US20240177115
2024-05-30
Physics
G06Q10/103
A method for implementing software-defined community clouds involves managing access to various projects based on compliance requirements. When a requestor seeks access to a project, the system evaluates whether the access request meets specific compliance standards. If the request satisfies all requirements, access is granted; if not, access is denied. This method ensures that only authorized users can access sensitive project data, maintaining compliance with regulatory standards.
Community clouds are designed for organizations with shared concerns, such as security and compliance needs. These cloud infrastructures can be owned and managed by the participating organizations or a third party, and they may be hosted on or off-site. The separation from other public cloud resources enhances security and allows for tailored compliance measures that are crucial for highly regulated entities, like government agencies.
The system employs a zero trust access control policy, requiring two-factor authentication and valid justifications for access requests. This dynamic policy adapts based on the identity of the requestor, project status, and environmental factors. Such stringent measures help ensure that only legitimate users gain access to sensitive data, thereby reinforcing security protocols within the community cloud.
Each project within the community cloud consists of multiple infrastructure primitives, which represent distinct units of computing capacity. These can include virtual machines, persistent storage disks, or storage buckets. The isolation of these projects ensures that resources are dedicated and secure, preventing unauthorized crossover between different projects within the community cloud.
The implementation of software-defined community clouds offers several advantages, including enhanced security through shared controls among community members and simplified data management based on geographical location and compliance needs. These clouds provide a clearly defined security perimeter while ensuring that all operational requirements are met efficiently and effectively.