O'Reilly logo

Cloud Computing: Assessing the Risks by Bernard Golden, JP Morgenthal, Jared Carstensen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4: CLOUD COMPUTING TOP SECURITY RISKS

In Chapter 2, we examined how Cloud Computing changes security, governance, risk and compliance. Building on that, in this chapter we will focus on the top security risks facing users of Cloud Computing.

Security – the shift from static to dynamic

Underlying every aspect of Cloud Computing security is the fact that the fundamental assumptions regarding the operating environment to which security practices are applied are different in the world of Cloud Computing.

In the past, security practices assumed the following:

  • Static and ‘owned’ computing environment  Security practices assumed that the foundations of computing environments – the data centre, physical infrastructure (electrical system, UPS, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required