Page 493 - Cloud computing: From paradigm to operation
P. 493
Cloud Computing management 2
• It is recommended that the cloud computing platform supports workload portability and related
management capabilities (e.g., control, operation and monitoring) amongst cloud service providers,
supporting various cloud deployment models [ITU-T Y.3500], in a cost effective way.
8 Cloud resource management for emergency telecommunications
Emergency telecommunications (ET) [b-ITU-T Y.2205] are any emergency related service that requires special
handling relative to other services (i.e., priority access for authorized users and priority treatment to
emergency traffic).
While not always required, if the resources of the CSP are used to support the emergency
telecommunications service (ETS) [b-ITU-T E.107], appropriate resource management functions will be
needed to allow priority treatment in the use of the cloud computing resources by authorized users. The
requirements in [b-ITU-T Y.1271] are relevant.
NOTE – Requirements in [b-ITU-T Y.1271] apply across multiple layers of the cloud computing reference architecture
[ITU-T Y.3502].
9 Security considerations
The security framework from cloud computing [ITU-T X.1601], analyses security threats and challenges in the
cloud computing environment and describes security capabilities that could mitigate these threats and
address security challenges. The single cloud and multi-cloud resource management framework described in
this Recommendation is based on the interconnections within a single cloud service provider or between two
or more cloud computing systems operated by different service providers. Thus, secure interconnection
within and across the systems should be considered. Protection of internal management system interfaces
and information against unauthorized access, internally or by an external interconnected entity, should also
be considered. Exposed internal and external management interfaces should also be security protected. It is
recommended that the applicable X, Y and M series of ITU-T security Recommendations be taken into
consideration, including access control, authentication, data confidentiality, communications security, data
integrity, availability and privacy.
485