Index

A

ABAC. See attribute based access control (ABAC)

access control, 513

ADC. See application delivery controller (ADC)

ADP. See automatically defined perimeter (ADP) controller

AGS. See authentication gateway service (AGS)

application delivery controller (ADC), 403

defined, 512

application layer attacks, 417

attestation service, 190, 192, 358, 451

defined, 512

attribute authority, 368

defined, 513

attribute based access control (ABAC), 368

defined, 513

attribute store. See attribute authority

audit monitor, 21, 24, 69, 79, 103, 110, 126, 144, 287, 294, 318

defined, 513

authentication gateway service (AGS), 363, 366-368, 435

defined, 513

Automated Administration design pattern, 38, 284, 302, 475, 477, 479, 481, 483, 493, 499

profile, 310-314

automated scaling listener, 22, 28, 31, 40, 43, 55, 69, 79, 85, 213, 287, 314

defined, 514

automatically defined perimeter (ADP) controller, 429

defined, 514

Automatically Defined Perimeter design pattern, 510

profile, 425-429

B

bandwidth, 43

Bare-Metal Provisioning design pattern, 475, 477, 483

profile, 305-309

bare metal virtualization, 344

basic input/output system (BIOS), 337

BGP (Border Gateway Protocol), 421

billing management system, 291, 318

defined, 514

BIOS (basic input/output system), 337

BIOS/firmware rootkits, 337

bootkits, 338

Border Gateway Protocol (BGP), 421

botnets, 417

Broad Access design pattern, 16, 318, 475, 477, 479, 481, 483

profile, 93-95

Burst In compound pattern, 473, 492

profile, 499-500

Burst Out to Private Cloud compound pattern, 473, 496-497, 501

profile, 493-495

Burst Out to Public Cloud compound pattern, 473, 492, 501

profile, 496-498

C

CA. See certificate authority (CA)

capacity watchdog system, 52-55

capitalization in design pattern notation, 13

CCG. See cloud consumer gateway (CCG)

CCP (Cloud Certified Professional), 6

Centralized Remote Administration design pattern, 284, 293, 321, 475, 477, 479, 481, 483

profile, 315-319

certificate, 358, 435, 443

defined, 514

certificate authority (CA), 435, 443

defined, 515

certificate revocation list (CRL), 435, 443

defined, 515

certificate trust store, 430, 435-436, 443

defined, 515

certificate validation service (CVS), 443

defined, 515

CKMS. See cryptographic key management system (CKMS)

Cloud Authentication compound pattern, 473

profile, 505

Cloud Authentication Gateway design pattern, 502, 505, 509

profile, 430-435

Cloud Balancing compound pattern, 473

profile, 503-504

cloud-based security groups, 354, 358, 364, 368, 409, 415

defined, 517

Cloud Bursting compound pattern, 473

profile, 492

Cloud Computing: Concepts, Technology & Architecture (Erl), 2-5, 14

cloud consumer gateway (CCG), 408

defined, 516

Cloud Data Breach Protection design pattern, profile, 382-385

Cloud Denial-of-Service Protection design pattern, profile, 416-420

Cloud Key Management design pattern, 406, 509

profile, 444-447

Cloud Resource Access Control design pattern, 502, 509

profile, 364-368

cloud service types, 453

cloud storage data aging management, 186

Cloud Storage Data at Rest Encryption design pattern, profile, 181-183

Cloud Storage Data Lifecycle Management design pattern, profile, 184-186

Cloud Storage Data Management design pattern, profile, 187-189

cloud storage data placement auditor, 192

defined, 516

Cloud Storage Data Placement Compliance Check design pattern, profile, 190-193

cloud storage device, 21, 24, 31, 49, 55, 63, 69, 73, 79, 85, 103, 110, 117, 122, 131, 142, 145, 154, 164, 171, 176, 183, 186, 189, 192, 197, 209, 213, 217, 226, 250, 282, 299, 308, 314, 394

defined, 516

Cloud Storage Device Masking design pattern, profile, 194-197

Cloud Storage Device Path Masking design pattern, profile, 198

Cloud Storage Device Performance Enforcement design pattern, profile, 201-203

cloud storage device performance monitor, 201-203

defined, 516

cloud storage device pools, 101

cloud storage management portal, 189, 217, 220

defined, 517

Cloud Traffic Hijacking Protection design pattern, profile, 421-424

cloud usage monitor, 21, 24, 31, 36, 40, 43, 48-49, 55, 60, 63, 69, 80, 85, 104, 111, 126, 145, 164, 171, 176, 287, 291, 294, 314, 318

defined, 517

Cloud VM Platform Encryption design pattern, 509

profile, 350-353

cloud workload scheduler, 357-358

defined, 517

coexistent application

of compound patterns, 473

defined, 13

Collaborative Monitoring and Logging design pattern, 509

profile, 452-459

community clouds, 453

compound patterns

Burst In, 473, 492

profile, 499-500

Burst Out to Private Cloud, 473, 492, 496-497, 501

profile, 493-495

Burst Out to Public Cloud, 473, 492, 501

profile, 496-498

Cloud Authentication, 473

profile, 505

Cloud Balancing, 473

profile, 503-504

Cloud Bursting, 473

profile, 492

coexistent application of, 473

composite patterns versus, 472

defined, 12-13

design patterns as members, 472

Elastic Environment, 473-477

profile, 484-485

Infrastructure-as-a-Service, 20, 473

profile, 482-483

Isolated Trust Boundary, 477, 481, 486-487

profile, 508-510

joint application of, 472

Multitenant Environment, 473-483, 494-496

profile, 486-489

Platform-as-a-Service, 473, 486

profile, 480-481

Private Cloud, 473, 476, 482-486, 490

profile, 474-475

Public Cloud, 20, 473-474, 482-486, 490

profile, 476-477

Resilient Environment, 473-477

profile, 490-491

Resource Workload Management, 473

profile, 506

Secure Burst Out to Private Cloud/Public Cloud, 473

profile, 501-502

Software-as-a-Service, 20, 473, 486

profile, 478-479

CPU pools, 101

CRL. See certificate revocation list (CRL)

Cross-Hypervisor Workload Mobility design pattern, profile, 247-251

Cross-Storage Device Vertical Tiering design pattern, 485, 494, 499

profile, 74-80

cryptographic key management system (CKMS), 183, 197, 353, 386, 390, 394, 424, 447

defined, 517

custom reporter (Usage Monitoring design pattern), 287

custom scripts (Rapid Provisioning design pattern), 296

CVS. See certificate validation service (CVS)

D

data normalization, 71-73

data source loader, 290

data transport mechanism, 186

denial-of-service (DoS) attacks, 416-420

deployment agent, 306

deployment component, 306

deployment data store, 296

design patterns. See also compound patterns

benefits of, 10

defined, 2

as members of compound patterns, 472

list of, 536

notation for

capitalization, 13

page number references, 13

profile format, 11-12

Web site, 6, 14

Design Patterns: Elements of Reusable Object-Oriented Software (Gamma, et al), 3

Detecting and Mitigating User-Installed VMs design pattern, profile, 369-374

digital certificates. See certificate

digital signature, 340, 349, 359, 394, 415, 451

defined, 518

DIL procedures, 443

Direct I/O Access design pattern, 43, 164, 178-179, 485

profile, 169-172

Direct LUN Access design pattern, 485

profile, 173-177

discovery agent, 306

distributed denial-of-service (DDoS) attacks, 416

distributed reflector denial-of-service (DRDoS) attacks, 416

DNS reflection attacks, 416

domain name service (DNS), 403, 420

defined, 518

driver rootkits, 338

Dynamic Data Normalization design pattern, 16, 485

profile, 71-73

Dynamic Failure Detection and Recovery design pattern, 98, 490

profile, 123-126

dynamic horizontal scaling, 28-31

dynamic relocation, 29

Dynamic Scalability design pattern, 38, 99-100, 479, 481, 483, 493

profile, 25-31

dynamic storage provisioning, 46

dynamic vertical scaling, 29

E

Elastic Disk Provisioning design pattern, 485

profile, 45-50

Elastic Environment compound pattern, 473, 475, 477

profile, 484-485

Elastic Network Capacity design pattern, 485

profile, 42-44

Elastic Resource Capacity design pattern, 485, 493, 504

profile, 37-41

EMM system. See enterprise mobility management (EMM) system

encryption, 181-183, 197, 390, 394, 424

defined, 518

endpoint threat detection and response (ETDR) system, 469

defined, 518

enterprise mobility management (EMM) system, 381

defined, 519

External Virtual Server Accessibility design pattern, 242

profile, 244-246

F

failover system, 122, 126, 136, 142, 145, 154

defined, 519

Federated Cloud Authentication design pattern, 505, 510

profile, 436-443

federation of users, 443

firewalls (Secure Connection for Scaled VMs design pattern), 409-415

fixed-disk storage allocation, 45

G

gateway. See cloud consumer gateway (CCG)

Geotagging design pattern, 502, 510

profile, 341-343

geotags, 192, 343, 359

defined, 519

H

hardened virtual server images, defined, 519

hardware-based VM discovery system, 374

defined, 520

hardware security module (HSM), 340, 447

defined, 520

honeypots, 469

defined, 520

host-based security system (HBSS), 375

defined, 521

hosted virtualization, 345

HSM. See hardware security module (HSM)

hybrid clouds, 453

hypervisor

defined, 521

purpose of, 222

Hypervisor Clustering design pattern, 98, 269, 491, 503

profile, 112-118

Hypervisor Protection design pattern, 509

profile, 344-349

I

IaaS. See Infrastructure-as-a-Service compound pattern; Infrastructure-as-a-Service environments

icons in pattern profiles, 11

identity and access management (IAM) system, 189, 363, 366-368

defined, 521

IDPS. See intrusion detection and prevention system (IDPS)

Independent Cloud Auditing design pattern, 510

profile, 460-464

Infrastructure-as-a-Service compound pattern, 20, 473

profile, 482-483

Infrastructure-as-a-Service environments, flexibility in, 222

intelligent automation engine, 43, 311-314

intelligent watchdog monitor, 125-126

interconnect pools, 101

In-Transit Cloud Data Encryption design pattern, 510

profile, 391-394

Intra-Storage Device Vertical Data Tiering design pattern, 485

profile, 81-85

intrusion detection and prevention system (IDPS), 403, 469

defined, 522

IP Storage Isolation design pattern, profile, 218-220

Isolated Trust Boundary compound pattern, 477, 481, 486-487

profile, 508-510

IT resources

dynamic scaling, 27

horizontal scaling, 22

sharing, risks and challenges, 20

J-K

joint application

of compound patterns, 472

defined, 13

kernel rootkits, 338

Key Management design pattern. See Cloud Key Management design pattern

L

live VM migration, 40, 56, 145, 165, 251, 257, 264, 271, 277, 334, 415

defined, 522

Load Balanced Virtual Server Instances design pattern, 254, 261, 269, 276, 331, 503, 506

limitations of, 253

profile, 51-56

Load Balanced Virtual Switches design pattern, 237, 245, 491, 506

profile, 57-60

load balancer, 22-24, 33-36, 56, 60, 70, 287

defined, 522

logical network perimeter, 21, 24, 43, 56, 60, 70, 104, 111, 118, 131, 136, 145, 171, 229, 308, 318,

defined, 523

LUN masking, 197, 220

defined, 523

M

malware hashes, 469

defined, 523

management loader, 306

management portal. See cloud storage management portal

measured boot, 339

mechanisms in pattern profiles, 12

Memory Over-Committing design pattern, 16

profile, 86-89

Mobile BYOD Security design pattern, profile, 376-381

multi-device broker, 94, 318

defined, 523

Multipath Resource Access design pattern, 482

profile, 127-131

multitenancy, virtualization versus, 487

Multitenant Environment compound pattern, 473-475, 477, 479, 481, 483, 494, 496

profile, 486-489

N

nested resource pools, 102

network bandwidth, 43

network forensics monitor (NFM)

defined, 524

NIC Teaming design pattern, 16

profile, 90-92

Non-Disruptive Service Relocation design pattern, 180, 260, 475, 477, 479, 481

profile, 159-165

normalization (Dynamic Data Normalization design pattern), 71-73

notification service for this book series, 7

O

Open Virtualization Format (OVF), converting virtual servers to, 248

operating system baseline (Rapid Provisioning design pattern), 296

orchestration engine, 451

defined, 524

O/S boot load bootkits, 338

OVF (Open Virtualization Format), converting virtual servers to, 248

P-Q

PaaS. See Platform-as-a-Service compound pattern; Platform-as-a-Service environments

page number references in design pattern notation, 13

parent resource pools, 101

pattern languages, defined, 11

Pattern-Oriented Software Architecture (Buschmann, et al), 3

pattern profile format, 11-12

patterns, defined, 10. See also compound patterns; design patterns

Patterns of Enterprise Application Architecture (Fowler), 3

Pay-as-You-Go design pattern, 284-285, 475, 477, 479, 481, 483

profile, 288-291

pay-per-use monitor, 31, 41, 43, 50, 63, 80, 85, 104, 165, 171, 176, 287, 291, 318

defined, 524

Permanent Data Loss Protection design pattern, profile, 387-390

Persistent Virtual Network Configuration design pattern, 144, 164, 234, 493, 504

profile, 227-230

physical RAM pools, 101

physical server pools, 100

physical uplink, 60, 92, 136, 145, 229, 234, 238, 243, 246, 251

defined, 524

PKI. See public key infrastructure (PKI)

Platform-as-a-Service compound pattern, 473, 486

profile, 480-481

Platform-as-a-Service environments, networking interfaces, 222

Platform Provisioning design pattern, 284, 481

profile, 301-304

platform trust policy, 343, 359

defined, 524

PNIC hardware devices, functionality, 179

pools. See Resource Pooling design pattern

Power Consumption Reduction design pattern, profile, 330-334

Prentice Hall Service Technology Series from Thomas Erl, 2-6

pre-signed validations, 442

Private Cloud compound pattern, 473, 476, 482, 484, 486, 490

profile, 474-475

private clouds, 453

problems in pattern profiles, 11

protocol attacks, 417

Public Cloud compound pattern, 20, 473-474, 482, 484, 486, 490

profile, 476-477

public clouds, 453

public key certificates. See certificate

public key infrastructure (PKI), 435, 443

defined, 525

R

RAID-Based Data Placement design pattern, profile, 214-217

RAID-level identifier, 217, 220

defined, 525

Rapid Provisioning design pattern, 284, 302, 475, 477, 479, 481, 483, 485, 491, 493-494, 503

profile, 295-300

ready-made environment, 304

defined, 525

Realtime Resource Availability design pattern, 284, 319, 475, 477, 479, 481, 483

profile, 292-294

Redundant Physical Connection for Virtual Servers design pattern, 245, 490, 504

profile, 132-137

Redundant Storage design pattern, 98, 485, 490, 493, 504

profile, 119-122

remote administration system, 104, 111, 319

defined, 525

requirements in pattern profiles, 11

Resilient Environment compound pattern, 473, 475, 477

profile, 490-491

resilient watchdog system, 123-125

resource borrowing, 106

resource cluster, 24, 36, 56, 118, 145

defined, 526

resource constraints, 106

Resource Management design pattern, 475, 477, 479, 481, 483

profile, 320

resource management system, 104, 111, 304, 308, 319

defined, 526

Resource Pooling design pattern, 20, 28, 38, 98, 106-107, 475, 477, 481, 483, 485-487, 494, 496, 499

profile, 99-105

resource replication, 21, 24, 31, 36, 41, 44, 50, 56, 60, 63, 104, 111, 118, 122, 131, 136, 142, 145, 154, 165, 171, 177, 193, 229, 300, 304, 309, 314

defined, 526

Resource Reservation design pattern, 20, 88, 98, 100, 477, 479, 481, 485-487, 494, 496

profile, 106-111

Resource Workload Management compound pattern, 473

profile, 506

rootkits, types of, 337

S

SaaS. See Software-as-a-Service compound pattern; Software-as-a-Service environments

sandbox, 469

defined, 526

Secure Burst Out to Private Cloud/Public Cloud compound pattern, 473

profile, 501-502

Secure Cloud Interfaces and APIs design pattern, 510

profile, 360-363

Secure Connection for Scaled VMs design pattern, 502, 510

profile, 409-415

Secure External Cloud Connection design pattern, profile, 404-408

secure firmware boot, 339

Secure On-Premise Internet Access design pattern, profile, 397-403

secure token service (STS), 368, 435

defined, 526

security information and event management (SIEM) system, 403, 459, 464, 469

defined, 526

Self-Provisioning design pattern, 297, 302, 318, 475, 477, 479, 481, 483

profile, 324-329

sequence logger, 296

sequence manager, 296

server groups, 35

server images, 296

server templates, 296

Service Load Balancing design pattern, 485, 491, 494, 503

profile, 32-36

Service State Management design pattern, 481

profile, 61-63

Shared Resources design pattern, 16, 99-100, 106, 475, 477, 479, 481, 483, 486-487

profile, 17-21

sibling resource pools, 101

SIEM. See security information and event management (SIEM) system

Single Root I/O Virtualization design pattern, profile, 178-180

single sign-on (SSO), defined, 527

SLA management system, 126, 165, 294, 309

defined, 527

SLA monitor, 126, 165, 287, 294, 319

defined, 527

SOA Design Patterns (Erl), 3

Software-as-a-Service compound pattern, 20, 473, 486

profile, 478-479

Software-as-a-Service environments, networking interfaces, 222

solutions in pattern profiles, 12

SSO (single sign-on), defined, 527

statefulness, 61-63

Stateless Hypervisor design pattern, profile, 278-282

state management database, 63, 142

defined, 527

Storage Maintenance Window design pattern, 491

profile, 147-154

storage path masking, 220

defined, 528

storage pools, 101

Storage Workload Management design pattern, 485, 504, 506

profile, 64-70

STS. See secure token service (STS)

sub-LUN migration, 213

defined, 528

Sub-LUN Tiering design pattern, profile, 210-213

symbols, legend, 5

Synchronized Operating State design pattern, 491

profile, 138-142

T

thin provisioning, 46-48

Threat Intelligence Processing design pattern, profile, 465-469

threat intelligence system, 386, 469

defined, 528

TPM (trusted platform module), 193, 339-340, 343, 349, 359, 451, 529

traffic filter, 420

defined, 528

traffic monitor, 420, 424

defined, 529

trust attestation service. See attestation service

Trust Attestation Service design pattern, 502, 510

profile, 448-451

trusted boot, 339

Trusted Cloud Resource Pools design pattern, 502, 510

profile, 354-359

Trusted Platform BIOS design pattern, 502, 510

profile, 337-340

trusted platform module (TPM), 193, 339-340, 343, 349, 359, 451, 529

trust models for CVS, 442

U

usage database, 286

Usage Monitoring design pattern, 284, 289, 475, 477, 479, 481, 483, 485, 491, 493, 499

profile, 285-287

usage monitoring station, 286

usage reporter, 287

V

vCPU. See virtual CPU (vCPU)

vDisk. See virtual disk (vDisk)

VIM. See virtual infrastructure manager (VIM)

virtual appliance

Cross-Hypervisor Workload Mobility design pattern, 251

defined, 529

virtual CPU (vCPU)

Cross-Hypervisor Workload Mobility design pattern, 21, 41, 56, 104, 111, 145, 251

defined, 529

Virtual Disk Splitting design pattern, profile, 209

virtual disk (vDisk), 145, 209, 251

defined, 530

virtual firewall, 234, 415

defined, 530

virtual infrastructure manager (VIM), 21, 41, 56, 60, 89, 92, 104, 111, 118, 136, 146, 165, 172, 177, 209, 226, 230, 234, 238, 246, 251, 257, 264, 271, 277, 282, 334, 375

defined, 530

virtual machines (VMs). See virtual server

virtual network, 146, 243, 251, 239

defined, 530

virtual private cloud (VPC), 408

defined, 531

virtual private network (VPN), 403, 408, 429, 435

defined, 531

virtual private network (VPN) cloud hub. See VPN cloud hub

virtual RAM (vRAM), 21, 41, 56, 89, 104, 111, 146

defined, 531

virtual server, 21, 24, 31, 41, 44, 51-56, 60, 63, 105, 111, 118, 131-137, 142, 146, 165, 172, 177, 230, 248, 300, 304, 314, 353, 369-374, 522

defined, 531

Virtual Server Auto Crash Recovery design pattern, profile, 155-158

Virtual Server Connectivity Isolation design pattern, profile, 231-234

Virtual Server Folder Migration design pattern, profile, 223-226

Virtual Server NAT Connectivity design pattern, profile, 240-243

virtual server pools, 100

virtual server snapshot, 251

defined, 532

virtual server state manager, 251

defined, 532

Virtual Server-to-Host Affinity design pattern, profile, 252-257

Virtual Server-to-Host Anti-Affinity design pattern, profile, 258-264

Virtual Server-to-Host Connectivity design pattern, profile, 265-266

Virtual Server-to-Virtual Server Affinity design pattern, 234

profile, 267-271

Virtual Server-to-Virtual Server Anti-Affinity design pattern, profile, 272-277

Virtual Switch Isolation design pattern, profile, 235-239

virtual switches, 56-60, 92, 118, 137, 146, 165, 230, 234, 239, 243, 246, 251, 266

defined, 532

virtualization, 19, 487

types of, 344

virtualization agent, 89, 146, 158

defined, 532

virtualization monitor, 56, 89, 118, 146, 209, 334

defined, 533

VMs (virtual machines). See virtual server

volume-based attacks, 416-417

VPC. See virtual private cloud (VPC)

VPN. See virtual private network (VPN)

VPN cloud hub, 408

defined, 533

vRAM. See virtual RAM (vRAM)

W

Web sites

www.cloudpatterns.org, 6, 14

www.cloudschool.com, 6

www.servicetechbooks.com, 2, 6-7

www.servicetechmag.com, 6

www.servicetechspecs.com, 6

www.whatiscloud.com, 6, 14

Workload Distribution design pattern, 475, 477, 479, 481-482, 485, 491, 493, 504

profile, 22-24

workloads, defined, 517

X-Y-Z

X.509 certificates. See certificate

Zero Downtime design pattern, 98, 491

profile, 143-146

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.85.178