Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.
A
abuse and nefarious use of cloud services threat, 49, 172
accelerators, XML, 177
access
allocating from management plane, 129
analyzing in risk assessment, 130
BYOD (bring-your-own-device), 21
cloud computing and broad network, 20
cloud reliance on APIs for, 158
data ownership and, 241
designing contract for system, 292
to encryption keys, 87
GAPP principle for, 280
granting through authorization, 138–139
IaaS benefits, 26
locating cloud data center based on physical, 194
PaaS benefits, 27
PaaS user, 52–53
threats to ...
Get CCSP Certified Cloud Security Professional All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.