CHAPTER 5: ASSESSING SECURITY IN THE CLOUD
In Chapter 4, we discussed why Cloud Computing security is different from traditional approaches to computing security. Among the reasons cited were:
- Virtualisation Many traditional security solutions rely on examining network traffic. In virtualised environments, network traffic often goes from one virtual machine to another without leaving the physical server, rendering network-attached security devices ineffective.
- Dynamic environments Virtualisation environments support dynamic placement and relocation of virtual machines to enable hardware failure resiliency and better application performance. The side effect of this is that security practices that assume a static environment are challenged to ...