SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

The Impact of Virtualization on Global SLAs


As operators transition to virtualized networks, good old fashioned service assurance is probably more important than ever.
There are a number of factors decision makers should consider when evaluating a cloud solution and should be addressed in the SLA. Things such as:
  • Regulatory compliance: Is the cloud vendor willing to undergo external audits and security certifications?
  • Privileged access: Who has special access to data? Who decides about the hiring and management of such administrators?
  • Data location: Does the cloud vendor allow for any control over the location of data?
  • Data segregation: Is encryption available at all stages, and were these encryption schemes designed and tested by experienced professionals?
  • Recovery: What happens to data in the case of a disaster, and does the vendor offer complete restoration; and, if so, how long does that process take?
  • Investigative Support: Does the vendor have the ability to investigate any inappropriate or illegal activity?
  • Long-term viability: What happens to data if the cloud vendor goes out of business and its clients’ data returned and in what format?
  • Data availability: Can the cloud vendor move all their clients’ data onto a different environment should the existing environment become compromised or unavailable?

Security considerations

As shown in Figure 2 below, each type of cloud – public, private, hybrid – has its own security considerations that affect authentication, authorization, data confidentiality and integrity, non-repudiation, and availability. 

Figure 2: Cloud computing Security Requirements.  Source: Platform Computing

In minimizing potential security trust issues as well as adhering to governance issues facing Cloud computing, a prerequisite control measure is to ensure that a concrete Cloud computing Service Level Agreement (SLA) is put in place and maintained when dealing with outsourced cloud service providers and specialized cloud vendors. Due to the nature and demand of emerging cloud technologies, there is a certain degree of inexperience when dealing with cloud security. Currently Cloud computing clients have to trust 3rd party cloud providers on many fronts, especially on the availability of cloud service as well as data security. Therefore, the SLA forms an integral part of a client’s first line of defense. The SLA thus becomes the solitary legal agreement between the service provider and client. 



FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel