From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Multitenant computing
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Multitenant computing
- [Instructor] The public cloud is built upon the operating principle of multitenancy. This simply means that many different customers share use of the same computing resources. The physical servers that support my workloads might be the same as the physical servers supporting your workloads. In an ideal world, an individual customer should never see the impact of multitenancy. Servers should appear completely independent of each other and enforce the principle of isolation. From a security perspective, one customer should never be able to see data belonging to another customer. From a performance perspective, the actions that one customer takes should never impact the actions of another customer. Preserving isolation is one of the core security tasks of a cloud service provider. Multitenancy allows cloud providers to oversubscribe their resources. Almost all computing workloads vary in their needs over time. One…
Contents
-
-
-
-
What is the cloud?3m 53s
-
Cloud computing roles2m 35s
-
(Locked)
Drivers for cloud computing3m 17s
-
(Locked)
Multitenant computing2m 15s
-
(Locked)
Virtualization4m 48s
-
(Locked)
Desktop and application virtualization2m 38s
-
(Locked)
Cloud compute resources7m 52s
-
(Locked)
Containerization1m 58s
-
(Locked)
Cloud activities and the Cloud Reference Architecture2m 49s
-
(Locked)
Cloud deployment models2m 45s
-
(Locked)
Cloud service categories5m 21s
-
(Locked)
Edge and fog computing1m 46s
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-