developerWorks cloud computing has woven several topic threads throughout its knowledge base; one of these is designed to help you determine whether or not you need a policy for various aspects of cloud computing, including service security, mobile access, performance metrics, threshold, workload balancing, policy automation, and billing. For example:
Craft a cloud performance metrics policy: Often businesses and agencies use performance metrics to measure how well the system is performing; not as often do they use them to measure how well cloud services are performing. In this article, the author explains why it is best to be proactive using cloud performance metrics to fix the problems before service outages could happen and provides three proactive steps -- on monitoring performance, testing performance, and crafting a cloud performance metrics policy -- to help you avoid poor cloud performance.
Craft a cloud service security policy: For economic reasons, often businesses and government agencies move data center operations to the cloud whether they want to or not; their reasons for not liking the idea of hosting in a cloud are reliability and security. To help ease business security concerns, a cloud security policy should be in place. In this article, the author explains how to craft a cloud security policy for managing users, protecting data, and securing virtual machines.
Balance workload in a cloud environment: Many businesses and government agencies demand cloud services to provide continuous operational availability and security. To make this a reality, they will require a threshold policy on resource management for application testing and production. In this article, the author explains what a threshold policy is and how it can help to balance workload demands dynamically in a cloud environment.
Build proactive threshold policies on the cloud: Often businesses and agencies implement technical, organizational, and business policies to ensure that users comply with the terms in the policy; in other words, to inform cloud computing service consumers and providers what they should do. This is the purpose of a carefully crafted threshold policy -- too often, this level of policy does not exist. In this article, the author explains how to craft the policies with examples; follow these templates on purpose, scope, background, consumer control, actions, and constraints to learn to craft resource, user, and data request threshold policies for the cloud.
Cloud services: Mitigate risks, maintain availability: Businesses and government agencies demand cloud services to provide better security in order to ensure continuous operational availability. To make this a reality, they need to formulate a cloud service policy on risk mitigation. Learn about cloud service security and how to mitigate risks to cloud services to ensure high uptime availability and security in a cloud environment.
Model-driven cloud security: This article details the challenges to effective application security policy automation, explains the benefits model-driven security adds to security policy automation, and then demonstrates how to achieve cloud application security policy automation.
IBM SmartCloud Enterprise tip: Integrate your authentication policy using a proxy: Managing business rules for the authorization and authentication of custom-built cloud applications in the IBM SmartCloud Enterprise environment doesn't have to be a difficult task. The author uses the structure of IBM Cloud APIs to demonstrate how to build business rules into a proxy that bridges among the command line, Java, and RESTful APIs. Using a proxy also keeps users from skipping around your business rules when accessing the IBM Cloud portal.
Cloud billing service: Cloud billing is the process of generating bills from the resource usage data using a set of predefined billing policies. The author defines a cloud billing service module enabled for a service oriented architecture, covering both functional requirements -- a quote service, conversion functions and policies, payment schemes, and user identification -- and the non-functional, but essential, requirements such as security, scalability, standards, and fault tolerance.
Cloud business analytics: Write your own dashboard: Business analytics and cloud computing are hot, complex topics; the idea of combining the two could drive away those with less experience. But fear not: The author provides a simple look at the complex history of business analytics, illuminates the common points where both meet, explains the benefits that a cloud environment can bring to business analytics (and vice-versa), and gives you an example for writing your own cloud business analytics application.