Author:
Ethan Hadar
Affiliation:
CA Technologies, Israel
Keyword(s):
Access control, Agile architecture, Cloud computing, Cloud security.
Related
Ontology
Subjects/Areas/Topics:
Cloud Computing
;
Cloud Computing Enabling Technology
;
Cloud Deployment Models: Public/Private/Hybrid Cloud
;
Cloud Risk, Challenges, and Governance
;
Fundamentals
;
Virtualization Technologies
Abstract:
Cloud computing is currently focused on providing utility computing, such as storage and computing power, and Software as a Service (SaaS.) However, use of these offerings in an enterprise environment requires security compliance to be enforced on managed servers deployed in the cloud in order to prevent un-authorized administration of deployed images. This requirement may apply to the initial deployment, upgrades, or any physical roaming due to the virtualization of the cloud. This paper presents a conceptual reference architecture, that defines a set of conceptual components that are responsible for intercepting calls, managing administrative commands, controlling roaming and portability, and providing enterprise compliance needs. It inherently supports delegation of the enforcing policies, and consequently it provides a scalable solution.