Saturday, May 18, 2019

The Nist Definition of Cloud Computing

Special Publication 800-145 (Draft) The NIST Definition of dapple Computing (Draft) Recommendations of the subject field Institute of Standards and Technology pricking Mell Timothy Grance NIST Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology creature Mell Timothy Grance C O M P U T E R S E C U R I T Y Computer Security partitioning Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011 U. S. Department of CommerceGary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U. S. economy and prevalent welf ar by providing technical leadership for the acress measurement and standards substructure. ITL develops tes ts, test methods, reference data, proof of concept implementations, and technical analysis to advance the evolution and productive use of cultivation technology.ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and screen of sensitive unclassified information in national computer systems. This Special Publication 800-series reports on ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.National Institute of Standards and Technology Special Publication 800-145 (Draft) 7 pages (January. 2011) Certain commercial entities, equipment, or materials may be identified in this document in rank to describe an experimental procedure or concept adequately. Such identification is non intended to necessitate recommendation or endorsement by the National Institute of Standards and Te chnology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. ii AcknowledgementsThe authors Peter Mell and Timothy Grance of the National Institute of Standards and Technology (NIST) would comparable to thank the many experts in industry and government who contributed their thoughts to the creation and review of this definition. We especially acknowledge Murugiah Souppaya and downwind Badger, also of NIST, whose advice and technical insight assisted this effort. Additional acknowledgements will be added upon the final publication of this guideline. trine 1. 1. 1 Introduction Authority The National Institute of Standards and Technology (NIST) developed this document in packaging of its statutory responsibilities under the FederalInformation Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including nominal requirements, for providing ad equate information security for all agency operations and assets but such standards and guidelines shall not follow up to national security systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing way of life Information Systems, as analyzed in A-130, Appendix IV Analysis of Key Sections. Supplemental information is provided in A-130, Appendix III.This guideline has been prepared for use by Federal agencies. It may be apply by nongovernmental organizations on a voluntary basis and is not subject to copyright, though attribution is desired. vigor in this document should be taken to contradict standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority, nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any separate Federal officia l. 1. 2 endeavor and ScopeThe purpose of this publication is to provide the NIST definition of obliterate computing. NIST intends this informal definition to enhance and inform the public debate on cloud computing. Cloud computing is still an evolving paradigm. Its definition, use cases, inherent technologies, issues, risks, and benefits will be refined and better understood with a spirited debate by the public and private sectors. This definition, its attributes, characteristics, and underlying rationale will evolve over time. 1. 3 Audience The intended audience is people adopting the cloud computing model or providing cloud services. 2. The NIST Definition of Cloud Computing Cloud computing is a model for enabling ubiquitous, convenient, on-demand lucre access to a shared pool of configurable computing resources (e. g. , ne iirks, servers, storage, applications, and services) that faecal matter be rapidly cookeryed and released with minimal management effort or service provid er interaction. This cloud model promotes availableness and is composed of five essential characteristics, three service models, and four deployment models. Essential Characteristics On-demand self-service.A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring military personnel interaction with each services provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick lymph gland platforms (e. g. , mobile phones, laptops, and PDAs). Resource pooling. The providers computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.There is a sense of location liberty in that the customer generally has no control or knowledge over the exact location of the prov ided resources but may be able to specify location at a higher aim of abstraction (e. g. , country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in slightly cases automatically, to quickly scale out, and rapidly released to quickly scale in.To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Measured proceeds. Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e. g. , storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.Service Models Cloud Software as a Service (SaaS). The capability pro vided to the consumer is to use the providers applications running on a cloud infrastructure. The applications are handy from various client devices through a thin client interface such as a web browser (e. g. , web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operate systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.Cloud plan as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programme languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operate systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. 1 Typically through a pay-per- use business model. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating(a) systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e. g. , host firewalls).Deployment Models Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e. g. , mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise.Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is have by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e. g. , cloud bursting for load balancing amidst clouds). 3

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.