69
and the utilization level in terms of computer performance or memory
(
RAM, storage). After choosing a package of suitable KPIs it is equally
significant to decide which measuring points to apply where. You always
need to consider the fact that, when you integrate Cloud services, various
companies will access a number of Cloud services by various providers at the
same time (all of which are, say, represented on a single website). These
Cloud services are supplied to the end user's screen by different servers
from different datacentres across a multitude of network connections.
Networks can be monitored using sensors at individual network nodes (e.g.
routers); agents can be installed on servers and on other infrastructure
devices (storage system) to provide monitoring data. Another option is an
end‐to‐end monitoring System that simulates real user behaviour at regular
intervals and thus provides objective Information about the suitability of
your applications for end users. It is essential to handle performance
monitoring within the client software protocol as it is unlikely that the Cloud
service provider will allow the Cloud service users to install a generic
management agent on the provider's own IT systems.
All of these systems deliver different data types at different intervals and
with different volumes. This data need to be collected, normalised,
compacted and then correlated to be able to make a statement on the
available performance. This can be a major challenge, and likely to become
more complex as integration of heterogeneous systems increases. A number
of companies (e.g. Compuware) offer software and services tailored for
these requirements.
3.2
Cloud Security
3.2.1
Cloud Security: The big picture
The use of IT has gone through radical change in recent years and will see
increasingly radical change in the future. More and more enterprises are
getting involved in the opportunities and risks of Cloud computing in all its
different forms. This section is intended to discuss which hot topics would
be wise to consider in the context of Cloud computing and what this will all
mean for information security in particular.
23
23
An expanded version of this chapter can be found under