I’m going to try to give you some updates about how our new book (announced here) is coming along. This month we started handing over some chapters to Syngress and we are really excited with this project. We are using the same formula that we used in our previous books, in other words, we split the chapter in two parts and each one write half of the chapter. This gives us the opportunity to write every single chapter, equally split the work and leverage our areas of expertise within the technology. There are two recent news that I would like to echo here: as announced today by Richard Hicks his blog, he will be the Technical Reviewer for this book and as we known Richard for a long time we are very pleased to have him onboard to help us on this project. As I announced last Saturday (via Twitter – see below), Syngrees will be handing over to us the draft book cover and we will be showing it during our sessions at TechED US in June. I hope to see you there !
If you are part of the DFW IT PRO Group, make sure to add to your calendar our presentation “Understanding and Deploying Hosted Private Cloud: Concepts & Implementation”. More information here:
See you there!
If you were at Share Cloud Dallas last month in our presentation about Private Cloud Security you probably remember one topic that we discussed called “Cloud Security Challenges Secondary to Cloud Essential Characteristics”. This series of post that I’m going to write (at least one per week) will explain how Private Cloud with System Center 2012 can assist you to address those concerns.
Cloud Security Challenge 1 – Resource Pooling
Problem Statement as described in the Private Cloud Security Paper: As the consumer (tenant) of the services offered by a private cloud in my enterprise, I want to be sure that the data in my application is secure, that no-on else can access it, and that it is safe if something untoward occurs.
How System Center 2012 can assist you with this Challenge?
System Center 2012 Role-Based Access Control and User Role features can assist you with that. Partitioning and Role Based Access Control (RBAC) also applies to your administrators, who should not have automatic access to tenant data. In the case where an administrator does require access to tenant data, then that access must be carefully audited.
With the User Role Wizard you can even customize the user role for that particular cloud as shown below:
When creating a User Role you can also determine the scope for the User, in other words, which Cloud that user (or users) will be able to perform those pre-defined actions:
For a full demonstration on how to perform those actions use the video below (skip to minute 33:03):