Domain-3 Flashcards
Cloud Service Consumer
maintains a business relationship with, and uses service from, Cloud Service Providers
Cloud Service Provider
responsible for making a service available to service consumers
Cloud Carrier
provides connectivity and transport of cloud services between Cloud Providers and Cloud Consumers
Reservations
Guaranteed MINIMUM
Limits
Absolute MAXIMUM
Shares
If we fight.. we fight based on ranking !!! Used ONLY when we have a resource contention situation (too many requests, not enough resources)
Type 1 Hypervisor
Bare Metal, Embedded or Native Hypervisor
Type 2 Hypervisor
installed on top of the host’s operating system and
then supports other guest operating systems running above it as virtual machines
Network traffic between VMs
not necessarily visible to physical network security controls, which means additional security controls may be necessary
Virtual machines and their disk
are simply files residing somewhere. This means that, for example, a stopped VM is potentially accessible on a file system by third parties if no controls are applied
Management Plane
Provides administrators with the ability to remotely manage
the management plane is the most powerful tool in the entire cloud infrastructure
it will also integrate authentication, access control, and logging and monitoring of resources use
pathway for individual tenants who will have limited and controlled access to the cloud’s resources
management plane’s primary interface is the API
both toward the resources managed as well as toward the users
graphical user interface (i.e., web page) is typically built on top of those APIs. These APIs allow automation of control tasks
the 4 layers of Data Center Security
- Perimeter Security
- Facility Controls
- Computer Room Controls
- Cabinet Controls
Perimeter security
discourage, detect, and delay any unauthorized entry
achieved through a high-resolution video surveillance system, motion-activated security lighting, fiber-optic cable, etc. Video content analytics (VCA) can detect individuals and objects and check for any illegal activity. Track movements of people and avoid false alarms