Cloud Computing Security Architecture (IT Pro Perspective)

Cloud Computing Security Architecture (IT Pro Perspective)

Welcome to the Cloud Computing Security site on the TechNet wiki. The goal of this site is to share and promote information and thought leadership on the topic of Cloud Computing security. The decision to place this content on the TechNet wiki was an explicit one, as we realize that the topic of Cloud Computing security is imagea rapidly evolving one and requires that not only the best and brightest minds within Microsoft, but also those in the Cloud Security community, to participate in order to create an authoritative, valid, and actionable set of documents that identify key architectural, design, deployment and management issues and decision points so that security is integrated into the entire lifecycle of Cloud Computing deployments.

The Cloud Computing Security site is a subsite of the larger Reference Architecture for Private Cloud site within the TechNet wiki. A "solution" in this context is considered to be a complete answer to a particular problem. That includes
  • Information for the business decision maker that describes the business problem and the solution at a high level
  • Information for the technical decision maker that describes the technical problem within the business context, and the solution from a high level technical view
  • Information for the solution architect, who is responsible for the architectural design that supports the solution
  • Information for the solution designer, who translates the solution architecture into an actionable plan for the solution implementers (infrastructure and operations)
  • Information for the implementer, who is responsible for instantiating the solution designers plans

The Cloud Computing Security Architecture site is focused on the architectural elements and principles of Cloud Computing Security and focuses on the following major topics:

Cloud Security Introduction

Cloud Security Overview

Security Implications of Cloud Deployment Models

Security Considerations for Cloud Service Models

Identity and Access Management

Security Management and Monitoring

Compliance Issues in the Cloud

Please feel free to read the content, comment on the content, and add to the content on these pages. The updated content will be reviewed on a regular basis, and at a certain point in time, we will decide that the content is consistent with a "version 1" release and we will take a snapshot of the content and put it into a Word document that you can download at your convenience. This process will be interative, with subsequent version updates.

Thank you for participating in the Cloud Computing Security Architecture content development effort! We're confident that with our combined efforts we will together be able to create guidance that will provide significant value to anyone seeking architectural design principles and recommendations for Private Cloud security.

RESOURCES:

Cloud Identity Scenarios and Solutions for Developers

ACKNOWLEDGEMENTS LIST:

If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below:
[Enter your name here and include any contact information you would like to share]

Return to Reference Architecture for Private Cloud

Leave a Comment
  • Please add 2 and 6 and type the answer here:
  • Post
Wiki - Revision Comment List(Revision Comment)
Sort by: Published Date | Most Recent | Most Useful
Comments
  • Carsten Siemens edited Revision 33. Comment: Added tags: en-US, has comment

  • Jewel Lambert edited Revision 31. Comment: Corrected spelling typos

  • Bill Loeffler - MSFT edited Revision 29. Comment: remove space

  • Thomas W Shinder - MSFT edited Revision 27. Comment: update link

  • Thomas W Shinder - MSFT edited Revision 26. Comment: formatting

  • Thomas W Shinder - MSFT edited Revision 25. Comment: fixed spacing

  • Thomas W Shinder - MSFT edited Revision 24. Comment: changed the return to link

  • Thomas W Shinder - MSFT edited Revision 22. Comment: added link.

  • Thomas W Shinder - MSFT edited Revision 17. Comment: update link.

  • Alik Levin edited Revision 16. Comment: Added reference to Cloud Identity Scenarios and Solutions for Developers

Page 1 of 3 (25 items) 123
Wikis - Comment List
Sort by: Published Date | Most Recent | Most Useful
Posting comments is temporarily disabled until 10:00am PST on Saturday, December 14th. Thank you for your patience.
Comments
  • Thomas W Shinder - MSFT edited Original. Comment: Complete Level 1 Headers

  • Thomas W Shinder - MSFT edited Revision 1. Comment: Added link to cloud security overview

  • Thomas W Shinder - MSFT edited Revision 2. Comment: added link to security implications of cloud deployment models

  • Thomas W Shinder - MSFT edited Revision 3. Comment: added link to seucrity considerations for cloud service models

  • Thomas W Shinder - MSFT edited Revision 4. Comment: added link to IDM page.

  • Thomas W Shinder - MSFT edited Revision 5. Comment: added link to compliance issues in the cloud

  • Thomas W Shinder - MSFT edited Revision 6. Comment: change introduction to cloud security introduction.

  • Thomas W Shinder - MSFT edited Revision 7. Comment: added link to cloud security introduction

  • Thomas W Shinder - MSFT edited Revision 8. Comment: added intro content

  • Thomas W Shinder - MSFT edited Revision 9. Comment: save

  • Thomas W Shinder - MSFT edited Revision 11. Comment: edit

  • Thomas W Shinder - MSFT edited Revision 12. Comment: complete version 1 of introduction page.

  • Thomas W Shinder - MSFT edited Revision 13. Comment: edit

  • Thomas W Shinder - MSFT edited Revision 14. Comment: changed title

  • Thomas W Shinder - MSFT edited Revision 15. Comment: added link

Page 1 of 2 (29 items) 12