O'Reilly logo

Cloud Computing: Assessing the Risks by Bernard Golden, JP Morgenthal, Jared Carstensen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5: ASSESSING SECURITY IN THE CLOUD

In Chapter 4, we discussed why Cloud Computing security is different from traditional approaches to computing security. Among the reasons cited were:

  • Virtualisation  Many traditional security solutions rely on examining network traffic. In virtualised environments, network traffic often goes from one virtual machine to another without leaving the physical server, rendering network-attached security devices ineffective.
  • Dynamic environments  Virtualisation environments support dynamic placement and relocation of virtual machines to enable hardware failure resiliency and better application performance. The side effect of this is that security practices that assume a static environment are challenged to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required