Saturday, February 23, 2019
The Nist Definition of Cloud Computing
additional Publication 800-145 (Draft) The NIST Definition of tarnish work out (Draft) Recommendations of the subject field install of Standards and technology Peter Mell Timothy Grance NIST Special Publication 800-145 (Draft) The NIST Definition of Cloud computing (Draft) Recommendations of the issue Institute of Standards and engine room Peter Mell Timothy Grance C O M P U T E R S E C U R I T Y Computer Security Division Information technology Laboratory National Institute of Standards and engineering science Gaithersburg, MD 20899-8930 January 2011 U. S. Department of CommerceGary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) publicises the U. S. economy and cosmos welfare by providing technical leadership for the nations mensuration and standards radix. ITL develops test s, test methods, reference data, proof of concept implementations, and technical analysis to gain the education and productive use of teaching technology.ITLs responsibilities include the development of technical, physical, administrative, and divvy upment standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal official computer systems. This Special Publication 800-series reports on ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, g overnment, and academic organizations.National Institute of Standards and Technology Special Publication 800-145 (Draft) 7 pages (January. 2011) Certain commercial entities, equipment, or materials whitethorn be identified in this document in order to tell an experimental procedure or concept comme il fautly. Such identification is non intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the surmount procurable for the purpose. ii AcknowledgementsThe authors Peter Mell and Timothy Grance of the National Institute of Standards and Technology (NIST) would like to thank the many experts in industry and government who contributed their thoughts to the existence and review of this definition. We especially acknowledge Murugiah Souppaya and Lee Badger, also of NIST, whose advice and technical shrewdness assisted this effort. Additional acknowledgements go out be added upon the final publication of this guideline. tercet 1. 1. 1 Introduction Authority The National Institute of Standards and Technology (NIST) essential this document in furtherance of its statutory responsibilities chthonic the FederalInformation Security commission Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets but such(prenominal)(prenominal) standards and guidelines shall not apply to national security systems. This guideline is consistent with the requirements of the place of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in A-130, Appendix IV Analysis of Key Sections. supplemental information is provided in A-130, Appendix III.This guideline has been prepared for use by Federal agencies. It may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright, though attribution is desired. vigor in this document should be taken to contradict standards and guidelines made needed and binding on Federal agencies by the Secretary of Commerce under statutory authority, nor should these guidelines be interpreted as altering or superseding the real authorities of the Secretary of Commerce, Director of the OMB, or any other Federal official. 1. 2 Purpose and ScopeThe purpose of this publication is to provide the NIST definition of slander computing. NIST intends this informal definition to enhance and inform the public controversy on maculate computing. Cloud computing is still an evolving paradigm. Its definition, use cases, underlying technologies, issues, risks, and benefits will be refined and better understood with a spirited debate by the public and private sectors. This definition, its attributes, characteristics, and underlying rationale will spring up over time. 1. 3 Audience The intended audience is people adopting the dapple computing model or providing defame aids. 2. The NIST Definition of Cloud Computing Cloud computing is a model for enabling ubiquitous, convenient, on-demand net get to to a shared pool of configurable computing resources (e. g. , networks, processrs, storage, applications, and services) that can be chop-chop provisioned and released with minimal managem ent effort or service provider interaction. This blot out model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. Essential Characteristics On-demand self-service.A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed mechanically without requiring human interaction with each services provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick customer platforms (e. g. , mobile phones, laptops, and PDAs). Resource pooling. The providers computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.There is a sense of location independence in that the customer generally has no understand or knowledge over the exact location of the provided resources but may be able to ascertain location at a higher level of abstraction (e. g. , country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. Rapid elasticity. Capabilities can be apace and elastically provisioned, in some cases automatically, to quickly crustal plate out, and rapidly released to quickly scale in.To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Measured Service. Cloud systems automatically tame and optimize resource use by supplement a metering capability1 at some level of abstraction appropriate to the subject of service (e. g. , storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.Service Models Cloud Software as a Servic e (SaaS). The capability provided to the consumer is to use the providers applications speed on a cloud foundation. The applications are accessible from various customer devices through a thin client interface such as a web browser (e. g. , web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, run systems, storage, or even soulfulness application capabilities, with the possible exception of limited user- specialised application configuration settings.Cloud political platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environme nt configurations. 1 Typically through a pay-per-use business model. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e. g. , host firewalls).Deployment Models Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third companionship and may exist on premise or off premise. corporation cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e. g. , mission, security requirements, policy, and complianc e considerations). It may be managed by the organizations or a third party and may exist on premise or off premise.Public cloud. The cloud infrastructure is made available to the general public or a large industry company and is owned by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e. g. , cloud bursting for load balancing between clouds). 3
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment