The Private Cloud model requires you to have total control over all layers of the stack, which includes any traditional network perimeter security you might want to have in place. In a private cloud model, the cloud services are not typically exposed general Internet users (although they can be) and remote access to private cloud hosted resources is enabled through mechanisms used in traditional data centers (although a private cloud can host perimeter security devices hosted on a cloud infrastructure).
Note: This document is part of a collection of documents that comprise the Reference Architecture for Private Cloud document set. The Reference Architecture for Private Cloud documentation is a community collaboration project. Please feel free to edit this document to improve its quality. If you would like to be recognized for your work on improving this article, please include your name and any contact information you wish to share at the bottom of this page.
In this scenario you could rely on traditional enterprise security architectures and methodologies; however there are a number of reasons to consider a redesign of the security architecture when moving to a Private Cloud:
REFERENCES: Microsoft Private Cloud Security Overview ACKNOWLEDGEMENTS LIST: If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below: [Enter your name here and include any contact information you would like to share] Return to Previous Page Return to Cloud Computing Security Architecture Return to Reference Architecture for Private Cloud
Thomas W Shinder - MSFT edited Revision 5. Comment: added community and links
Thomas W Shinder - MSFT edited Revision 4. Comment: updated.
Thomas W Shinder - MSFT edited Revision 3. Comment: updated.
Thomas W Shinder - MSFT edited Revision 2. Comment: updated.
Thomas W Shinder - MSFT edited Revision 1. Comment: save
Thomas W Shinder - MSFT edited Original. Comment: new content.