The Trusted Cloud: Addressing Security and Compliance
In Chapter 1 we reviewed the essential cloud concepts and took a first look at cloud security. We noted that the traditional notion of perimeter or endpoint protection left much to be desired in the traditional architecture with enterprise-owned assets. Such a notion is even less adequate today when we add the challenges that application developers, service providers, application architects, data center operators, and users face in the emerging cloud environment.
In this chapter we’ll bring the level of discourse one notch tighter and focus on defining the issues that drive cloud ...