Chapter 10
Cloud Security and Cybersecurity Access-Oriented Mechanisms
10.4 Cloud-Based Security Groups
10.5 Public Key Infrastructure (PKI) System
10.6 Single Sign-On (SSO) System
10.7 Hardened Virtual Server Image
10.9 Virtual Private Network (VPN)
10.11 Multi-Factor Authentication (MFA) System
10.12 Identity and Access Management (IAM) System
10.13 Intrusion Detection System (IDS)
10.14 Penetration Testing Tool
10.15 User Behavior Analytics (UBA) System
10.16 Third-Party Software Update Utility
Get Cloud Computing: Concepts, Technology, Security, and Architecture, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.