TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Microsoft Edge
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Skype for Business
See all products »
Resources
Channel 9 Video
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Windows Update
Trials
Windows Server 2016
System Center 2016
Windows 10 Enterprise
SQL Server 2016
See all trials »
Related Sites
Microsoft Download Center
Microsoft Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Expert-led, virtual classes
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
Microsoft Official Courses On-Demand
Certifications
Certification overview
Special offers
MCSE Cloud Platform and Infrastructure
MCSE: Mobility
MCSE: Data Management and Analytics
MCSE Productivity
Other resources
Microsoft Events
Exam Replay
Born To Learn blog
Find technical communities in your area
Azure training
Official Practice Tests
Support options
For business
For developers
For IT professionals
For technical support
Support offerings
More support
Microsoft Premier Online
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Home
Library
Wiki
Learn
Gallery
Downloads
Support
Forums
Blogs
Resources For IT Professionals
United States (English)
Россия (Pусский)
中国(简体中文)
Brasil (Português)
Skip to locale bar
Get this Tag RSS feed
Translate this page
Powered by
Microsoft® Translator
Popular Tags
Active Directory
AD
AD DS
adfs
ASP.NET
azure
BizTalk
BizTalk Server
BizTalk Server 2010
C#
Candidate for deletion
certification
cloud
core docs
de-DE
EAA
Ed Price
Ed's Stub Pages
en-US
ESA
es-ES
Excel
Exchange
Exchange 2010
fa-IR
Fernando Lugao Veltem
FIM
FIM 2010
FIM Resources
FIM-HELP
forefront
forums
fr-FR
Gokan Ozcifci
has code
has comment
has comments
has image
has Images
has Other Languages
has See Also
Has Table
Has TOC
Horizon_Net
How To
Hyper-V
id-ID
IIS
Italian Wiki Articles
it-IT
ja-JP
Jordano Mazzoni
Link Collection
Luciano Lima
Luigi Bruno
Lync Server 2010
MIISILMFIM MACAULAY
Multi Language Wiki Articles
needs work
operations manager
Pirated Content
Portal
Português Brasil
PowerShell
pt-BR
security
SharePoint
SharePoint 2010
SharePoint 2013
SharePoint Pirate
Small Basic
solucionando problemas
SQL Server
SQL Server 2012
stub
System Center
System Center 2012
TechNet Guru
TechNet Wiki
TechNet Wiki Featured Article
tonyso
Translated into Japanese
troubleshooting
tr-TR
vídeo
Video
Virtualization
VMM
Wiki
Windows
Windows 7
Windows 8
Windows Azure
Windows Server
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
yottun8
اکتیو دایرکتوری
Browse by Tags
>
TechNet Articles
>
All Tags
>
cloud security
Tagged Content List
Wiki Page:
Secure Social Engineering in Cloud
Maheshkumar S Tiwari
In managing security, there are some issues that you couldn't manage just by installing Anti-Malware or monitoring clients and endpoints. For example consider following scenarios: 1) Employees write down their user name and password and put in their table. 2) Employees giving their smart...
on
5 Sep 2013
Wiki Page:
Wiki: Cloud Portal
Thomas W Shinder - MSFT
This is a portal of links to articles on TechNet Wiki. Additional related articles and sites are available under the Community Resources section. Table of Contents Private Cloud Cloud Security Hybrid Cloud Office 365 Windows Azure Windows Azure SQL Database (formerly SQL Azure) ACS Community Resources...
on
29 Aug 2013
Wiki Page:
Reference Architecture for Private Cloud
Jim Dial - MSFT
The Reference Architecture for Private Cloud wiki site on TechNet is driven by the SCD iX Solutions Group. It is a joint effort with the private cloud community at large. This document set is designed to facilitate an organization’s transformation to private cloud as a service delivery enabling set...
on
21 Aug 2013
Wiki Page:
Private Cloud Reference Model
Jim Dial - MSFT
1 Introduction This document gives an overview of a Private Cloud Reference Model. For the purposes of this document, a Reference Model is defined as the problem definition, requirements, and scope for a specific domain including the identification of all layers (or subdomains) and any interactions...
on
21 Aug 2013
Wiki Page:
Modelo de referencia de nube privada (es-ES)
LeoPonti
1 Introducción Este documento ofrece una visión general de un modelo de referencia de nube privada. Para los efectos de este documento, un modelo de referencia se define como la definición de problema, los requisitos y el alcance para un dominio específico, incluyendo la identificación...
on
20 Aug 2013
Wiki Page:
Private Cloud Technical Concept and Overview
Richard Mueller
Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
on
20 Aug 2013
Wiki Page:
Resumen y concepto técnico de nube privada (es-ES)
LeoPonti
Impulsado por la presión de hacer más con menos, muchos de sus clientes recurren cada vez más virtualización cuando necesitan agregar capacidad o entregar nueva o escala servicios. Y sin embargo, la simple consolidación de servidores — lo que algunos han llamado virtualización 1.0 — ya no es...
on
20 Aug 2013
Wiki Page:
Security Considerations for Software as a Service
Fernando Lugão Veltem
With Software as a Service (SaaS) solutions, the security options that you can control may be only at the application level. In a Public Cloud scenario, this requires a high degree of trust in the cloud vendor because they have complete control of the instructure and platform layers. As well as their...
on
7 Aug 2013
Wiki Page:
Security Considerations for Infrastructure as a Service (IaaS)
Richard Mueller
Table of Contents Overview Network Security Storage and Data Cloud Storage Systems Host level Overview Infrastructure as a Service (IaaS) is often described by using the concept of utility computing, where a vendor offers a computing service that can be compared to other utilities, such as water...
on
31 Jul 2013
Wiki Page:
Security Management and Monitoring
Andrea Kempter
When you move from an on-premise environment to a cloud-based one, there must be a fundamental shift in how you think about provisioning and managing your IT services. Because of the increased involvement of third parties such as a CSP (cloud service provider), you have to address areas such as the...
on
26 Jul 2013
Wiki Page:
Wiki: Cloud Portal (de-DE)
Carsten Siemens
Table of Contents Private Cloud Cloud Security Hybrid Cloud ACS Andere Sprachen English (en-US) Private Cloud Private Cloud Dojo (de-DE) Private Cloud Technical Overview Private Cloud Infrastructure as a Service Self Service Private Cloud Planning Guide for Infrastructure as a Service (IaaS...
on
6 Jun 2013
Wiki Page:
Cloud Security Overview
Carsten Siemens
Security is one of the major concerns in cloud computing . To mitigate security risks while still gaining benefits from cloud computing, organizations can choose to focus on on-premises ( private cloud ) solutions. This enables the organization to move to a hybrid cloud solution in a controlled...
on
5 Jun 2013
Wiki Page:
Security Considerations for Cloud Service Models
Fernando Lugão Veltem
It is now time to look in greater detail at the four main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Return to the Table of Contents
on
4 May 2013
Wiki Page:
Identity and Access Management in the Cloud
Richard Mueller
Identity and access management (IAM) refers to the processes, technologies, and policies for managing digital identities and controlling how identities can be used to access resources. Typically, IAM includes three separate processes: Identity provisioning and storage Authentication Authorization...
on
22 Feb 2013
Wiki Page:
Wiki: クラウド ポータル(ja-JP)
Tomoaki Yoshizawa
ここはTechNet Wiki上の記事へのリンクを集めたポータルサイトです。追加の関連記事とサイトは「コミュニティ リソース」セクション以下にあります。 Table of Contents プライベートクラウド クラウドのセキュリティ ハイブリッドクラウド Office 365 Windows Azure Windows Azure SQL Database (旧SQL Azure) ACS(アクセスコントロールサービス) コミュニティ リソース 他の言語 English (en-US) Deutsch (de-DE) Portugues (pt-BR) プライベートクラウド...
on
27 Jan 2013
Wiki Page:
Security Implications of Cloud Service Models
Fernando Lugão Veltem
It is now time to look in greater detail at the three main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS ) We will discuss each of these models and consider the security threats and mitigations that may apply in...
on
5 Jun 2012
Wiki Page:
Cloud Security Introduction
Fernando Lugão Veltem
Cloud computing has led to a shift in how people think about IT systems architecture. Many organizations today are either implementing cloud-based solutions, or evaluating which cloud-based solutions they will be implementing in the future. According to Gartner Inc. cloud computing is "no less influential...
on
30 Apr 2012
Wiki Page:
Security Considerations for Platform as a Service (PaaS)
Thomas W Shinder - MSFT
With the PaaS (Platform as a Service) model the vendor offers a complete development environment in which application developers can then create and deploy their code. This approach means that instead of building a server environment to run an application and installing a development environment to create...
on
23 Jan 2012
Wiki Page:
Replicated Identity Providers
Thomas W Shinder - MSFT
Another identity management option is to contract with an IaaS provider to host a copy of each Windows domain controller in the cloud. You would work with the IaaS provider to replicate the domain controllers to the identity provider’s datacenter. The replicated domain controllers are responsible...
on
16 Sep 2011
Wiki Page:
Federated Identity Providers
Thomas W Shinder - MSFT
Federated identity providers offer services that enable users in a corporate enterprise environment to use a single digital identity to access applications and services that they have access rights to, regardless of which security domain the application or service resides in. This requires a trust relationship...
on
16 Sep 2011
Wiki Page:
Third Party Identity Providers
Thomas W Shinder - MSFT
Third-party digital identity providers offer Internet users the ability to consolidate the number of digital identities that they use to access Web sites. Web sites, particularly consumer-oriented sites, use the identity provided by the user to authorize them against the service to which the user logs...
on
16 Sep 2011
Wiki Page:
Silo Based Identity Providers
Thomas W Shinder - MSFT
In a silo-based approach to identity management in the cloud, each user account in the enterprise system is replicated into a repository of users in the cloud system. Examples of a silo-based identity approach to managing identity are: A database that stores identity information for a Web application...
on
16 Sep 2011
Wiki Page:
Security Issues in the Hybrid Cloud
Thomas W Shinder - MSFT
The hybrid cloud model combines public and private cloud services. The term hybrid cloud is used for a number of different models; we are using a definition of hybrid cloud that includes both Private and Public Cloud services with a likelihood that non-cloud enterprise systems may be used as well. When...
on
16 Sep 2011
Wiki Page:
Security Issues in the Public Cloud
Thomas W Shinder - MSFT
In a purely Public Cloud model, infrastructure security is provided by the CSP (Cloud Service Provider). To be successful, the CSP must have robust security and be transparent regarding security processes, procedures and capabilities, as a single security breach has the potential to destroy the CSP's...
on
16 Sep 2011
Wiki Page:
Security Issues in the Private Cloud
Thomas W Shinder - MSFT
The Private Cloud model requires you to have total control over all layers of the stack, which includes any traditional network perimeter security you might want to have in place. In a private cloud model, the cloud services are not typically exposed general Internet users (although they can be) and...
on
15 Sep 2011
Page 1 of 2 (29 items)
1
2
Can't find it? Write it!
Post an Article