openstack-manuals/doc/security-guide/ch049_case-studies-tenant-data.xml
Diane Fleming 64b6c9261e Folder rename, file rename, flattening of directories
Current folder name	New folder name	        Book title
----------------------------------------------------------
basic-install 	        DELETE
cli-guide	        DELETE
common	                common
NEW	                admin-guide-cloud	Cloud Administrators Guide
docbkx-example	        DELETE
openstack-block-storage-admin 	DELETE
openstack-compute-admin 	DELETE
openstack-config 	config-reference	OpenStack Configuration Reference
openstack-ha 	        high-availability-guide	OpenStack High Availabilty Guide
openstack-image	        image-guide	OpenStack Virtual Machine Image Guide
openstack-install 	install-guide	OpenStack Installation Guide
openstack-network-connectivity-admin 	admin-guide-network 	OpenStack Networking Administration Guide
openstack-object-storage-admin 	DELETE
openstack-security 	security-guide	OpenStack Security Guide
openstack-training 	training-guide	OpenStack Training Guide
openstack-user 	        user-guide	OpenStack End User Guide
openstack-user-admin 	user-guide-admin	OpenStack Admin User Guide
glossary	        NEW        	OpenStack Glossary

bug: #1220407

Change-Id: Id5ffc774b966ba7b9a591743a877aa10ab3094c7
author: diane fleming
2013-09-08 15:15:50 -07:00

34 lines
2.7 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<chapter xmlns:xi="http://www.w3.org/2001/XInclude" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://docbook.org/ns/docbook" xmlns:db="http://docbook.org/ns/docbook" version="5.0" xml:id="ch049_case-studies-tenant-data"><?dbhtml stop-chunking?>
<title>Case Studies</title>
<para>Returning to Alice and Bob, we will use this section to dive into their particular tenant data privacy requirements. Specifically, we will look into how Alice and Bob both handle tenant data, data destruction, and data encryption.</para>
<section xml:id="ch049_case-studies-tenant-data-idp44416">
<title>Alice's Private Cloud</title>
<para>As stated during the introduction to Alice's case study,
data protection is of an extremely high priority. She
needs to ensure that a compromise of one tenant's data
does not cause loss of other tenant data. She also has
strong regulator requirements that require documentation
of data destruction activities. Alice does this using the
following:</para>
<itemizedlist>
<listitem><para>Establishing procedures to sanitize tenant data when a program or project ends</para> </listitem>
<listitem><para>Track the destruction of both the tenant data and metadata via ticketing in a CMDB</para> </listitem>
<listitem><para>For Volume storage:</para> </listitem>
<listitem><para>Physical Server Issues</para> </listitem>
<listitem><para>To provide secure ephemeral instance storage, Alice implements qcow2 files on an encrypted filesystem.</para> </listitem>
</itemizedlist>
</section>
<section xml:id="ch049_case-studies-tenant-data-idp51856">
<title>Bob's Public Cloud</title>
<para>As stated during the introduction to Bob's case study, tenant privacy is of an extremely high priority. In addition to the requirements and actions Bob will take to isolate tenants from one another at the infrastructure layer, Bob also needs to provide assurances for tenant data privacy. Bob does this using the following:</para>
<itemizedlist>
<listitem><para>Establishing procedures to sanitize customer data when a customer churns</para> </listitem>
<listitem><para>Track the destruction of both the customer data and metadata via ticketing in a CMDB</para> </listitem>
<listitem><para>For Volume storage:</para> </listitem>
<listitem><para>Physical Server Issues</para> </listitem>
<listitem><para>To provide secure ephemeral instance storage, Bob implements qcow2 files on an encrypted filesystems.</para> </listitem>
</itemizedlist>
</section>
</chapter>