64b6c9261e
Current folder name New folder name Book title ---------------------------------------------------------- basic-install DELETE cli-guide DELETE common common NEW admin-guide-cloud Cloud Administrators Guide docbkx-example DELETE openstack-block-storage-admin DELETE openstack-compute-admin DELETE openstack-config config-reference OpenStack Configuration Reference openstack-ha high-availability-guide OpenStack High Availabilty Guide openstack-image image-guide OpenStack Virtual Machine Image Guide openstack-install install-guide OpenStack Installation Guide openstack-network-connectivity-admin admin-guide-network OpenStack Networking Administration Guide openstack-object-storage-admin DELETE openstack-security security-guide OpenStack Security Guide openstack-training training-guide OpenStack Training Guide openstack-user user-guide OpenStack End User Guide openstack-user-admin user-guide-admin OpenStack Admin User Guide glossary NEW OpenStack Glossary bug: #1220407 Change-Id: Id5ffc774b966ba7b9a591743a877aa10ab3094c7 author: diane fleming
34 lines
2.7 KiB
XML
34 lines
2.7 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<chapter xmlns:xi="http://www.w3.org/2001/XInclude" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://docbook.org/ns/docbook" xmlns:db="http://docbook.org/ns/docbook" version="5.0" xml:id="ch049_case-studies-tenant-data"><?dbhtml stop-chunking?>
|
|
<title>Case Studies</title>
|
|
<para>Returning to Alice and Bob, we will use this section to dive into their particular tenant data privacy requirements. Specifically, we will look into how Alice and Bob both handle tenant data, data destruction, and data encryption.</para>
|
|
<section xml:id="ch049_case-studies-tenant-data-idp44416">
|
|
<title>Alice's Private Cloud</title>
|
|
<para>As stated during the introduction to Alice's case study,
|
|
data protection is of an extremely high priority. She
|
|
needs to ensure that a compromise of one tenant's data
|
|
does not cause loss of other tenant data. She also has
|
|
strong regulator requirements that require documentation
|
|
of data destruction activities. Alice does this using the
|
|
following:</para>
|
|
<itemizedlist>
|
|
<listitem><para>Establishing procedures to sanitize tenant data when a program or project ends</para> </listitem>
|
|
<listitem><para>Track the destruction of both the tenant data and metadata via ticketing in a CMDB</para> </listitem>
|
|
<listitem><para>For Volume storage:</para> </listitem>
|
|
<listitem><para>Physical Server Issues</para> </listitem>
|
|
<listitem><para>To provide secure ephemeral instance storage, Alice implements qcow2 files on an encrypted filesystem.</para> </listitem>
|
|
</itemizedlist>
|
|
</section>
|
|
<section xml:id="ch049_case-studies-tenant-data-idp51856">
|
|
<title>Bob's Public Cloud</title>
|
|
<para>As stated during the introduction to Bob's case study, tenant privacy is of an extremely high priority. In addition to the requirements and actions Bob will take to isolate tenants from one another at the infrastructure layer, Bob also needs to provide assurances for tenant data privacy. Bob does this using the following:</para>
|
|
<itemizedlist>
|
|
<listitem><para>Establishing procedures to sanitize customer data when a customer churns</para> </listitem>
|
|
<listitem><para>Track the destruction of both the customer data and metadata via ticketing in a CMDB</para> </listitem>
|
|
<listitem><para>For Volume storage:</para> </listitem>
|
|
<listitem><para>Physical Server Issues</para> </listitem>
|
|
<listitem><para>To provide secure ephemeral instance storage, Bob implements qcow2 files on an encrypted filesystems.</para> </listitem>
|
|
</itemizedlist>
|
|
</section>
|
|
</chapter>
|