Loading...
Please wait, while we are loading the content...
Similar Documents
Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments
Content Provider | Semantic Scholar |
---|---|
Author | Bartock, Michael J. Souppaya, Murugiah P. Scarfone, Karen Carroll, Daniel Masten, Robert Scinta, Gina Massis, Paul Prafullchandra, Hemma Malnar, Jason Singh, Harmeet Yeluri, Raghuram Shea, T. D. Dalton, Michael Dukes, Anthony J. Phoenix, Carlos Swarts, Brenda |
Copyright Year | 2018 |
Abstract | 48 A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or 49 containerized to include compute, storage, and network resources. Organizations need to be able to 50 monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on 51 business requirements, in a consistent, repeatable, and automated way. The goal of this project is to 52 develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware 53 roots of trust can provide the necessary security capabilities. These capabilities not only provide 54 assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical 55 boundary, but also improve the protections for the data in the workloads and in the data flows between 56 |
File Format | PDF HTM / HTML |
Alternate Webpage(s) | https://www.nccoe.nist.gov/sites/default/files/library/sp1800/tc-hybrid-nist-sp1800-19b-preliminary-draft.pdf |
Alternate Webpage(s) | https://www.nccoe.nist.gov/sites/default/files/library/sp1800/tc-hybrid-sp1800-19a-preliminary-draft.pdf |
Alternate Webpage(s) | https://www.nccoe.nist.gov/sites/default/files/library/sp1800/tc-hybrid-nist-sp1800-19c-preliminary-draft.pdf |
Language | English |
Access Restriction | Open |
Content Type | Text |
Resource Type | Article |