1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ISO/IEC 19831:2015 description
describes the model and protocol for management interactions between a cloud Infrastructure as a Service (IaaS) Provider and the Consumers of an IaaS service.
ISO/IEC 19831:2015
Cloud Infrastructure Management Interface (CIMI) Model and RESTful HTTP-based Protocol
CIMI addresses what
the management of the lifecycle of infrastructure provided by a Provider.
Software suites integrating solutions for
Management
Automation
Evaluation
Provision
Orchestration
Service Level Agreements terms
Uptime percentage
Amount of traffic at a given time (bandwidth)
Data rate or bandwidth limitations
Performance and capacity of resources
Schedule requirements for notifications (planned maintenance and outages)
Help desk response times, scope, limitations
Security
Privacy
Availability
Privacy Level Agreement
Identity of the Cloud Service Provider
Ways in which the data will be processed
Data Transfer
Data Security
Monitoring and/or auditing in order to ensure that appropriate privacy and security measures
Personal data breach notification
Data portability
Data retention
Accountability
Cooperation
Legally required disclosure
Data Tiering
allows us to control where (how) data is going to be stored based on performance, cost, availability, and recovery requirements
tier o
data that is mission-critical, frequently accessed, recently accessed OR requires high degree of security
tier 1
data that is generated by major business applications (ERP/CRM), email, essential documents
tier 2
data that is still important, but not necessary for daily business operations, such as financial or transactional data or machine-generated data
tier 3
data that must be retained, such as long-term backup, old financial and historical records, compliance requirements, email historical retention for long periods of time
Virtual disks
Can reside on a single physical hard drive
Can be striped across multiple physical drives and possibly across multiple availability zones
Virtual Network Interface Card (virtual NIC)
Appears to guest OS as NIC
Unique MAC address
Can be bridged to real network through physical NIC
Can be connected to virtual network (on host machine)
availability zone
is a distinct location within a region and is insulated from failures in any other zone.