SlideShare a Scribd company logo
1 of 6
We are going to explore the Web regarding cloud service level
agreements (SLA).
Topic- cloud services and the SLA
A. Find an article on the Web that is no more than 4 years
old that describes a poor experience with cloud services and
SLAs.
B. Remember the article must contain two (2) elements to be
considered in this assignment, e.g. cloud services and the SLA.
You must use your own words. Do not copy and paste any part
of the article into the discussion.
C. Once you have found an appropriate article, tell the story IN
YOUR OWN WORDS and correlate the pertinent elements to
Erl, 2013, Chapter 3, Section 3.4. Be selective in the article
you choose to explain to the class.
D. Finally, summarize and provide your own recommendation
on how to mitigate the problem(s) you described.
Here are the topics in Erl, 2013 that you must correlate your
article towards.
· Reduced Operational Governance Control
· Limited Portability Between Cloud Providers
· Multi-Regional Compliance and Legal Issues
*Be sure to read Erl, 2013, Chapter 3, Section 3.4 before your
Web search to avoid making a critical mistake in your
discussion.
Keep your story as short as possible. Do not exceed 450
words. Provide a valid link (URL) to your article so that we
may find and read it.
Chapter 3
Section 3.4 (Page no 98- 102)
3.4. Risks and Challenges
Several of the most critical cloud computing challenges
pertaining mostly
to cloud consumers that use IT resources located in public
clouds are
presented and examined.
Increased Security Vulnerabilities
The moving of business data to the cloud means that the
responsibility
over data security becomes shared with the cloud provider. The
remote
usage of IT resources requires an expansion of trust boundaries
by the
cloud consumer to include the external cloud. It can be difficult
to
establish a security architecture that spans such a trust boundary
without introducing vulnerabilities, unless cloud consumers and
cloud
providers happen to support the same or compatible security
frameworks—which is unlikely with public clouds.
Another consequence of overlapping trust boundaries relates to
the
cloud provider’s privileged access to cloud consumer data. The
extent to
which the data is secure is now limited to the security controls
and
policies applied by both the cloud consumer and cloud provider.
Furthermore, there can be overlapping trust boundaries from
different
cloud consumers due to the fact that cloud-based IT resources
are
commonly shared.
The overlapping of trust boundaries and the increased exposure
of data
can provide malicious cloud consumers (human and automated)
with
greater opportunities to attack IT resources and steal or damage
business
data. Figure 3.9 illustrates a scenario whereby two
organizations
accessing the same cloud service are required to extend their
respective
trust boundaries to the cloud, resulting in overlapping trust
boundaries.
It can be challenging for the cloud provider to offer security
mechanisms
that accommodate the security requirements of both cloud
service
consumers.
Figure 3.9. The shaded area with diagonal lines indicates the
overlap of two organizations’
trust boundaries.
Overlapping trust boundaries is a security threat that is
discussed in
more detail in Chapter 6.
Reduced Operational Governance Control
Cloud consumers are usually allotted a level of governance
control that is
lower than that over on-premise IT resources. This can
introduce risks
associated with how the cloud provider operates its cloud, as
well as the
external connections that are required for communication
between the
cloud and the cloud consumer.
Consider the following examples:
• An unreliable cloud provider may not maintain the guarantees
it makes
in the SLAs that were published for its cloud services. This can
jeopardize the quality of the cloud consumer solutions that rely
on these
cloud services.
• Longer geographic distances between the cloud consumer and
cloud
provider can require additional network hops that introduce
fluctuating
latency and potential bandwidth constraints.
The latter scenario is illustrated in Figure 3.10.
Figure 3.10. An unreliable network connection compromises the
quality of
communication between cloud consumer and cloud provider
environments.
Legal contracts, when combined with SLAs, technology
inspections, and
monitoring, can mitigate governance risks and issues. A cloud
governance system is established through SLAs, given the “as-
a-service”
nature of cloud computing. A cloud consumer must keep track
of the
actual service level being offered and the other warranties that
are made
by the cloud provider.
Note that different cloud delivery models offer varying degrees
of
operational control granted to cloud consumers, as further
explained
in Chapter 4.
Limited Portability Between Cloud Providers
Due to a lack of established industry standards within the cloud
computing industry, public clouds are commonly proprietary to
various
extents. For cloud consumers that have custom-built solutions
with
dependencies on these proprietary environments, it can be
challenging
to move from one cloud provider to another.
Portability is a measure used to determine the impact of moving
cloud
consumer IT resources and data between clouds (Figure 3.11).
Figure 3.11. A cloud consumer’s application has a decreased
level of portability when
assessing a potential migration from Cloud A to Cloud B,
because the cloud provider of
Cloud B does not support the same security technologies as
Cloud A.
Multi-Regional Compliance and Legal Issues
Third-party cloud providers will frequently establish data
centers in
affordable or convenient geographical locations. Cloud
consumers will
often not be aware of the physical location of their IT resources
and data
when hosted by public clouds. For some organizations, this can
pose
serious legal concerns pertaining to industry or government
regulations
that specify data privacy and storage policies. For example,
some UK
laws require personal data belonging to UK citizens to be kept
within the
United Kingdom.
Another potential legal issue pertains to the accessibility and
disclosure
of data. Countries have laws that require some types of data to
be
disclosed to certain government agencies or to the subject of the
data.
For example, a European cloud consumer’s data that is located
in the
U.S. can be more easily accessed by government agencies (due
to the U.S.
Patriot Act) when compared to data located in many European
Union
countries.
Most regulatory frameworks recognize that cloud consumer
organizations are ultimately responsible for the security,
integrity, and
storage of their own data, even when it is held by an external
cloud
provider.
Summary of Key Points
• Cloud environments can introduce distinct security challenges,
some of which
pertain to overlapping trust boundaries imposed by a cloud
provider sharing IT
resources with multiple cloud consumers.
• A cloud consumer’s operational governance can be limited
within cloud
environments due to the control exercised by a cloud provider
over its platforms.
• The portability of cloud-based IT resources can be inhibited
by dependencies
upon proprietary characteristics imposed by a cloud.
• The geographical location of data and IT resources can be out
of a cloud
consumer’s control when hosted by a third-party cloud provider.
This can
introduce various legal and regulatory compliance concerns.

More Related Content

Similar to We are going to explore the Web regarding cloud service level agre.docx

A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
ZERO DATA REMNANCE PROOF IN CLOUD STORAGE
ZERO DATA REMNANCE PROOF IN CLOUD STORAGE ZERO DATA REMNANCE PROOF IN CLOUD STORAGE
ZERO DATA REMNANCE PROOF IN CLOUD STORAGE IJNSA Journal
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreementsCade Zvavanjanja
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationSai P Mishra
 
Cloud computing
Cloud computingCloud computing
Cloud computinghundejibat
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 

Similar to We are going to explore the Web regarding cloud service level agre.docx (20)

CLOUD STORAGE.pptx
CLOUD STORAGE.pptxCLOUD STORAGE.pptx
CLOUD STORAGE.pptx
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
ZERO DATA REMNANCE PROOF IN CLOUD STORAGE
ZERO DATA REMNANCE PROOF IN CLOUD STORAGE ZERO DATA REMNANCE PROOF IN CLOUD STORAGE
ZERO DATA REMNANCE PROOF IN CLOUD STORAGE
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David RossIntroduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
 
Compliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA FrameworkCompliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA Framework
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud
CloudCloud
Cloud
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 

More from endawalling

Mini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docx
Mini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docxMini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docx
Mini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docxendawalling
 
Mini-PaperTop of FormHide   Assignment Information.docx
Mini-PaperTop of FormHide   Assignment Information.docxMini-PaperTop of FormHide   Assignment Information.docx
Mini-PaperTop of FormHide   Assignment Information.docxendawalling
 
Minimum of 2 scholarly sourcesInstructionsFor this assignmen.docx
Minimum of 2 scholarly sourcesInstructionsFor this assignmen.docxMinimum of 2 scholarly sourcesInstructionsFor this assignmen.docx
Minimum of 2 scholarly sourcesInstructionsFor this assignmen.docxendawalling
 
minimum 1000 wordsUsing the University Digital Library or the .docx
minimum 1000 wordsUsing the University Digital Library or the .docxminimum 1000 wordsUsing the University Digital Library or the .docx
minimum 1000 wordsUsing the University Digital Library or the .docxendawalling
 
Minimum 300-wordCase Study Frederi.docx
Minimum 300-wordCase Study Frederi.docxMinimum 300-wordCase Study Frederi.docx
Minimum 300-wordCase Study Frederi.docxendawalling
 
Min 350 words Discussion Questions Explain what psychologic.docx
Min 350 words Discussion Questions Explain what psychologic.docxMin 350 words Discussion Questions Explain what psychologic.docx
Min 350 words Discussion Questions Explain what psychologic.docxendawalling
 
Mini CAseBuilding Shared Services at RR Communications4.docx
Mini CAseBuilding Shared Services at RR Communications4.docxMini CAseBuilding Shared Services at RR Communications4.docx
Mini CAseBuilding Shared Services at RR Communications4.docxendawalling
 
Miller 3Carrie MillerAfrican American Authors from 1900’s to.docx
Miller 3Carrie MillerAfrican American Authors from 1900’s to.docxMiller 3Carrie MillerAfrican American Authors from 1900’s to.docx
Miller 3Carrie MillerAfrican American Authors from 1900’s to.docxendawalling
 
Milestone 1 business law.docxby China BrownSubmission da.docx
Milestone 1 business law.docxby China BrownSubmission da.docxMilestone 1 business law.docxby China BrownSubmission da.docx
Milestone 1 business law.docxby China BrownSubmission da.docxendawalling
 
Militants have altered the social meaning of Islam, especially in th.docx
Militants have altered the social meaning of Islam, especially in th.docxMilitants have altered the social meaning of Islam, especially in th.docx
Militants have altered the social meaning of Islam, especially in th.docxendawalling
 
Min 350 words.Discussion Questions For your forum post, d.docx
Min 350 words.Discussion Questions For your forum post, d.docxMin 350 words.Discussion Questions For your forum post, d.docx
Min 350 words.Discussion Questions For your forum post, d.docxendawalling
 
Minimum of 100 words each, with one reference each…1) On Hea.docx
Minimum of 100 words each, with one reference each…1) On Hea.docxMinimum of 100 words each, with one reference each…1) On Hea.docx
Minimum of 100 words each, with one reference each…1) On Hea.docxendawalling
 
Minimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docx
Minimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docxMinimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docx
Minimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docxendawalling
 
Mila Jefferies is a recently widowed 36-year-old mother of two c.docx
Mila Jefferies is a recently widowed 36-year-old mother of two c.docxMila Jefferies is a recently widowed 36-year-old mother of two c.docx
Mila Jefferies is a recently widowed 36-year-old mother of two c.docxendawalling
 
Mikayla Schumacher .docx
Mikayla Schumacher                                                .docxMikayla Schumacher                                                .docx
Mikayla Schumacher .docxendawalling
 
Miguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docx
Miguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docxMiguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docx
Miguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docxendawalling
 
Migration is a significant feature of ancient and medieval life. Usi.docx
Migration is a significant feature of ancient and medieval life. Usi.docxMigration is a significant feature of ancient and medieval life. Usi.docx
Migration is a significant feature of ancient and medieval life. Usi.docxendawalling
 
Milanovic explores three dimensions of income inequality. These dime.docx
Milanovic explores three dimensions of income inequality. These dime.docxMilanovic explores three dimensions of income inequality. These dime.docx
Milanovic explores three dimensions of income inequality. These dime.docxendawalling
 
Migration and immigration is an age-old process of people moving acr.docx
Migration and immigration is an age-old process of people moving acr.docxMigration and immigration is an age-old process of people moving acr.docx
Migration and immigration is an age-old process of people moving acr.docxendawalling
 
Meriwether County Public School System Cyber Security Project .docx
Meriwether County Public School System Cyber Security Project .docxMeriwether County Public School System Cyber Security Project .docx
Meriwether County Public School System Cyber Security Project .docxendawalling
 

More from endawalling (20)

Mini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docx
Mini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docxMini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docx
Mini CaseIT Planning at ModMeters4Brian Smith, CIO of Mo.docx
 
Mini-PaperTop of FormHide   Assignment Information.docx
Mini-PaperTop of FormHide   Assignment Information.docxMini-PaperTop of FormHide   Assignment Information.docx
Mini-PaperTop of FormHide   Assignment Information.docx
 
Minimum of 2 scholarly sourcesInstructionsFor this assignmen.docx
Minimum of 2 scholarly sourcesInstructionsFor this assignmen.docxMinimum of 2 scholarly sourcesInstructionsFor this assignmen.docx
Minimum of 2 scholarly sourcesInstructionsFor this assignmen.docx
 
minimum 1000 wordsUsing the University Digital Library or the .docx
minimum 1000 wordsUsing the University Digital Library or the .docxminimum 1000 wordsUsing the University Digital Library or the .docx
minimum 1000 wordsUsing the University Digital Library or the .docx
 
Minimum 300-wordCase Study Frederi.docx
Minimum 300-wordCase Study Frederi.docxMinimum 300-wordCase Study Frederi.docx
Minimum 300-wordCase Study Frederi.docx
 
Min 350 words Discussion Questions Explain what psychologic.docx
Min 350 words Discussion Questions Explain what psychologic.docxMin 350 words Discussion Questions Explain what psychologic.docx
Min 350 words Discussion Questions Explain what psychologic.docx
 
Mini CAseBuilding Shared Services at RR Communications4.docx
Mini CAseBuilding Shared Services at RR Communications4.docxMini CAseBuilding Shared Services at RR Communications4.docx
Mini CAseBuilding Shared Services at RR Communications4.docx
 
Miller 3Carrie MillerAfrican American Authors from 1900’s to.docx
Miller 3Carrie MillerAfrican American Authors from 1900’s to.docxMiller 3Carrie MillerAfrican American Authors from 1900’s to.docx
Miller 3Carrie MillerAfrican American Authors from 1900’s to.docx
 
Milestone 1 business law.docxby China BrownSubmission da.docx
Milestone 1 business law.docxby China BrownSubmission da.docxMilestone 1 business law.docxby China BrownSubmission da.docx
Milestone 1 business law.docxby China BrownSubmission da.docx
 
Militants have altered the social meaning of Islam, especially in th.docx
Militants have altered the social meaning of Islam, especially in th.docxMilitants have altered the social meaning of Islam, especially in th.docx
Militants have altered the social meaning of Islam, especially in th.docx
 
Min 350 words.Discussion Questions For your forum post, d.docx
Min 350 words.Discussion Questions For your forum post, d.docxMin 350 words.Discussion Questions For your forum post, d.docx
Min 350 words.Discussion Questions For your forum post, d.docx
 
Minimum of 100 words each, with one reference each…1) On Hea.docx
Minimum of 100 words each, with one reference each…1) On Hea.docxMinimum of 100 words each, with one reference each…1) On Hea.docx
Minimum of 100 words each, with one reference each…1) On Hea.docx
 
Minimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docx
Minimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docxMinimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docx
Minimum 4 page with 3 references and NO TITLE PAGE1) briefly sum.docx
 
Mila Jefferies is a recently widowed 36-year-old mother of two c.docx
Mila Jefferies is a recently widowed 36-year-old mother of two c.docxMila Jefferies is a recently widowed 36-year-old mother of two c.docx
Mila Jefferies is a recently widowed 36-year-old mother of two c.docx
 
Mikayla Schumacher .docx
Mikayla Schumacher                                                .docxMikayla Schumacher                                                .docx
Mikayla Schumacher .docx
 
Miguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docx
Miguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docxMiguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docx
Miguel JuncoReferences PathophysiologyBohannon, R. W. (1983). .docx
 
Migration is a significant feature of ancient and medieval life. Usi.docx
Migration is a significant feature of ancient and medieval life. Usi.docxMigration is a significant feature of ancient and medieval life. Usi.docx
Migration is a significant feature of ancient and medieval life. Usi.docx
 
Milanovic explores three dimensions of income inequality. These dime.docx
Milanovic explores three dimensions of income inequality. These dime.docxMilanovic explores three dimensions of income inequality. These dime.docx
Milanovic explores three dimensions of income inequality. These dime.docx
 
Migration and immigration is an age-old process of people moving acr.docx
Migration and immigration is an age-old process of people moving acr.docxMigration and immigration is an age-old process of people moving acr.docx
Migration and immigration is an age-old process of people moving acr.docx
 
Meriwether County Public School System Cyber Security Project .docx
Meriwether County Public School System Cyber Security Project .docxMeriwether County Public School System Cyber Security Project .docx
Meriwether County Public School System Cyber Security Project .docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

We are going to explore the Web regarding cloud service level agre.docx

  • 1. We are going to explore the Web regarding cloud service level agreements (SLA). Topic- cloud services and the SLA A. Find an article on the Web that is no more than 4 years old that describes a poor experience with cloud services and SLAs. B. Remember the article must contain two (2) elements to be considered in this assignment, e.g. cloud services and the SLA. You must use your own words. Do not copy and paste any part of the article into the discussion. C. Once you have found an appropriate article, tell the story IN YOUR OWN WORDS and correlate the pertinent elements to Erl, 2013, Chapter 3, Section 3.4. Be selective in the article you choose to explain to the class. D. Finally, summarize and provide your own recommendation on how to mitigate the problem(s) you described. Here are the topics in Erl, 2013 that you must correlate your article towards. · Reduced Operational Governance Control · Limited Portability Between Cloud Providers · Multi-Regional Compliance and Legal Issues *Be sure to read Erl, 2013, Chapter 3, Section 3.4 before your Web search to avoid making a critical mistake in your discussion. Keep your story as short as possible. Do not exceed 450 words. Provide a valid link (URL) to your article so that we may find and read it. Chapter 3 Section 3.4 (Page no 98- 102) 3.4. Risks and Challenges
  • 2. Several of the most critical cloud computing challenges pertaining mostly to cloud consumers that use IT resources located in public clouds are presented and examined. Increased Security Vulnerabilities The moving of business data to the cloud means that the responsibility over data security becomes shared with the cloud provider. The remote usage of IT resources requires an expansion of trust boundaries by the cloud consumer to include the external cloud. It can be difficult to establish a security architecture that spans such a trust boundary without introducing vulnerabilities, unless cloud consumers and cloud providers happen to support the same or compatible security frameworks—which is unlikely with public clouds. Another consequence of overlapping trust boundaries relates to the cloud provider’s privileged access to cloud consumer data. The extent to which the data is secure is now limited to the security controls and policies applied by both the cloud consumer and cloud provider. Furthermore, there can be overlapping trust boundaries from different cloud consumers due to the fact that cloud-based IT resources are commonly shared. The overlapping of trust boundaries and the increased exposure of data can provide malicious cloud consumers (human and automated) with greater opportunities to attack IT resources and steal or damage
  • 3. business data. Figure 3.9 illustrates a scenario whereby two organizations accessing the same cloud service are required to extend their respective trust boundaries to the cloud, resulting in overlapping trust boundaries. It can be challenging for the cloud provider to offer security mechanisms that accommodate the security requirements of both cloud service consumers. Figure 3.9. The shaded area with diagonal lines indicates the overlap of two organizations’ trust boundaries. Overlapping trust boundaries is a security threat that is discussed in more detail in Chapter 6. Reduced Operational Governance Control Cloud consumers are usually allotted a level of governance control that is lower than that over on-premise IT resources. This can introduce risks associated with how the cloud provider operates its cloud, as well as the external connections that are required for communication between the cloud and the cloud consumer. Consider the following examples: • An unreliable cloud provider may not maintain the guarantees it makes in the SLAs that were published for its cloud services. This can jeopardize the quality of the cloud consumer solutions that rely on these cloud services. • Longer geographic distances between the cloud consumer and
  • 4. cloud provider can require additional network hops that introduce fluctuating latency and potential bandwidth constraints. The latter scenario is illustrated in Figure 3.10. Figure 3.10. An unreliable network connection compromises the quality of communication between cloud consumer and cloud provider environments. Legal contracts, when combined with SLAs, technology inspections, and monitoring, can mitigate governance risks and issues. A cloud governance system is established through SLAs, given the “as- a-service” nature of cloud computing. A cloud consumer must keep track of the actual service level being offered and the other warranties that are made by the cloud provider. Note that different cloud delivery models offer varying degrees of operational control granted to cloud consumers, as further explained in Chapter 4. Limited Portability Between Cloud Providers Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly proprietary to various extents. For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be challenging to move from one cloud provider to another. Portability is a measure used to determine the impact of moving cloud consumer IT resources and data between clouds (Figure 3.11).
  • 5. Figure 3.11. A cloud consumer’s application has a decreased level of portability when assessing a potential migration from Cloud A to Cloud B, because the cloud provider of Cloud B does not support the same security technologies as Cloud A. Multi-Regional Compliance and Legal Issues Third-party cloud providers will frequently establish data centers in affordable or convenient geographical locations. Cloud consumers will often not be aware of the physical location of their IT resources and data when hosted by public clouds. For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies. For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom. Another potential legal issue pertains to the accessibility and disclosure of data. Countries have laws that require some types of data to be disclosed to certain government agencies or to the subject of the data. For example, a European cloud consumer’s data that is located in the U.S. can be more easily accessed by government agencies (due to the U.S. Patriot Act) when compared to data located in many European Union countries. Most regulatory frameworks recognize that cloud consumer
  • 6. organizations are ultimately responsible for the security, integrity, and storage of their own data, even when it is held by an external cloud provider. Summary of Key Points • Cloud environments can introduce distinct security challenges, some of which pertain to overlapping trust boundaries imposed by a cloud provider sharing IT resources with multiple cloud consumers. • A cloud consumer’s operational governance can be limited within cloud environments due to the control exercised by a cloud provider over its platforms. • The portability of cloud-based IT resources can be inhibited by dependencies upon proprietary characteristics imposed by a cloud. • The geographical location of data and IT resources can be out of a cloud consumer’s control when hosted by a third-party cloud provider. This can introduce various legal and regulatory compliance concerns.