Reader small image

You're reading from  Information Security Handbook

Product typeBook
Published inDec 2017
Publisher
ISBN-139781788478830
Edition1st Edition
Right arrow
Author (1)
Darren Death
Darren Death
author image
Darren Death

Darren Death is ASRC Federal's Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security. He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Read more about Darren Death

Right arrow

Cloud computing deployment models


The cloud computing deployment model will vary depending on your organization's unique business and mission requirements. The various deployment models bring their unique advantages, disadvantages, and information security challenges.

Public cloud

In this model, the cloud computing infrastructure is utilized by the public in a multitenant environment over the internet:

The service provider makes resources available, such as:

  • Virtual machines (VMs)
  • Applications
  • Storage
  • And so on

The cloud computing provider may be owned, managed, and operated by a business, academic, or government organization, or a combination of the three.

Private cloud

In this model, the cloud computing infrastructure is provisioned for exclusive use by a single organization, as illustrated in the following image:

The cloud computing provider may be:

  • Owned, managed, and operated by the organization, a third party, or a combination of the two
  • It may exist on or off premises

Community cloud

In this model...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Information Security Handbook
Published in: Dec 2017Publisher: ISBN-13: 9781788478830

Author (1)

author image
Darren Death

Darren Death is ASRC Federal's Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security. He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Read more about Darren Death