Growing Your Cloud Infrastructure: Planning, Design and Operation
|
|
|
- Cleopatra Woods
- 10 years ago
- Views:
Transcription
1 w h i t e p a p e r p a g e 1 f 12 Grwing Yur Clud Infrastructure: Planning, Design and Operatin Abstract Clud cmputing services are expanding and evlving rapidly. But with this fast, largescale grwth cmes a cmplex supply chain f service prviders, ften invlving multiple third parties. In additin, quality standards and security practices in the industry are still unclear, difficult t define, and even harder t verify. T succeed in this uncertain and challenging envirnment, rganizatins need a carefully planned, structured apprach t the design, implementatin, and management f clud services. NOTE Drawing n its Bell Labs heritage, Applied Cmmunicatin Sciences (ACS) excels at creating innvative technlgies and services t slve the mst difficult and cmplex infrmatin and cmmunicatins prblems acrss cmmercial, carrier and gvernment sectrs. Applied Cmmunicatin Sciences is legally registered as TT Gvernment Slutins, ding business as Applied Cmmunicatin Sciences. ACS is a whlly-wned subsidiary f The SI Organizatin, Inc Applied Cmmunicatin Sciences Registered Trademark f TT Gvernment Slutins, Inc.
2 P a g e 2 f 12 Rapid Grwth, Lingering Challenges The clud is rising. In 2010, IDC estimated the clud market at $16B and predicted grwth t $56B by Other market researchers are even mre ptimistic, with Gartner estimating the clud market at $150B by 2013 and Merrill Lynch predicting grwth t $160B in But n matter where the final number lands in the next few years, ne thing is certain: Planning a mve t the clud isn t a breeze. It invlves navigating a whle wrld f service mdels, prviders, vendrs, and markets. Still, rganizatins are expected t keep migrating t clud services in drves as they lk t the clud s prmise f increased business agility and decreased peratinal csts. But even as their migratin intensifies, debate and uncertainty cntinue t swirl arund clud cmputing definitins, use cases, underlying technlgies, issues and security risks. What s mre, migratin typically requires entrusting missin-critical data t a cmplex supply chain f third-party prviders and relinquishing at least sme cntrl ver netwrk perfrmance, reliability and security. Even after mving t the clud, an rganizatin s private infrmatin may bunce between multiple prviders, creating nging security and management challenges. T ensure the quality f every aspect f the clud supply chain, rganizatins need a carefully planned, structured apprach t the design, implementatin and management f clud services. Frm chsing the right service mdel t develping effective service level agreements (SLAs) t verifying cmpliance, rganizatins must seek ut and implement clud cmputing best practices at every step f the prcess s they can succeed in spite f the clud s nging issues and unknwns. Service and Deplyment Architectural Mdels The definitins, attributes, and characteristics f clud cmputing are expected t evlve and change ver time as the technlgy matures. Currently, the Natinal Institute f Standards and Technlgy (NIST) prvides the fllwing definitin and mdels fr clud cmputing: Clud cmputing is a mdel fr enabling cnvenient, n-demand netwrk access t a shared pl f cnfigurable cmputing resurces (e.g., netwrks, servers, strage, applicatins, and services) that can be rapidly prvisined and released with minimal management effrt r service prvider interactin. This clud mdel prmtes availability and is cmpsed f three service mdels and fur deplyment mdels. Service Mdels: 1. Clud Sftware as a Service (SaaS). The capability prvided t the cnsumer is t use the prvider s applicatins running n a clud infrastructure. The applicatins are accessible frm varius client devices thrugh a thin client interface such as a web brwser (e.g., web-based ). The cnsumer des nt manage r cntrl the underlying clud infrastructure including netwrk, servers, perating systems, strage r
3 P a g e 3 f 12 even individual applicatin capabilities, with the pssible exceptin f limited userspecific applicatin cnfiguratin settings. 2. Clud Platfrm as a Service (PaaS). The capability prvided t the cnsumer is t deply nt the clud infrastructure cnsumer-created r acquired applicatins created using prgramming languages and tls supprted by the prvider. The cnsumer des nt manage r cntrl the underlying clud infrastructure including netwrk, servers, perating systems r strage, but has cntrl ver the deplyed applicatins and pssibly applicatin hsting envirnment cnfiguratins. 3. Clud Infrastructure as a Service (IaaS). The capability prvided t the cnsumer is t prvisin prcessing, strage, netwrks, and ther fundamental cmputing resurces where the cnsumer is able t deply and run arbitrary sftware, which can include perating systems and applicatins. The cnsumer des nt manage r cntrl the underlying clud infrastructure but has cntrl ver perating systems, strage, deplyed applicatins, and pssibly limited cntrl f select netwrking cmpnents (e.g., hst firewalls). Deplyment Mdels: 1. Private clud. The clud infrastructure is perated slely fr an rganizatin. It may be managed by the rganizatin r a third party and may exist n premise r ff premise. 2. Cmmunity clud. The clud infrastructure is shared by several rganizatins and supprts a specific cmmunity that has shared cncerns (e.g., missin, security requirements, plicy and cmpliance cnsideratins). It may be managed by the rganizatins r a third party, and may exist n-premise r ff-premise. 3. Public clud. The clud infrastructure is made available t the general public r a large industry grup, and is wned by an rganizatin selling clud services. 4. Hybrid clud. The clud infrastructure is a cmpsitin f tw r mre cluds (private, cmmunity, r public) that remain unique entities but are bund tgether by standardized r prprietary technlgy that enables data and applicatin prtability (e.g., clud bursting fr lad-balancing between cluds). Understanding and Evaluating Netwrk Cmplexities Befre the intrductin f clud services, all f a user s data and applicatins were stred and hsted by a hard drive n a cmputer r a set f servers in the IT department f an enterprise netwrk. The figure belw shws that with clud cmputing, there isn t any need fr that hard drive r fr thse servers. Everything is in the clud stred, shared, r managed with anywhere, anytime availability. Fr example, an enterprise clud user can access the cmpany netwrk frm hme r frm the rad, day r night all that s needed is an Internet cnnectin.
4 P a g e 4 f 12 Based n the mdels defined by the NIST, individual clud service culd be classified against a clud service mdel (e.g., SaaS, PaaS r IaaS) and the deplyment mdel being utilized (e.g., private clud, cmmunity clud, public clud, r hybrid clud). Hwever, there are additinal cmplexities t cnsider frm the perspective f the underlying cmmunicatins netwrk. These include: The access netwrk arrangement and technlgies (e.g., fixed and mbile) The cre netwrk arrangements. Figure 1 Delivery f clud services There are different implicatins fr perfrmance, reliability and security depending upn hw the clud services are accessed whether thrugh the managed IP netwrk services f a prvider r the pen Internet. Therefre, the planning, design and peratin f clud services must invlve a cmplete system engineering view f the verall architecture that includes the relatinships with the underlying netwrk.
5 P a g e 5 f 12 Setting Effective Criteria fr Quality f Service and Security The main challenge facing the clud industry is a lack f effective criteria t describe and measure quality f service and security assurance. This absence f clear and precise standards makes it difficult t pinpint the critical elements t be included in SLAs. Mre imprtantly, it s als challenging t determine effective means t verify cmpliance t the technical and security criteria that is stipulated. Fr missin-critical applicatins, these issues must be reslved by setting effective clud criteria fr a netwrk s: Perfrmance Reliability, Availability and Disaster Recvery Security Perfrmance Issues Clud planning, design and peratins must take end-t-end perfrmance int cnsideratin. Given the variety f service architectural and deplyment mdels, as well as variatins f the underlying cmmunicatins netwrk arrangements, perfrmance in terms f quality f service (QS) is unpredictable. This vlatility in the clud can lead t netwrk delays, latency, jitter and dwntime. There are n well-knwn r established criteria t describe the requirements fr end-t-end quality f service that takes int cnsideratin bth perfrmance at the clud applicatin level and perfrmance f the underlying cmmunicatins netwrk. This issue is further cmplicated by the fact that the cmmunicatins services prvider may be different frm the clud service prvider. Therefre, key perfrmance issues must be identified by rganizatins themselves and verified with the service prviders they use. Reliability, Availability and Disaster Recvery Issues Certain critical applicatins, if mved t the clud, wuld demand a guaranteed QS, high levels f reliability, and cntinued availability frm their cmputing infrastructure. While SLAs can be structured t meet the demands f varius businesses, the reality is that sme level f failures will ccur when using cmmdity-based hardware slutins. It is likely that events resulting in netwrking failures and utages will ccur frm time t time. Therefre, clud deplyment and implementatin planning must include the peratinal measures t verify enfrcement f diversity and redundancy rules t survive a variety f uncntrllable perils. Operatinal measures must be implemented, enfrced, and audited fr nncmpliance. The planning, design, and peratin f clud services shuld include identifying physical and lgical interdependencies in the clud prvider's infrastructure tgether with the underlying netwrk infrastructure. Understanding hw resurce demcratizatin ccurs within the clud prvider t best predict system availability and perfrmance is critical t the migratin and nging maintenance prcess.
6 P a g e 6 f 12 Security Issues There are bvius cncerns abut the security f transfer and retentin f sensitive data, especially as a clud-based infrastructure seems t imply a less transparent mechanism f string and prcessing data. Many cmpanies and gvernment agencies are uncmfrtable with their data being lcated n hardware utside f their direct cntrl. This unease quickly turns t fear when yu add the fact that clud cmputing services are ften multitenant, meaning that ther cmpanies, even cmpetitrs, are sharing the same hardware resurces. In additin, a heightened regulatry envirnment has driven the need fr rganizatins t be extremely cautius with their infrmatin due t serius legal and financial sanctins if persnal data is cmprmised. Clud prviders are faced with the need t prvide prper security measures and are unsure what functinalities are apprpriate r adequate. On the ther hand, the enterprise custmer f clud services faces difficulty determining the requirements fr security and the apprpriate measures t check fr cmpliance. Mitigating security risks and threats assciated with the use f clud infrastructure, platfrms and applicatins is a majr challenge. When chsing a clud service prvider, the fllwing security issues must be cnsidered: Chain f Trust Identity Management (IdM) Third Party and Supply Chain Management Establishing a Chain f Trust The assurance that the risk frm using clud services is at an acceptable level depends n the trust that the rganizatin places in its clud service prvider. In sme cases, the level f trust is based n the amunt f direct cntrl the rganizatin is able t exert ver the prvider s security techniques. The security planning, design and peratins fr clud must establish and maintain apprpriate measures t enfrce a chain f trust. This includes building cnfidence that each participating service prvider in the clud supply chain ffers adequate data prtectin and security. The chain f trust can be cmplicated due t the number f entities participating in the cnsumer-prvider relatinship chain and the type f relatinship between the parties. It s als pssible that clud service prviders may utsurce services t ther external entities, making the chain f trust even mre cmplicated and difficult t manage. Ensuring Effective Identity Management (IdM) T deply and maintain clud services, rganizatins must establish clearly defined and enfrceable plicies fr identity management amng the multiple parties invlved, including the clud custmer, the clud prvider and any third parties. A clear and structured apprach t risk assessment shuld be established and used amng all parties t determine, select and implement the necessary security cntrls. Fr example, t
7 P a g e 7 f 12 enable strng authenticatin, clud applicatins culd supprt the capability t delegate authenticatin t the enterprise netwrk that is cnsuming the services. In this case, the enterprise can enfrce strng authenticatin using existing infrastructure and authenticate with pen standards such as Security Assertin Markup Language (SAML) with the clud prvider. This wuld require clud prviders t externalize authenticatins and cnsider supprting varius strng authenticatin ptins such as ne-time passwrds, bimetrics, digital certificates and Kerbers. Managing the Clud Supply Chain Supply chain security issues must be carefully cnsidered when selecting clud prviders. T prevent security breaches, rganizatins must maintain tight cntrl ver key business, technical and security issues. Specifically, the clud prvider s supply chain and the prvider s management f thse relatinships shuld be assessed t the extent pssible. Assessment f third party service prviders shuld specifically target the prvider s: Incident management plicies Business cntinuity and disaster recvery prcedures C-lcatin and back-up facilities Metrics illustrating the effectiveness f cntrls in these areas. Cnsidering Operatins frm Every Perspective Operatins need t be cnsidered frm a variety f different perspectives and in the cntext f several different relatinships. Using the diagram belw as a guideline, cnsider the fllwing perspectives when designing, deplying and maintaining clud services: 1. Business cnsumer perspective a. Relatinship t enterprise IT department 2. Enterprise IT department perspective a. Relatinship t business cnsumer b. Relatinship t cmmunicatins service prvider c. Relatinship t clud service prvider 3. Cmmunicatins service prvider perspective a. Relatinship t enterprise IT department b. Relatinship t clud service prvider 4. Clud service prvider perspective a. Relatinship t cmmunicatins service prvider b. Relatinship t enterprise IT department
8 P a g e 8 f 12 Figure 2 Rles and relatinships invlved in the prvisin f clud services Business cnsumer perspective: This perspective shuld nt be impacted by the intrductin f clud services. Enterprise IT department perspective: ITIL prvides best-practice advice and guidance n all aspects f managing the day-t-day peratin f an rganizatin s infrmatin technlgy (IT) services, including relatinships with business cnsumers. Accrding t ITIL Service Design, an IT service is cnstructed frm a cmbinatin f IT assets and externally prvided underpinning services. Clud services, delivered via cmmunicatins services, prvide a new pprtunity t explit the cncept f underpinning services. While ITIL Service Design is fcused n the design f new services, it may in sme cases be apprpriate t redesign existing services t explit the advantages ffered by the clud. In this perspective, the clud service prvider and the cmmunicatins service prvider becme suppliers t the enterprise IT department. The ITIL Supplier Management prcess ensures that suppliers and the services they prvide are managed t supprt IT service targets and business expectatins. Nte, hwever, that while the ITIL Supplier Management prcess prvides best practice guidance, the applicatin f this prcess t a specific enterprise IT department adptin f clud services will require additinal custmized and detailed prcess engineering. Cmmunicatins service prvider perspective: Fr cmmunicatins service prviders, TM Frum s Business Prcess Framewrk, als knwn as etom, serves as the blueprint fr standardizing and categrizing business activities (in the frm f prcess elements) that will help set directin and the starting pint fr develpment and integratin f business and peratins supprt systems (BSS/OSS). Even prir t the clud, the cmmunicatins services and IT services wrlds had been mving clser tgether, including the crrespnding business and peratins prcesses needed t supprt such services. This has been well recgnized thrughut the industry and is discussed in mre detail in a TM Frum study n integrating ITIL and etom t prvide a pragmatic jint slutin fr business supprt in the cmmunicatins sectr. The
9 P a g e 9 f 12 cnvergence f cmmunicatins and IT is further accelerated by the intrductin f clud services, particularly fr the case when an existing cmmunicatins service prvider wants t enter the clud service prvider market. Nte, hwever, that while the TM Frum study prvides guidance n hw t blend ITIL and etom prcesses, the applicatin f a cnverged prcess set within a specific cmmunicatins service prvider envirnment will require additinal custmized and detailed prcess engineering. Clud service prvider perspective: Fr the clud service prvider (whether stand-alne r integrated with a cmmunicatins service prvider), the peratinal prcesses cnstitute thse disciplines that directly prvide IT service delivery (e.g., ITIL). Reflecting n the terminlgy used by the ITIL framewrk, this wuld include the cre disciplines f service peratins: Access management Event management Incident management Prblem management Request fulfillment The nature f the peratins disciplines d nt easily amend t a strict demarcatin between the clud service prvider and the cnsumer s respnsibility acrss OS s, virtual machines, servers, databases, middleware, and applicatins. There will need t be shared respnsibilities when data must be accessed r a wrkflw perates acrss bth entities. Hence, each party must prvide data visibility t the ther, mutually set pririties and crdinate tasks. At a high level, the peratins respnsibilities fr a clud service prvider are as fllws: Mnitring service: The service prvider must mnitr the envirnment (including event, capacity, security and utilizatin) t ensure SLAs are met. The prvider s mnitring data must be prvided ver standardized APIs. Management f incident: Each party must infrm the ther f incidents which may affect the ther. Predefined agreement must be reached n incident priritizatin and the level f effrt required by the service prvider during an incident. Autmated and standardized interfaces are t be established t manage incidents. Crdinating the peratin f change, cnfiguratin, and release/deplyment: Each party will ntify the ther when a change in cnfiguratin r ther peratinal aspect may affect the service capabilities f the ther party. Practive management is required t ensure a stable envirnment. Establishing gvernance: The service prvider must adhere t and permit enfrcement f gverning framewrks and plicies, internal/external audits, minimum standards/certificatins and security cntrls. Penalties and cntract terminatin may be established fr instances where requirements are nt adhered t. Prvisining f services: The service prvider must have effective autmated (wherever pssible) mechanisms t request, prvisin (resurces, access keys, etc.), manage and meter usage f services.
10 P a g e 10 f 12 Establishing Effective Service Level Agreements Clud cmputing uses the cncept f service level agreements t cntrl the use and receipt f cmputing resurces frm, and by, third parties. Any SLA management strategy cnsiders tw well-differentiated phases: the negtiatin f the cntract and the mnitring f its fulfillment in real time. Thus, SLA management encmpasses: SLA cntract definitin including basic schema with the QS parameters SLA negtiatin SLA mnitring SLA enfrcement accrding t defined plicies The underlying benefit f clud cmputing is shared resurces, which is supprted by the underlying nature f a shared infrastructure envirnment. Thus, SLAs span acrss the clud and are ffered by service prviders as a service-based agreement. Measuring, mnitring, and reprting n clud perfrmance is based upn an end user experience r the end user s ability t cnsume resurces. A majr challenge fr clud cmputing, relative t SLAs, is the difficultly in determining rt cause fr service interruptins due t the cmplex nature f the envirnment. Frm the diagram belw, it can be seen that the imprtance f SLAs spans all relatinships that exist between a prvider f a service (any type f service) and the cnsumer f that service. Histrically, service prviders have specified the details f what is cntained (r nt cntained) in the SLA based n what service capabilities they are able t deliver accrding t their deplyed technlgy infrastructure. Hwever, the recent trend is fr custmers t becme mre and mre invlved in the SLA specificatin prcess based n their particular business needs. With respect t clud cmputing and SLAs in particular, custmers wuld like t see the fllwing attributes addressed: Clarity f pricing unit ptins Clarity and cmpleteness f definitins, targets, failure types and remedies, mnitring and reprting Service credit plicy in the cntext f a service management tl (nt t be cnfused with liability cncerns) Ability t change and mdify, within parameters, at the custmer s discretin Year-ver-year imprvement if a lnger term cmmitment is required Clarity f day ne cmmitment Metrics addressing (at minimum): availability, prvisining, perfrmance, incident and prblem management, reprting quality and timeliness, change respnsiveness, regulatry driven respnsiveness, prvisin f underlying data and service sets, verall custmer satisfactin, sustainability and efficiency
11 P a g e 11 f 12 Figure 3 SLAs applicable t the prvisin f clud services Chsing the Right Service Prvider In tday s cmpetitive clud envirnment, rganizatins shuld expect the highest quality and prfessinal standards frm their clud service prviders. Because the clud is a relatively new phenmenn, nt all prviders have the necessary expertise t slve the cmplex netwrk challenges that rganizatins face. T ensure a reliable and secure netwrk in the clud, ptential prviders shuld be evaluated n best practice criteria, which call fr experience in: Safeguarding sensitive, missin-critical data in the clud envirnment Managing cmplex clud supply chains that invlve multiple parties Planning effective service level agreements that ensure netwrk perfrmance, reliability, disaster recvery, and security Due diligence fr cmpliance and verificatin f all technical requirements and security plicies
12 P a g e 12 f 12 Cnclusin The transitin t clud services fr critical applicatins that demand quality f service and security present tugh new challenges fr rganizatins t slve. T succeed in this difficult envirnment, rganizatins need a structured apprach t planning, designing and implementing their clud structure. By demanding transparency and accuntability frm clud cmputing service prviders, negtiating fr mre effective SLAs, and ensuring nging cmpliance t technical requirements and security plicies, rganizatins can maximize their clud infrastructure s perfrmance, reliability, and security and meet their cre business gals. F O R M O R E I N F O R M A T I O N A B O U T E F F E C T I V E L Y G R O W I N G C L O U D I N F R A S T R U C T U R E, C O N T A C T U S A T : Applied Cmmunicatin Sciences 150 Munt Airy Rad Basking Ridge, NJ [email protected] Applied Cmmunicatin Sciences. All rights reserved. WP-033
The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
Better Practice Guide Financial Considerations for Government use of Cloud Computing
Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.
CMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
PCI DSS Cloud Computing Guidelines
Standard: PCI Data Security Standard (PCI DSS) Versin: 2.0 Date: February 2013 Authr: Clud Special Interest Grup PCI Security Standards Cuncil Infrmatin Supplement: PCI DSS Clud Cmputing Guidelines Table
How Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
Service Level Agreement in IBM T Clud - ITAP
G-Clud Lt 4: Specialist Clud Services Service Definitin 100 Lngwater Avenue Green Park Reading Berkshire RG2 6GP Tel: 0118 9213 510 Email: [email protected] Website: www.dssec.c.uk Intrductin Thank yu fr
Basic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins
Change Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
System Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
State of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
IN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration
Slutin Brief OpenStack Services OVERVIEW OnX understands clud adptin challenges f glbal enterprise cmpanies and helps Enterprises adpt OpenStack slutins thrugh targeted services. We ffer vertical industry
Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
Licensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
Licensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
The ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days
ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
Integrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
Succession Planning & Leadership Development: Your Utility s Bridge to the Future
Successin Planning & Leadership Develpment: Yur Utility s Bridge t the Future Richard L. Gerstberger, P.E. TAP Resurce Develpment Grup, Inc. 4625 West 32 nd Ave Denver, CO 80212 ABSTRACT A few years ag,
Professional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
Presentation: The Demise of SAS 70 - What s Next?
Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS
System Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
VMware vcloud Architecture Toolkit Operating a VMware vcloud
VMware vclud Architecture Tlkit Versin 2.0.1 Octber 2011 2011 VMware, Inc. All rights reserved. This prduct is prtected by U.S. and internatinal cpyright and intellectual prperty laws. This prduct is cvered
What is Software Risk Management? (And why should I care?)
What is Sftware Risk Management? (And why shuld I care?) Peter Kulik, KLCI, Inc. 1 st Editin, Octber 1996 Risks are schedule delays and cst verruns waiting t happen. As industry practices have imprved,
Data Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
Data Abstraction Best Practices with Cisco Data Virtualization
White Paper Data Abstractin Best Practices with Cisc Data Virtualizatin Executive Summary Enterprises are seeking ways t imprve their verall prfitability, cut csts, and reduce risk by prviding better access
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
Guidelines for Outsourcing, Offshoring, and Cloud Services
Preview Guidelines fr Outsurcing, Offshring, and Clud Services Frewrd Data security and data prtectin challenges arise in mst utsurcing and ffshring transactins, particularly where services are clud based.
Network Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
Job Profile Data & Reporting Analyst (Grant Fund)
Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract
GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN
Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm
State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD)
State f Wiscnsin Divisin f Enterprise Technlgy (DET) Distributed Database Hsting Service Offering Definitin (SOD) Distributed Database Hsting SOD Page 1 12/9/2010 Dcument Revisin Histry (Majr Pst Publishing
ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT POLICY Plicy N. 10014 Review Date Octber 1, 2014 Effective Date March 1, 2014 Crss- Respnsibility Vice President, Reference Administratin Apprver Executive Cuncil 1. 1. Plicy
OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager
JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE
ITIL Release Control & Validation (RCV) Certification Program - 5 Days
ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
IT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
Online Learning Portal best practices guide
Online Learning Prtal Best Practices Guide best practices guide This dcument prvides Micrsft Sftware Assurance Benefit Administratrs with best practices fr implementing e-learning thrugh the Micrsft Online
Risk Management Policy AGL Energy Limited
Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
Process Automation With VMware
Prcess Autmatin With VMware Intelligent Service Autmatin fr Real and Virtual Envirnments Intrductin This Whitepaper describes hw the UC4 platfrm integrates with the VMware vsphere Server and the VMware
G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Oracle Technlgy Service fr Agile Clud Prjects Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Oracle Technlgy 1. SERVICE OVERVIEW The 6pint6 Oracle Technlgy Service
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd
Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew
The Importance of Market Research
The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
Cloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
OITS Service Level Agreement
OITS Service Level Agreement Objective A Service Level Agreement (SLA) describes the IT Service, dcuments Service Level Targets, and specifies the respnsibilities f the IT Service Prvider and the Custmer.
Mobile Workforce. Improving Productivity, Improving Profitability
Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services
Help Desk Level Competencies
Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar
The Organizational NOS (Network Operating System)
The Organizatinal NOS ( Operating System) [email protected] Nvember 2008 The Organizatinal NOS Executive Summary perating systems (perating systems designed and develped fr netwrking devices
Mobilizing Healthcare Staff with Cloud Services
Mbilizing Healthcare Staff with Clud Services Published May 2012 Mbile Technlgies are changing hw healthcare staff delivers care. With new pwerful integrated slutins available fr the healthcare staff,
ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days
ITIL V3 Planning, Prtectin and Optimizatin (PPO) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Planning, Prtectin and Optimizatin (PPO) Certificate is a free-standing
The AppSec How-To: Choosing a SAST Tool
The AppSec Hw-T: Chsing a SAST Tl Surce Cde Analysis Made Easy GIVEN THE WIDE RANGE OF SOURCE CODE ANALYSIS TOOLS, SECURITY PROFESSIONALS, AUDITORS AND DEVELOPERS ALIKE ARE FACED WITH THE QUESTION: Hw
Best Practices for Optimizing Performance and Availability in Virtual Infrastructures
Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures www.nimsft.cm Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures PAGE 2 Table f Cntents
Chapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
Dec. 2012. Transportation Management System. An Alternative Traffic Solution for the Logistics Professionals
Dec. 2012 Transprtatin Management System An Alternative Traffic Slutin fr the Lgistics Prfessinals What is a TMS-Lite system? What are the features and capabilities f a TMS-Lite system? Why chse a TMS-Lite
Applying Governance to Data Center Migration Projects
MultiTek LLC A Prfessinal Data Center Relcatin Cmpany Applying Gvernance t Data Center Migratin Prjects White Paper Written by: Bb Fitch, PMP, Engagement Manager July 2014 Table f Cntents Cntents IT Gvernance...3
ITIL V3 Service Offerings and Agreements (SOA) Certification Program - 5 Days
ITIL V3 Service Offerings and Agreements (SOA) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Service Offerings and Agreements (SOA) Certificate, althugh a stand alne
BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect
BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitiner Level) Specific Rle Data Architect Grade Directrate Managed by BG13 (TBC) Business Change Senir Infrmatin Systems & Technlgy Architect
Internal Audit Charter and operating standards
Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw
A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
