Menu

1.6 Given a set of requirements, implement secure cloud and virtualization solutions.

Virtualization strategies

 Type 1 vs. Type 2 hypervisors

 Containers

 Emulation

 Application virtualization

 VDI

Provisioning and deprovisioning

Middleware

Metadata and tags

Deployment models and considerations

 Business directives

  Cost
  Scalability
  Resources
  Location
  Data protection

 Cloud deployment models

  Private
  Public
  Hybrid
  Community

Hosting models

 Multitenant

 Single-tenant

Service models

 Software as a service (SaaS)

 Platform as a service (PaaS)

 Infrastructure as a service (IaaS)

Cloud provider limitations

 Internet Protocol (IP) address scheme

 VPC peering

Extending appropriate on-premises controls

Storage models

 Object storage/file-based storage

 Database storage

 Block storage

 Blob storage

 Key-value pairs