Security in the Cloud
Many security risks apply equally to traditional computing and cloud computing, but the relative immaturity and lack of standardization in cloud computing lead to security risks unique to that environment. This chapter provides a foundation for understanding security and risk and then applies those concepts to cloud security risks. Issues concerning privacy and compliance will be discussed in Chapter 12.
- Understanding security and risk
- Reviewing security standards
- Exploring common security risks and mitigations
- Implementing an ISMS
- Responding to incidents
- Recognizing security benefits
Understanding Security and Risk
Before discussing security risks specific to cloud computing, it is necessary to have a functional ...