TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Microsoft Edge
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Skype for Business
See all products »
Resources
Channel 9 Video
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Windows Update
Trials
Windows Server 2016
System Center 2016
Windows 10 Enterprise
SQL Server 2016
See all trials »
Related Sites
Microsoft Download Center
Microsoft Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Expert-led, virtual classes
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
Microsoft Official Courses On-Demand
Certifications
Certification overview
Special offers
MCSE Cloud Platform and Infrastructure
MCSE: Mobility
MCSE: Data Management and Analytics
MCSE Productivity
Other resources
Microsoft Events
Exam Replay
Born To Learn blog
Find technical communities in your area
Azure training
Official Practice Tests
Support options
For business
For developers
For IT professionals
For technical support
Support offerings
More support
Microsoft Premier Online
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Home
Library
Wiki
Learn
Gallery
Downloads
Support
Forums
Blogs
Resources For IT Professionals
United States (English)
Россия (Pусский)
中国(简体中文)
Brasil (Português)
Skip to locale bar
Get this Tag RSS feed
Translate this page
Powered by
Microsoft® Translator
Popular Tags
Active Directory
AD
AD DS
adfs
ASP.NET
azure
BizTalk
BizTalk Server
BizTalk Server 2010
C#
Candidate for deletion
certification
cloud
core docs
de-DE
EAA
Ed Price
Ed's Stub Pages
en-US
ESA
es-ES
Excel
Exchange
Exchange 2010
fa-IR
Fernando Lugao Veltem
FIM
FIM 2010
FIM Resources
FIM-HELP
forefront
forums
fr-FR
Gokan Ozcifci
has code
has comment
has comments
has image
has Images
has Other Languages
has See Also
Has Table
Has TOC
Horizon_Net
How To
Hyper-V
id-ID
IIS
Italian Wiki Articles
it-IT
ja-JP
Jordano Mazzoni
Link Collection
Luciano Lima
Luigi Bruno
Lync Server 2010
MIISILMFIM MACAULAY
Multi Language Wiki Articles
needs work
operations manager
Pirated Content
Portal
Português Brasil
PowerShell
pt-BR
security
SharePoint
SharePoint 2010
SharePoint 2013
SharePoint Pirate
Small Basic
solucionando problemas
SQL Server
SQL Server 2012
stub
System Center
System Center 2012
TechNet Guru
TechNet Wiki
TechNet Wiki Featured Article
tonyso
Translated into Japanese
troubleshooting
tr-TR
vídeo
Video
Virtualization
VMM
Wiki
Windows
Windows 7
Windows 8
Windows Azure
Windows Server
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
yottun8
اکتیو دایرکتوری
Browse by Tags
>
TechNet Articles
>
All Tags
>
private cloud security
Tagged Content List
Wiki Page:
Private Cloud Security Challenges - On Demand Self Service
Fernando Lugão Veltem
Table of Contents Security Functionality Infrastructure Security Platform Security Software Security Management Security Legal Issues As a designer of a private cloud solution, how do I design access control for the services hosted in the cloud? Who can request services and how much can they request...
on
7 Aug 2013
Wiki Page:
Private Cloud Security Operations Challenges
Fernando Lugão Veltem
The previous section outlined the cloud security operational principles that should apply to all operational activities. This section examines the key attributes that characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured services...
on
7 Aug 2013
Wiki Page:
Private Cloud Security Model - Legal and Compliance Issues
Fernando Lugão Veltem
Table of Contents Governance Compliance Integrated Governance, Risk Management, and Compliance Data Protection and Personally Identifiable Information Legal Agreements One area where IT decision-makers have considerable concerns with private and hybrid cloud implementations are the areas of...
on
7 Aug 2013
Wiki Page:
Design Guide for A Solution for Private Cloud Security
Fernando Lugão Veltem
The Service Design paper discusses private cloud security from the design perspective, offers guidance for creating a security design for a private cloud, and discusses some of the design decisions you will have to make. In some areas, this paper discusses specific products in relation to the security...
on
7 Aug 2013
Wiki Page:
A Solution for Private Cloud Security
Carsten Siemens
Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers, business and technology decision...
on
5 Jun 2013
Wiki Page:
Blueprint for A Solution for Private Cloud Security
Carsten Siemens
Welcome to this first paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the architectural perspective and seeks to define the problem domain, key scenarios, and create a structured approach that you will use to create a private cloud security...
on
5 Jun 2013
Wiki Page:
A Solution for Private Cloud Security Table of Contents
Fernando Lugão Veltem
Complete Table of Contents for “A Solution for Private Cloud Security” A Solution for Private Cloud Security Blueprint for a A Solution for Private Cloud Security Defining the Private Cloud Security Domain Cloud Security Challenges Private Cloud Reference Model...
on
4 May 2013
Wiki Page:
Private Cloud Security Model - Client Side Security
Yagmoth555
With private cloud environments, you have three options for client security: Secure trusted client. A secure trusted client one that exists on the internal network and has a security trust relationship with the cloud domain. You would provide appropriate levels of protection to these client...
on
28 Feb 2013
Wiki Page:
Private Cloud Security Challenges - Rapid Elasticity
dplotnikov - mvp
Table of Contents Security Functionality Infrastructure Security Software Security Management Security Legal Issues As a designer of a private cloud solution, I am concerned that a rogue application, client, or DoS attack might destabilize the data center by requesting a large amount of resources...
on
31 Aug 2012
Wiki Page:
Private Cloud Security Design Principles
Thomas W Shinder - MSFT
Table of Contents Apply Generic Security Best Practices Isolation is Key Consider Security as a Wrapper Assume Attackers are Authenticated and Authorized Assume All Data Locations are Accessible Do Not Trust Client Information Use Established Strong Cryptographic Techniques Automate Security Operations...
on
2 Jul 2012
Wiki Page:
Private Cloud Security Model - Infrastructure Security
Fernando Lugão Veltem
Table of Contents Physical Security Energy Supply Security Facility Security Network Security Hardware Security Compute Security Storage Security Operating System Security Virtualization Security Update Security Now that you have examined the factors within the security wrapper, this paper presents...
on
5 Jun 2012
Wiki Page:
Cloud Security Challenges
Fernando Lugão Veltem
To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
on
5 Jun 2012
Wiki Page:
Private Cloud Security Model - Wrapper Functionality
Fernando Lugão Veltem
As discussed earlier in this paper, the private cloud must implement security as a wrapper. Every transaction then must pass through this security wrapper on any data transition within the cloud, for example: Client to the service delivery layer Service delivery layer to the software...
on
5 Jun 2012
Wiki Page:
Defining the Private Cloud Security Problem Domain
Fernando Lugão Veltem
As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
on
5 Jun 2012
Wiki Page:
Operations Guide for A Solution for Private Cloud Security
Thomas W Shinder - MSFT
Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the security...
on
24 Feb 2012
Wiki Page:
Measured Services Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution, what can I do to ensure that only legitimate users are using the private cloud resources? Security Functionality Part of the answer to the question above is addressed in the On-demand Self-Service section earlier in this paper. That section discussed...
on
17 Jan 2012
Wiki Page:
Rapid Elasticity Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How do I detect and respond to requests for resources that might negatively impact other tenant applications or the whole cloud? What impact does the private cloud have on my plans to maintain the availability and capacity of resources? ...
on
17 Jan 2012
Wiki Page:
On Demand Self Service Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How do I monitor and audit the use of the services hosted in the cloud? If I don't know what I've got, how do I make sure that it's secure? What happens if the wrong people request or de-provision resources? How does the private cloud...
on
17 Jan 2012
Wiki Page:
Broad Network Access Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution, I want to be sure that an appropriate level of security applies regardless of where the client is connecting from and regardless of the device form factor. This requirement applies to both cloud management and application security. Security Functionality...
on
17 Jan 2012
Wiki Page:
Resource Pooling Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How can I detect any breaches in isolation between tenants' resources and how do I respond to the situation? How do I design my disaster recovery procedures to ensure isolation? What impact does the private cloud have on my plans for maintaining...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Operations Principles
Thomas W Shinder - MSFT
This section introduces the key operational security principles for private clouds. These principles apply to all the detailed security design recommendations that are discussed in subsequent sections. Note: In the following discussions, we use the term "tenant" to refer to a client or...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Measured Services
Thomas W Shinder - MSFT
As a designer of a private cloud, I want to want to ensure that all applications and services running in the cloud are measured and accounted for. Security Functionality Figure 1 lists a number of security capabilities that the security wrapper should include in the private cloud such as...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Broad Network Access
Thomas W Shinder - MSFT
As a designer of a private cloud solution, I want my solution to provide appropriate authentication and authorization services for the broad range of users accessing the cloud. Different services have different security requirements, such as different levels of security, access from multiple locations...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Resource Pooling
Thomas W Shinder - MSFT
As a designer of a private cloud solution that uses a pool of resources that can be allocated to many different tenants, how can I ensure the proper isolation of resources (network, compute, memory, storage) between tenants? Security Functionality Figure 1 lists a number of security capabilities...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges
Thomas W Shinder - MSFT
The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes that characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured...
on
17 Jan 2012
Page 1 of 2 (31 items)
1
2
Can't find it? Write it!
Post an Article