AUDIENCE AND PURPOSE
For Cloud Service Providers, infrastructure hosts, and Enterprise IT administrators looking to enhance or build their public or private cloud infrastructure, the decision to use a cloud for the delivery of IT services needs to include a security strategy which protects the various layers of the deployment. This document addresses the key aspects of the usage model, Security Monitoring and Service Catalog*, defined by the Open Data Center Alliance*. This reference architecture presents a complete model of a Parallels* Trusted Compute Pool deployment on Intel® Xeon® processor 5600 series servers, and addresses how to establish a trusted platform on the physical server layer of a public or private cloud.
Since the creation and operation of a cloud requires integration and customization to existing IT infrastructure and business requirements, it is not expected that this guide can be used as-is. For example, the adaptation to existing networks and the identification of end-to-end security requirements are out of scope for this guide. Therefore, it is expected that the user of this guide will make appropriate adjustments to any deployment to meet specific customer security requirements, especially given the variations in threat levels and attack points that face users when they operate in a public or private cloud usage model.