Resource Management (Erl, Naserpour)
How can a cloud consumer safely manage an IT resource without impacting neighboring IT resources?
ProblemWhen cloud consumers access and manage deployed IT resources that coexist with other IT resources as part of a live production environment, management changes to an IT resource may inadvertently negatively impact others.
SolutionA set of tools and backend controls are provided by the cloud provider to protect the management activity of one cloud consumer from others.
ApplicationCloud consumers are given limited access levels and management options and their management activity is further confined to their respective logical network perimeters.
MechanismsAudit Monitor, Cloud Usage Monitor, Logical Network Perimeter, Remote Administration System, Resource Management System
Compound PatternsBurst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication and Access Management, Elastic Environment, Infrastructure-as-a-Service (IaaS), Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)
Cross-IT resource management tools and logic are used to check (and optionally audit and log) commands before allowing them to be executed.
NIST Reference Architecture Mapping
This pattern relates to the highlighted parts of the NIST reference architecture, as follows: