6
Cloud Data Security Concepts and Architectures
In the last chapter, you looked at how to evaluate your CSP. Reviewing and understanding the key cloud service contractual documents, such as acceptable use policies and service-level agreements, is a critical part of selecting and working with a cloud provider. As readers of this book are most certainly aware, cloud computing is one of the most visible and impactful tech trends of the past few decades. Thousands of organizations worldwide have adopted it. In the coming years, more businesses will embrace it to become cloud-native.
However, to maximize the return on their cloud investments in a secure way, businesses must first understand how their data will be stored, managed, and protected in ...
Get CCSP (ISC)2 Certified Cloud Security Professional Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.