What are the out-of-the-box security mechanisms available to Windows Azure?
Source: Internet
Author: User
KeywordsAzureazure security mechanism
In this section, I will explain that Windows http://www.aliyun.com/zixun/aggregation/13357.html ">azure security is a shared responsibility, Windows Azure Provide your application with powerful security features that exceed the requirements of your internal deployment application. On the other hand, it exposes other vulnerabilities that you should consider. Finally, you should actively secure your application during application development.
This section outlines the features provided by Windows Azure. For more information, see Global basic services online security. The Global Infrastructure Services team provides trusted online services that provide you with a competitive advantage over Microsoft Windows Azure.
This series of articles is designed to provide you with more background information that enables you to write an ideal application for the public cloud.
How does Windows Azure help protect hosts?
You might say, "Don't worry, Bruce." How does Windows Azure help protect hosts? ”
The Windowsazure Security overview outlines the security features provided by Windows Azure. The article was written by Charlie Kaufman and Ramanathan Venkatapathy. It analyzes available security features from the perspective of customer and Microsoft operations, introduces people and processes that help improve Windows Azure security, and discusses compliance. I will summarize these features and recommend that you read and understand the overview for further insight.
Windows Azure is designed to abstract most of the infrastructure that typically forms the foundation of applications (servers, operating systems, networks, and database software), allowing you to focus on building applications.
On the surface, you'll see cloud-based computing and storage so you can build and manage applications and their associated configurations. Each of the ways you migrate to Windows Azure may require that you have a certain level of authorization that you control.
I'll cover some of the best practices that you should perform for the authentication mechanism in a later article.
Windows Azure must ensure the confidentiality, integrity, and availability of customer data, just like any other application hosting platform. It must also provide transparent accountability so that you and their agents can track your own and Microsoft's management of applications and infrastructure.
Windows Azure creates a virtual machine (VM) for each role instance, based on the number of role instances specified by the customer, and then runs the roles on those VMs. These VMs, in turn, run on virtual machine management programs (Windows Azure virtual machine hypervisor) that are dedicated to the cloud.
There is a VM that is special: it runs a managed structure agent (FA), a hardened operating system called the root operating system. The FA in turn is used to manage your application and storage nodes. The FA is managed by the fabric controller (FC) and is located outside of the compute and storage nodes (compute and storage clusters are managed by independent FC).
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.