Browse by Tags

Tagged Content List
  • Wiki Page: Rapid Elasticity Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution: How do I detect and respond to requests for resources that might negatively impact other tenant applications or the whole cloud? What impact does the private cloud have on my plans to maintain the availability and capacity of resources? ...
  • Wiki Page: On Demand Self Service Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution: How do I monitor and audit the use of the services hosted in the cloud? If I don't know what I've got, how do I make sure that it's secure? What happens if the wrong people request or de-provision resources? How does the private cloud...
  • Wiki Page: Broad Network Access Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution, I want to be sure that an appropriate level of security applies regardless of where the client is connecting from and regardless of the device form factor. This requirement applies to both cloud management and application security. Security Functionality...
  • Wiki Page: Resource Pooling Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution: How can I detect any breaches in isolation between tenants' resources and how do I respond to the situation? How do I design my disaster recovery procedures to ensure isolation? What impact does the private cloud have on my plans for maintaining...
  • Wiki Page: Private Cloud Security Operations Principles

    This section introduces the key operational security principles for private clouds. These principles apply to all the detailed security design recommendations that are discussed in subsequent sections. Note: In the following discussions, we use the term "tenant" to refer to a client or...
  • Wiki Page: Private Cloud Security Challenges - Measured Services

    As a designer of a private cloud, I want to want to ensure that all applications and services running in the cloud are measured and accounted for. Security Functionality Figure 1 lists a number of security capabilities that the security wrapper should include in the private cloud such as...
  • Wiki Page: Private Cloud Security Challenges - Broad Network Access

    As a designer of a private cloud solution, I want my solution to provide appropriate authentication and authorization services for the broad range of users accessing the cloud. Different services have different security requirements, such as different levels of security, access from multiple locations...
  • Wiki Page: Private Cloud Security Challenges - Resource Pooling

    As a designer of a private cloud solution that uses a pool of resources that can be allocated to many different tenants, how can I ensure the proper isolation of resources (network, compute, memory, storage) between tenants? Security Functionality Figure 1 lists a number of security capabilities...
  • Wiki Page: Private Cloud Security Challenges

    The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes that characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured...
  • Wiki Page: Private Cloud Security Model - Management Security

    The management stack contains a range of linked capabilities that provide the ability to manage the service delivery layers. Typically, these are capabilities to which the provider connects rather than the consumer. However, some of the reporting output from the management stack can appear in the service...
  • Wiki Page: Private Cloud Security Model - Platform Security

    Having applied effective security to your infrastructure, you can start to examine security at the platform level. Good platform security is essential for high levels of application security in the software layer. Unless you have addressed potential attack points at the platform level, you are potentially...
  • Wiki Page: Private Cloud Security Model

    The private cloud security model uses the same design as the private cloud reference model but replaces the capabilities with mechanisms for implementing security. Figure 1 shows how these mechanisms tie in to the different layers of the private cloud reference model. Figure 1. The...
  • Wiki Page: Private Cloud Reference Model Security Perspective

    When envisioning your route to the private cloud, a reference model can help you visualize your complete environment. Note that a private cloud reference model does not identify specific technologies but instead shows the capabilities that your design must include. There is currently no universally...
  • Wiki Page: test article 12345

  • Wiki Page: Dedicated Administrator Connection (DAC) (tr-TR)

    Dedicated Administrator Connection (DAC) SQL Server 2005 ile birlikte gelen güzel, kullanışlı ve çoğu zaman hayat kurtarıcı bir özelliktir(Bir DBA için DAC, zorda kaldığında kullanabileceği bir arka kapıdır.). SQL Server veritabanı sisteminiz bir şekilde kaynak yetersizliğinden...
  • Wiki Page: SQL Server Kurulu Sunucularda Antivirus Kurmak (tr-TR)

    Veritabanı sunucunuza bir virüsün musallat olup sisteminizi işleyemez hale getirmesi, sizin için en kötü senaryolardan birisi olsa gerek. Veritabanı sisteminiz çalışmadığı zaman kurumda hayat durur. Çünkü kurumdaki tüm uygulamaların can damarı veritabanıdır...
  • Wiki Page: URL Encryption in ASP.NET

    Security is one of the key concerns in web applications. To maintain state we use many mechanisms and Query String is also one. If Query string holds any sensitive data it may lead to SQL Injection or accessing some other user’s data by just updating the Query String. Let’s consider...
  • Wiki Page: 將 ASP.NET 網站部署在 UNC 路徑上最重要的步驟 (zh-TW)

    如果要將 ASP.NET 網站安裝在遠端的 UNC 路徑上,在設定 IIS 時除了一般檔案的存取權限外,最重要的就是 ASP.NET 的執行權限是否有正確設定,由於所有置於 UNC 路徑上的 .NET 應用程式都會預設套用 LocalIntranet 群組,所以你無法將 ASP.NET 佈署在 UNC 路徑上,除非自行新增 .NET 安全性原則。 在沒設定 .NET 安全性群組之前,不管你怎麼設定都會出現以下 安全性例外狀況 的錯誤訊息: 解決此問題的步驟如下: 1. [開始] / [執行] / 輸入 cmd 並按下 Enter 2. 進入 .Net Framework...
  • Wiki Page: Access Control For Containers and Blobs - Shared Access Signature and Containers Policy

    NOTE : This is a stub article. Add content as you can. http://msdn.microsoft.com/en-us/library/ee395415.aspx
  • Wiki Page: Atravessando Pastas mesmo sem Permissão (pt-BR)

    Um dos itens mais utilizados por administradores/analistas de redes Microsoft, é configurar as permissões de usuários e grupos em servidores de arquivos. Dependendo do tamanho da empresa e sua complexidade, a configuração pode demorar semanas e até meses para...
  • Wiki Page: Security Issues in the Hybrid Cloud

    The hybrid cloud model combines public and private cloud services. The term hybrid cloud is used for a number of different models; we are using a definition of hybrid cloud that includes both Private and Public Cloud services with a likelihood that non-cloud enterprise systems may be used as well. When...
  • Wiki Page: Unable to Update Forefront TMG 2010 NIS Signature When Using WSUS

    Symptom Consider a scenario where Forefront TMG 2010 is using an internal WSUS Server in order to obtain updates. The Server where TMG is installed is able to obtain all Windows related updates but it is not able to obtain NIS signature. If the TMG Administrator changes Windows Update option to point...
  • Wiki Page: Security Issues in the Private Cloud

    The Private Cloud model requires you to have total control over all layers of the stack, which includes any traditional network perimeter security you might want to have in place. In a private cloud model, the cloud services are not typically exposed general Internet users (although they can be) and...
  • Wiki Page: Security Issues in Cloud Deployment Models

    We will discuss three models of cloud-based computing: public, private, and hybrid. The public cloud refers to software, infrastructure, or platforms offered as a service by 3 rd parties over the Internet, referred to as Cloud Service Providers or CSPs. Private cloud refers to cloud technologies where...
  • Wiki Page: Network Access Protection using DHCP in Windows Server 2008 R2

    Description: In today’s IT, data integrity and information security is the major concern among the system administrators - thanks to the increasing number of highly sophisticated and coordinated attacks that are ripping away the company's reputation and customer trust within hours...
Page 5 of 6 (136 items) «23456
Can't find it? Write it!