4

Design Principles for Secure Cloud Computing

In the previous chapter, you studied the common threats to cloud deployments and attack vectors and also introduced the control frameworks and control types necessary to secure data, network, and virtualization layers for cloud computing. This chapter covers the fundamental principles for secure cloud computing design, an essential subject for CSSP. To fully comprehend these challenges and best practices in cloud security, you must become well versed in the realities of the shared responsibility model, data protection measures, and robust access control techniques, just to name a few. With this solid foundation in place, organizations can confidently utilize their resources on the cloud with security ...

Get CCSP (ISC)2 Certified Cloud Security Professional Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.