

The document is in PDF format and is divided into nine sections, including the Introduction and Conclusion and Benefits. The main sections involve identifying the use cases and delving into each case’s security requirements. Then, the section provides the protection options that fit those requirements. The use cases included are:

  • Checking out VM images
  • Configuring VM instance OS (Guest OS)
  • Configuring virus/malware protection for VM instance
  • Configuring VM instance access protection
  • Configuring VM instance isolation
  • Comprehensive data protection in IaaS cloud service

This document provides cloud service providers and organizations that consume cloud services with a detailed background of security situations for many use cases. It gives administrators the information needed to make educated decisions on the best security provisions for their use and can bring about important dialogue between the organization and the provider. It will help both sides find and provide the right security protection for their unique use cases.

Recommended for you...

10 Top Data Companies
Tom Taulli
Jul 24, 2022
Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
Top Big Data Storage Tools 2022
Surajdeep Singh
Jun 16, 2022
8 Top Data Startups
Tom Taulli
May 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.