Note that in this framework the horizontal

This preview shows page 22 - 24 out of 76 pages.

Note that in this framework, the horizontal positioning of layers implies a stack in which the upper layer has a dependency on the lower layer. The resource abstraction and control layer build virtual cloud resources on top of the underlying physical resource layer and support the service layer where cloud services interfaces are exposed. The three service models can be built either on top of one another (i.e., SaaS built upon PaaS and PaaS built upon IaaS) or directly upon the underlying cloud infrastructure. For example, a SaaS application can be implemented and hosted on virtual machines from IaaS or directly on top of cloud resources without using IaaS. 3.3.3 Cloud Service Management Cloud Service Management includes all of the service-related functions that are necessary for the management and operation of those services required by or proposed to cloud consumers. As illustrated in Figure 5, cloud service management can be described from the perspective of business support, provisioning and configuration, and from the perspective of portability and interoperability requirements.
Image of page 22

Subscribe to view the full document.

NIST Cloud Computing Standards Roadmap NIST SP500 291 v1.0 23 Figure 5 – Cloud Provider: Cloud Service Management 3.3.4 Security “As the Federal Government moves to the cloud, it must be vigilant to ensure the security and proper management of government information to protect the privacy of citizens and national security.” ( by Vivek Kundra, Federal Cloud Computing Strategy, Feb. 2011 .) It is critical to recognize that security is cross-cutting that spans across all layers of the reference model, ranges from physical security to application security, and in general, shares the responsibility between cloud provider and federal cloud consumer. For example, the protection of the physical resource layer (see Figure 4) requires physical security that denies unauthorized access to the building, facility, resource, or stored information. Cloud providers should ensure that the facility hosting cloud services is secure and that their staff has proper background checks. When data or application is moved to a cloud, it is important to ensure that the cloud offering satisfies the security requirements and enforces the compliance rules. An independent audit (see Clause 3.4) should be conducted to verify the compliance with regulation or security policy. 3.3.5 Privacy Cloud providers should protect the assured, proper, and consistent collection, processing, communication, use and disposition of personal information (PI) and personally identifiable information (PII) in the cloud. According to the CIO Council, one of the federal government’s key business imperatives is to ensure the privacy of the collected personally identifiable information. PII is the information that can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc., alone, or when
Image of page 23
NIST Cloud Computing Standards Roadmap NIST SP500 291 v1.0 24
Image of page 24
You've reached the end of this preview.
  • Spring '14
  • NIST Cloud Computing Standards Roadmap

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern