ABSTRACT

Orchestration is a fundamental principle to deploying private clouds. Orchestration, like cloud computing, is a word that means different things to different people. Orchestration creates some unique advantages as well as challenges for information security practitioners. From a security perspective, the orchestration blueprint is a composite of a series of components that have to work well together in a secure fashion. Orchestration begins with the user requesting an information technology (IT) service from the portal and ends with coordination through the various IT layers to provision the requested service for the requestor. The orchestration engine centrally manages the end-to-end delivery of resources through application programming interfaces that interact with all necessary components to provide the IT service requested on the self-service portal. The orchestration management console is where the various automation workflows are created, managed, and operationalized. A multipronged approach to monitoring must be implemented to ensure the integrity of orchestration activities.