Cloud Security Guidelines for IBM Power Systems

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Security Guidelines for IBM Power Systems Front cover Cloud Security Guidelines for IBM Power Systems Turgut Aslan Peter G. Croes Liviu Rosca Max Stern Redbooks International Technical Support Organization Cloud Security Guidelines for IBM Power Systems February 2016 SG24-8242-01 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Second Edition (February 2016) This edition applies to IBM PowerVC 1.3.0 (5765-VCS), IBM PowerVM 2.2.4 (5765-PVS Standard Edition, 5765-PVE Enterprise Edition, 5765-PVL Linux Edition), IBM PowerKVM 3.1 (5765-KVM), IBM Cloud Manager with OpenStack 4.3 (5765-OSP), and the IBM Hardware Management Console 8.3.2 (7042-CR8). © Copyright International Business Machines Corporation 2015, 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x IBM Redbooks promotions . xi Preface . xiii Authors. xiii Now you can become a published author, too! . .xv Comments welcome. .xv Stay connected to IBM Redbooks . xvi Part 1. Business context and architecture considerations. 1 Chapter 1. Business context . 3 1.1 Overview . 4 1.1.1 Cloud deployment models . 4 1.1.2 Cloud service models . 5 1.2 Business drivers for cloud computing . 6 1.3 IBM Power Systems and the cloud . 7 1.3.1 Hypervisors . 7 1.3.2 Platform management. 8 1.3.3 Advanced virtualization management . 8 1.3.4 Cloud management. 9 1.4 Conclusion . 11 Chapter 2. Cloud security reference architecture . 13 2.1 IBM Cloud Computing Reference Architecture . 14 2.1.1 Adoption patterns . 15 2.1.2 Cloud Enabled Data Centers (or IaaS) . 16 2.2 Security and the CCRA . 18 2.2.1 Business drivers for a secure reference architecture . 19 2.2.2 Security requirements . 22 2.3 Cloud computing and regulatory compliance . 24 2.3.1 Government regulations and agencies . 24 2.3.2 Standards organizations . 26 2.3.3 Industry bodies . 27 2.3.4 Summary. 28 2.4 Security guidance . 28 2.4.1 Manage identities and access. 29 2.4.2 Secure virtual machines . 29 2.4.3 Patch default images . 30 2.4.4 Manage logs and audit data . 30 2.4.5 Network isolation. 31 2.5 Usage scenarios . 31 2.5.1 Generic use case with cloud-enabled data center . 31 2.5.2 Typical PowerKVM use case . 32 2.5.3 Typical PowerVM use case. 33 2.6 Integration with IBM software . 33 2.6.1 Security Information and Event Management (SIEM). 33 © Copyright IBM Corp. 2015, 2016. All rights reserved. iii 2.6.2 Identity and access management . 34 2.6.3 Endpoint management . 35 2.6.4 Threat and intrusion prevention . 35 2.7 Conclusion . 36 Part 2. Power cloud components . 37 Chapter 3. IBM Hardware Management Console (HMC) security . 39 3.1 Introduction to the HMC . 40 3.2 User interfaces . 40 3.3 Network interfaces . 41 3.4 User and role management. 43 3.4.1 Users. 43 3.4.2 Roles. 44 3.4.3 Practical scenario of using users and customized roles . 45 3.5 Monitoring and auditing HMC access . 50 3.5.1 Access monitoring. 51 3.5.2 Access auditing. 51 3.6 Security enhancements and compliance . 52 3.6.1 Security compliance . 52 3.6.2 HMC security enhancements . 52 3.6.3 Data replication . 55 3.6.4 Customizing HMC encryption . 55 3.7 HMC and security zones . 56 3.7.1 Virtual switches . 57 3.7.2 Enforcement of ACLs on virtual switches . 59 3.7.3 ACL support for LPM . 59 3.8 Conclusion . ..
Recommended publications
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • Beyond Agility: How Cloud Is Driving Enterprise Innovation
    Beyond agility How cloud is driving enterprise innovation IBM Institute for Business Value Executive Report Cloud How IBM can help IBM Cloud enables seamless integration into public and private cloud environments. The infrastructure is secure, scalable and flexible, providing tailored enterprise solutions that have made IBM Cloud the hybrid cloud market leader. For more information, please visit ibm.com/cloud-computing. 1 The cloud revolution Executive summary has advanced Five years ago, enterprises were implementing cloud What if your organization could sharpen its competitive edge by becoming more nimble? primarily to streamline IT infrastructure and cut costs. What if your enterprise could shift industry economics in its favor? What if your company Today, organizations are unleashing the power of could foresee a new customer need and dominate the market? cloud as business optimizers, innovators and The cloud revolution is here now, delivering true business value to organizations. In disruptors. Where companies choose to direct their enterprises around the world, cloud adoption has moved beyond the stage of acquiring cloud initiatives depends on a variety of factors. technological agility and is now powering business innovation. These factors include their goals and strategies, how much risk they are willing to assume, their current In our 2012 cloud study, only a third of the senior executives we spoke with when developing competitive context and their customer needs. In this our report, “The power of cloud,” said they were planning,
    [Show full text]
  • NFV Decouples the Network Functions Such As NAT, Firewall, DPI, IPS/IDS, WAAS, SBC, RR Etc
    Virtualizing Enterprise Network Functions • BRKCRS-3447 Matt Falkner, Distinguished Engineer, Technical Marketing Agenda BRKCRS-3447 • Introduction & Motivation • Deployment Models and Characteristics • The Building Blocks of Virtualization (today) • Virtualization Trade-offs and Research Topics • Conclusion Abstract Network Function Virtualization (NfV) is gaining increasing traction in the industry based on the promise of reducing both CAPEX and OPEX using COTS hardware. This session introduces the use-cases for virtualizing Enterprise network architectures, such as virtualizing branch routers, LISP nodes, IWAN deployments, or enabling enterprise hybrid cloud deployments. The sessions also discusses the technology of Virtualization from both a system architecture as well as a network architecture perspective. Particular focus is given on understanding the impact of running routing functions on top of hypervisors, as well as the placement and chaining of network functions. Performance of virtualized functions is also discussed. BRKCRS-3447 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Introduction and Motivation Network Functions Virtualization (NFV) Announced at SDN World Congress, Oct 2012 • AT&T • BT • CenturyLink • China Mobile • Colt • Deutsche Telekom • KDDI • NTT • Orange • Telecom Italia • Telstra • Verizon • Others TBA… BRKCRS-3447 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 What is NfV? A Definition … NFV decouples the network functions such as NAT, Firewall, DPI, IPS/IDS,
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • WP-MIRROR 0.7.4 Reference Manual
    WP-MIRROR 0.7.4 Reference Manual Dr. Kent L. Miller November 22, 2014 DRAFT 1 DRAFT 2 To Tylery DRAFT i WP-MIRROR 0.7.4 Reference Manual Legal Notices Copyright (C) 2012–2014 Dr. Kent L. Miller. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. THIS PUBLICATION AND THE INFORMATION HEREIN ARE FURNISHED AS IS, ARE FURNISHED FOR INFORMATIONAL USE ONLY, ARE SUBJECT TO CHANGE WITH- OUT NOTICE, AND SHOULD NOT BE CONSTRUED AS A COMMITMENT BY THE AU- THOR. THE AUTHOR ASSUMES NO RESPONSIBILITY OR LIABILITY FOR ANY ER- RORS OR INACCURACIES THAT MAY APPEAR IN THE INFORMATIONAL CONTENT CONTAINED IN THIS MANUAL, MAKES NO WARRANTY OF ANY KIND (EXPRESS, IMPLIED, OR STATUTORY) WITH RESPECT TO THIS PUBLICATION,AND EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR PAR- TICULAR PURPOSES, AND NONINFRINGEMENT OF THIRD-PARTY RIGHTS. The WP-MIRROR logotype (see margin) was released by the author into the public domain on 2014-Apr-10. See https://www.mediawiki.org/wiki/File:Wp-mirror.png. This logotype fea- tures a sunflower that is derived from 119px-Mediawiki logo sunflower Tournesol 5x rev2.png, which is also in the public domain. See https://en.wikipedia.org/wiki/File:Mediawiki_logo_sunflower_Tournesol_5x.png.
    [Show full text]
  • Understanding the Cloud Computing Landscape
    Chapter 1 Understanding the Cloud Computing Landscape Lamia Youseff, Dilma M. Da Silva, Maria Butrico, and Jonathan Appavoo Contents 1.1 Introduction .................................................................................................2 1.2 Cloud Systems Classifications ......................................................................2 1.3 SPI Cloud Classification ...............................................................................2 1.3.1 Cloud Software Systems ...................................................................3 1.3.2 Cloud Platform Systems ....................................................................3 1.3.3 Cloud Infrastructure Systems ...........................................................4 1.4 UCSB-IBM Cloud Ontology .......................................................................4 1.4.1 Applications (SaaS) ...........................................................................5 1.4.2 Cloud Software Environment (PaaS) ................................................7 1.4.3 Cloud Software Infrastructure ..........................................................8 1.4.4 Software Kernel Layer .......................................................................9 1.4.5 Cloud Hardware/Firmware ...............................................................9 1.5 Jackson’s Expansion on the UCSB-IBM Ontology .....................................10 1.6 Hoff’s Cloud Model ...................................................................................11 1.7 Discussion ..................................................................................................13
    [Show full text]
  • IBM Storage Suite for IBM Cloud Paks Data Sheet
    IBM Storage Suite for IBM Cloud Paks Data Sheet IBM Storage Suite for IBM Cloud Paks IBM Storage Suite for Cloud Paks offers Highlights a faster, more reliable way to modernize and move to the cloud • Flexible sofware-defined data resources for easy Today, 85% of enterprises around the world are already container deployments operating in a hybrid cloud environment.1 At the same time, • Reduce risk and complexity more than three-quarters of all business-critical workloads when moving mission- have yet to make the transition to the cloud.2 These metrics critical apps to the cloud suggest that for all the benefits conveyed by cloud • Market-leading Red Hat and computing, many organizations still face plenty of challenges award-winning IBM ahead to fully incorporate cloud-native solutions into their Spectrum Storage software core business environments. Containerization is a key enabling technology for flexibly delivering workloads to private and public clouds and DevOps. Among their many benefits, containers allow legacy applications to run in almost any host environment without being rewritten – an enormous advantage for enterprises with numerous applications, each composed of thousands of lines of code. To facilitate deployment of containerized workloads and development of new cloud-native applications, companies large and small are modernizing around platforms such as Red Hat OpenShift. IBM has developed a series of middleware tools called IBM Cloud Pak solutions designed to enhance and extend the functionality and capabilities of Red Hat OpenShift. The solutions include Cloud Pak for Data, Business Automation, Watson AIOps, Integration, Network Application, and Security, and give enterprises the fully modular and easy-to- consume capabilities they need to bring the next 80% of their workloads into modern, cloud-based environments.
    [Show full text]
  • HPC Management and Engineering in the Hybrid Cloud
    Universidade de Aveiro Departamento de Eletrónica, 2015 Telecomunicações e Informática André Frederico Gestão e engenharia de CAP na Nuvem Híbrida Guilhoto Monteiro HPC Management and Engineering in the Hybrid Cloud Universidade de Aveiro Departamento de Eletrónica, 2015 Telecomunicações e Informática André Frederico Gestão e engenharia de CAP na Nuvem Híbrida Guilhoto Monteiro HPC Management and Engineering in the Hybrid Cloud Tese apresentada às Universidades do Minho, Aveiro e Porto para cumprimento dos requisitos necessários à obtenção do grau de Doutor em Informática no âmbito do doutoramento conjunto MAP-i, realizada sob a orientação científica do Doutor Cláudio Jorge Vieira Teixeira, equiparado a Investigador Auxiliar, e do Doutor Joaquim Manuel Henriques de Sousa Pinto, Professor Auxiliar ambos do Departamento de Eletrónica, Telecomunicações e Informática da Universidade de Aveiro. Ao meu pai, o verdadeiro “engenheiro” que me inspirou na procura das coisas inovadoras, à minha mãe pela seu acompanhamento e exigência na educação e à mulher da minha vida pelo encorajamento, trabalho suplementar e paciência extra. o júri / the jury presidente / president Prof. Doutor Domingos Moreira Cardoso Professor Catedrático da Universidade de Aveiro vogais / examiners committee Prof. Doutor Fernando Manuel Augusto Silva Professor Catedrático da Faculdade de Ciências da Universidade do Porto Prof. Doutor Alfredo Moreira Caseiro Rocha Professor Associado com Agregação da Universidade de Aveiro Prof. Doutor Ignacio Blanquer Professor Associado da Universidade Politécnica de Valência Prof. Doutor José Miguel Oliveira Monteiro Sales Dias Professor Associado Convidado do Instituto Universitário de Lisboa Prof. Doutor Filipe João Boavida Mendonça Machado Araújo Professor Auxiliar da Faculdade de Ciências e Tecnologia da Universidade de Coimbra Prof.
    [Show full text]
  • Cloud Computing Infrastructure on IBM Power Systems Getting Started with ISDM
    Front cover Cloud Computing Infrastructure on IBM Power Systems Getting started with ISDM Detailed cloud resource configuration instructions Detailed installation steps of ISDM Point and click deployment of AIX Thierry Huché Behzad Koohi Thanh V. Lam Paul Reynolds Sean M. Swehla Jez Wain ibm.com/redbooks International Technical Support Organization Cloud Computing Infrastructure on IBM Power Systems: Getting Started with ISDM May 2012 SG24-7983-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. First Edition (May 2012) This edition applies to Version 7.2.2, of IBM Service Delivery Manager (CRFK7ML). © Copyright International Business Machines Corporation 2012. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . xiii Notices . xv Trademarks . xvi Preface . xvii The team who wrote this book . xviii Now you can become a published author, too! . xix Comments welcome. xix Stay connected to IBM Redbooks . xx Chapter 1. Introduction . 1 1.1 Target audience . 2 1.2 IBM Service Delivery Manager and cloud computing . 2 1.3 IBM Service Delivery Manager components . 4 1.4 TivSAM virtual appliance. 5 1.5 IBM Tivoli Monitoring (ITM) appliance. 8 1.6 IBM Tivoli Usage and Accounting Manager (TUAM) appliance . 9 1.7 NFS appliance. 10 1.8 Connecting the appliances . 13 Chapter 2. IBM Service Delivery Manager prerequisites . 15 2.1 Hardware prerequisites . 16 2.1.1 Computer nodes . 16 2.1.2 Management node . 16 2.1.3 Our configuration.
    [Show full text]
  • Custom Equipment Monitoring with Openwrt and Carambola
    Custom Equipment Monitoring with OpenWRT and Carambola Sysadmin Miniconf Linux.conf.au Perth - 6 January 2014 Andrew McDonnell - Software Engineer & Tech Problem Solver [email protected] Twitter: @pastcompute http://blog.oldcomputerjunk.net https://launchpad.net/~andymc73 https://github.com/andymc73 Overview ● Equipment Monitoring with a Budget ● Introduction to Carambola ● Introduction to OpenWRT ● Monitoring with OpenWRT and Carambola Andrew McDonnell – LCA2014 Sysadmin Miniconf - Custom equipment monitoring with OpenWRT and Carambola – [email protected] 2 Use Case ● Everything has a computer in it these days ● And a connection: http://en.wikipedia.org/wiki/File:SolarpanelBp.JPG http://en.wikipedia.org/wiki/File:2008-07-11_Air_conditioners_at_UNC-CH.jpg http://en.wikipedia.org/wiki/File:Davis_VantagePro.jpg Andrew McDonnell – LCA2014 Sysadmin Miniconf - Custom equipment monitoring with OpenWRT and Carambola – [email protected] 3 Use Case Requirements ● So if you have a <insert widget here>? ● And a small physical space requirement? ● How do you have it talk to <insert toolkit here>? i2c rs485 http://openclipart.org/detail/182810/old-computer-by-jhnri4-182810 http://openclipart.org/detail/188441/sid-chip-by-arvin61r58-188441 Andrew McDonnell – LCA2014 Sysadmin Miniconf - Custom equipment monitoring with OpenWRT and Carambola – [email protected] 4 Potential Solutions ● Industrial COTS ● Embedded microcontrollers ● arduino ● Embedded Linux ● Raspberry Pi ● Beaglebone Black ● Carambola2 http://www.openelectrical.org/wiki/images/4/43/Programmable-logic-controller-plc-22971.jpg
    [Show full text]
  • Security Concerns with Cloud Computing
    IBM Power Systems Security Considerations for Cloud Deployment Jeff Uehling, IBM i Network & Security Development [email protected] IBM - Rochester, MN © 2010 IBM Corporation IBM Power Systems What is Cloud Computing? Is Cloud Computing really a new concept? © 2010 IBM Corporation IBM Power Systems What is Cloud Computing? … An IT consumption and delivery model Cloud computing is a consumption and delivery model inspired by consumer Internet service and is optimized for IT / Business Services Cloud enables : – User self-service – Outsourcing options – Dynamic scalability Multiple types of clouds will coexist: – Private – Deployed Inside a customer’s firewall – Public – Provided and managed by a 3 rd party via subscription An effective cloud deployment is built on a – Hybrid – a mix of Public and Private dynamic Infrastructure and should be part of models based on Workload an overall Data Center transformation plan © 2010 IBM Corporation IBM Power Systems Clouds enable a broad spectrum of deployment options © 2010© 2010IBM CorporationIBM Corporation IBM Power Systems Cloud Differentiators… There are Many! Time to Deploy a Server Weeks or Months Seconds to Minutes Commitment to use Service Negotiate & Commit Year-long Contract Select from Catalog & Pay As You Go Necessary Upfront Investment $ $K-$M in Infrastructure → $$ per IT hour No or Low Upfront → ¢ per IT hour © 2010 IBM Corporation IBM Power Systems IT Benefits from Cloud Computing are Real… Results from IBM cloud computing engagements Increasing Test provisioning Weeks Minutes speed and flexibility Change management Months Days/hours Release management Weeks Minutes Service access Administered Self-service Standardization Complex Reuse/share Metering/billing Fixed cost Variable cost Reducing Server/storage utilization 10–20% 70–90% costs Payback period Years Months Source: Based on IBM and client experience.
    [Show full text]