11.07.2015 Views

Deloitte's Cloud Computing Risk Intelligence Map - Build Security In

Deloitte's Cloud Computing Risk Intelligence Map - Build Security In

Deloitte's Cloud Computing Risk Intelligence Map - Build Security In

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cloud</strong> computing delivery models, based on theircharacteristics and purpose<strong>Cloud</strong> computing technology is deployed in different ways, with varying internal orexternal ownership and technical architecturesVendor cloud(External)<strong>Cloud</strong> computing services from vendors that can be accessed across the<strong>In</strong>ternet or a private network, using one or more data centers, shared amongmultiple customers, with varying degrees of data privacy control. Sometimescalled “public” cloud computing.Private cloud(<strong>In</strong>ternal)<strong>Computing</strong> architectures modeled after vendor clouds, yet built, managed, andused internally by an enterprise; uses a shared services model with variableusage of a common pool of virtualized computing resources. Data is controlledwithin the enterprise.Hybrid cloudA mix of vendor cloud services, internal cloud computing architectures, andclassic IT infrastructure, forming a hybrid model that uses the best-of-breedtechnologies to meet specific needs.Community cloudCommunity clouds are used across organizations that have similar objectivesand concerns, allowing for shared infrastructure and services. Communityclouds can be deployed using any of the three methods outlined above,simplifying cross-functional IT governance.4Copyright © 2011 Deloitte Development LLC. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!