preview

The Cloud Computing Model

Better Essays

Now when it comes to the option of switching our business solutions from our company to a cloud based solution such as cloud based email services and servers which allow for ease of access allowing us to gain access to our work email from anyplace at any time. In doing so it would remove the added cost and other aspects such as maintaining and hosting our own mail servers providing peace of mind maintaining the main aspect we look for when talking about email accessibility. In terms of what types of cloud models there are to select from they are based off what needs that need to be satisfied. Here is a breakdown of the basic models of cloud computing models of which there are 3: infrastructure as a service(IaaS), platform as a …show more content…

In exchange for the services provided by the IaaS provider we would pay on a per-use or utility computing basis. o Some characteristics of this are:
 Automated administrative tasks
 Dynamic scaling
 Platform virtualization
 Internet connectivity
 (Techopedia, Explains Infrastructure as a Service (IaaS)) o In the case of IaaS with this model focusing on the management virtual machines(VM). The risk is dealing with the virtual machines themselves and the data they hold. To mitigate this risk, the chief security officer (CSO) should outlay a governance framework to enable our business to put controls in place requiring how VM’s are created and spun down which would avoid uncontrolled access and cost increases. (Mark O’Neill, Vordel, SaaS, PaaS, and IaaS: A security checklist for cloud models)
 Platform as a Service(PaaS) o The capability that is provided to the consumer is to deploy onto the cloud infrastructure consumer created or acquired applications created using programming languages, libraries, services, and tools supported by the cloud service provider. With the consumer not managing or controlling the underlying cloud infrastructure including network, servers, OS, or storage while the consumer does control the deployed applications and possibly configuration settings for the application hosting environment. (Peter Mell, Timothy Grance, The NIST Definition

Get Access