Browse by Tags

Tagged Content List
  • Wiki Page: Secure Social Engineering in Cloud

    In managing security, there are some issues that you couldn't manage just by installing Anti-Malware or monitoring clients and endpoints. For example consider following scenarios: 1) Employees write down their user name and password and put in their table. 2) Employees giving their smart...
  • Wiki Page: Wiki: Cloud Portal

    This is a portal of links to articles on TechNet Wiki. Additional related articles and sites are available under the Community Resources section. Table of Contents Private Cloud Cloud Security Hybrid Cloud Office 365 Windows Azure Windows Azure SQL Database (formerly SQL Azure) ACS Community Resources...
  • Wiki Page: Reference Architecture for Private Cloud

    The Reference Architecture for Private Cloud wiki site on TechNet is driven by the SCD iX Solutions Group. It is a joint effort with the private cloud community at large. This document set is designed to facilitate an organization’s transformation to private cloud as a service delivery enabling set...
  • Wiki Page: Private Cloud Reference Model

    1 Introduction This document gives an overview of a Private Cloud Reference Model. For the purposes of this document, a Reference Model is defined as the problem definition, requirements, and scope for a specific domain including the identification of all layers (or subdomains) and any interactions...
  • Wiki Page: Modelo de referencia de nube privada (es-ES)

    1 Introducción Este documento ofrece una visión general de un modelo de referencia de nube privada. Para los efectos de este documento, un modelo de referencia se define como la definición de problema, los requisitos y el alcance para un dominio específico, incluyendo la identificación...
  • Wiki Page: Private Cloud Technical Concept and Overview

    Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
  • Wiki Page: Resumen y concepto técnico de nube privada (es-ES)

    Impulsado por la presión de hacer más con menos, muchos de sus clientes recurren cada vez más virtualización cuando necesitan agregar capacidad o entregar nueva o escala servicios. Y sin embargo, la simple consolidación de servidores — lo que algunos han llamado virtualización 1.0 — ya no es...
  • Wiki Page: Security Considerations for Software as a Service

    With Software as a Service (SaaS) solutions, the security options that you can control may be only at the application level. In a Public Cloud scenario, this requires a high degree of trust in the cloud vendor because they have complete control of the instructure and platform layers. As well as their...
  • Wiki Page: Security Considerations for Infrastructure as a Service (IaaS)

    Table of Contents Overview Network Security Storage and Data Cloud Storage Systems Host level Overview Infrastructure as a Service (IaaS) is often described by using the concept of utility computing, where a vendor offers a computing service that can be compared to other utilities, such as water...
  • Wiki Page: Security Management and Monitoring

    When you move from an on-premise environment to a cloud-based one, there must be a fundamental shift in how you think about provisioning and managing your IT services. Because of the increased involvement of third parties such as a CSP (cloud service provider), you have to address areas such as the...
  • Wiki Page: Wiki: Cloud Portal (de-DE)

    Table of Contents Private Cloud Cloud Security Hybrid Cloud ACS Andere Sprachen English (en-US) Private Cloud Private Cloud Dojo (de-DE) Private Cloud Technical Overview Private Cloud Infrastructure as a Service Self Service Private Cloud Planning Guide for Infrastructure as a Service (IaaS...
  • Wiki Page: Cloud Security Overview

    Security is one of the major concerns in cloud computing . To mitigate security risks while still gaining benefits from cloud computing, organizations can choose to focus on on-premises ( private cloud ) solutions. This enables the organization to move to a hybrid cloud solution in a controlled...
  • Wiki Page: Security Considerations for Cloud Service Models

    It is now time to look in greater detail at the four main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Return to the Table of Contents
  • Wiki Page: Identity and Access Management in the Cloud

    Identity and access management (IAM) refers to the processes, technologies, and policies for managing digital identities and controlling how identities can be used to access resources. Typically, IAM includes three separate processes: Identity provisioning and storage Authentication Authorization...
  • Wiki Page: Wiki: クラウド ポータル(ja-JP)

    ここはTechNet Wiki上の記事へのリンクを集めたポータルサイトです。追加の関連記事とサイトは「コミュニティ リソース」セクション以下にあります。 Table of Contents プライベートクラウド クラウドのセキュリティ ハイブリッドクラウド Office 365 Windows Azure Windows Azure SQL Database (旧SQL Azure) ACS(アクセスコントロールサービス) コミュニティ リソース 他の言語 English (en-US) Deutsch (de-DE) Portugues (pt-BR) プライベートクラウド...
  • Wiki Page: Security Implications of Cloud Service Models

    It is now time to look in greater detail at the three main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS ) We will discuss each of these models and consider the security threats and mitigations that may apply in...
  • Wiki Page: Cloud Security Introduction

    Cloud computing has led to a shift in how people think about IT systems architecture. Many organizations today are either implementing cloud-based solutions, or evaluating which cloud-based solutions they will be implementing in the future. According to Gartner Inc. cloud computing is "no less influential...
  • Wiki Page: Security Considerations for Platform as a Service (PaaS)

    With the PaaS (Platform as a Service) model the vendor offers a complete development environment in which application developers can then create and deploy their code. This approach means that instead of building a server environment to run an application and installing a development environment to create...
  • Wiki Page: Replicated Identity Providers

    Another identity management option is to contract with an IaaS provider to host a copy of each Windows domain controller in the cloud. You would work with the IaaS provider to replicate the domain controllers to the identity provider’s datacenter. The replicated domain controllers are responsible...
  • Wiki Page: Federated Identity Providers

    Federated identity providers offer services that enable users in a corporate enterprise environment to use a single digital identity to access applications and services that they have access rights to, regardless of which security domain the application or service resides in. This requires a trust relationship...
  • Wiki Page: Third Party Identity Providers

    Third-party digital identity providers offer Internet users the ability to consolidate the number of digital identities that they use to access Web sites. Web sites, particularly consumer-oriented sites, use the identity provided by the user to authorize them against the service to which the user logs...
  • Wiki Page: Silo Based Identity Providers

    In a silo-based approach to identity management in the cloud, each user account in the enterprise system is replicated into a repository of users in the cloud system. Examples of a silo-based identity approach to managing identity are: A database that stores identity information for a Web application...
  • Wiki Page: Security Issues in the Hybrid Cloud

    The hybrid cloud model combines public and private cloud services. The term hybrid cloud is used for a number of different models; we are using a definition of hybrid cloud that includes both Private and Public Cloud services with a likelihood that non-cloud enterprise systems may be used as well. When...
  • Wiki Page: Security Issues in the Public Cloud

    In a purely Public Cloud model, infrastructure security is provided by the CSP (Cloud Service Provider). To be successful, the CSP must have robust security and be transparent regarding security processes, procedures and capabilities, as a single security breach has the potential to destroy the CSP's...
  • Wiki Page: Security Issues in the Private Cloud

    The Private Cloud model requires you to have total control over all layers of the stack, which includes any traditional network perimeter security you might want to have in place. In a private cloud model, the cloud services are not typically exposed general Internet users (although they can be) and...
Page 1 of 2 (29 items) 12
Can't find it? Write it!