written 8.5 years ago by | modified 2.9 years ago by |
Mumbai University >Information Technology>Sem7>Cloud Computing
Marks: 10 M
Year: May2014, Dec 2014
written 8.5 years ago by | modified 2.9 years ago by |
Mumbai University >Information Technology>Sem7>Cloud Computing
Marks: 10 M
Year: May2014, Dec 2014
written 8.5 years ago by |
Maximizing data availability:
WA provides robust availability based on extensive redundancy achieved with visualization:
a. Replicated data
Azure provides failover clustering of thrice replicated data and Hosted application instances running when failure occurs.
b. Geographically distributed data:
Customers can leverage the geographically distributed nature if WA infrastructure by creating a second storage account to provide hot-failover capability. Customers may also write customized roles to extract data from storage for offsite private backup.
Minimizing security risks:
a. Secure socket layer transmission encryption for web roles:
Azure services can enable Transport layer security (TLS) to use secure HTTP protocol (HTTPS) for transmission of encrypted requests to and responses from production Hosted services and storage accounts for web roles.
b. Encrypting information in Azure storage services:
NET 3.5 provides implementations of many standard cryptographic algorithms including symmetric (shared secret key) and asymmetrical (Public Key Infrastructure PKI)
c. Azure’s conformance with SAS70 and ISO/IEC 27001:2005 certifications.
i. Statement on Auditing Standards no. 70 (SAS 70)
It includes the service auditor’s opinion on the fairness of presentation of the service organizations description of controls that had been placed in operation and the suitability of the design of the controls to achieve the specified control objectives.
ii. The ISO/IEC 27001:2005 standard
An ISO/IEC 27001 complaint system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. Using controls based on identifying and combating the entire range of potential risks to the organizations information assets.