Cloud Computing Patterns | Design Patterns | Geotagging

Cloud Computing Patterns, Mechanisms > Cloud Service and Storage Security Patterns > Geotagging
Home > Design Patterns > Geotagging

Geotagging (Cope, Erl)

How can the geographic location of cloud-based data and workloads be automatically communicated?



Control of data, workload locality and data sovereignty are requirements for federal and industrial compliance and regulatory issues. Without knowledge of where a cloud consumer’s workload is executed, it may not be possible to meet industrial compliance and regulatory requirements for data sovereignty.


When trusted resource pools are generated, the geolocation is supplied as part of the compliance and regulatory assurance attributes.


Assets are geotagged using TPMs and are added to trusted resource pools that contain the same security assurance levels and geolocation regions.

Geotagging: The geolocation is configured in the TPM.

The geolocation is configured in the TPM. Cloud Certified Professional (CCP) Module 7: Fundamental Cloud Security Cloud Certified Professional (CCP) Module 8: Advanced Cloud Security

This mechanism is covered in CCP Module 7: Fundamental Cloud Security and
in Module 8: Advanced Cloud Security.

For more information regarding the Cloud Certified Professional (CCP) curriculum, visit

Cloud Computing Design Patterns

The architectural model upon which this design pattern is based is further covered in:

Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin Naserpour

(ISBN: 9780133858563, Hardcover, ~ 528 pages)

For more information about this book, visit