Chapter 6

Managing Cloud Resources

IN THIS CHAPTER

Bullet Protecting cloud resources

Bullet Managing a virtual world

Bullet Handling patch management

Bullet Tagging assets

Bullet Managing logs

Bullet Instituting a defense DIY strategy

You probably adhere to best practices when it comes to the security of your network and devices that attach to your network. Making the move to include cloud resources into the mix will require that you make a paradigm shift in your thinking. You must wrap your mind around a great deal more. Incorporating the cloud into your IT world means you’ve done away with the protected border you’ve been managing. A new, virtual border must now be envisioned for you to adequately protect your cloud resources. More importantly, because cloud resources are interconnected with your local network, your safely guarded perimeter is no longer safe. Figure 6-1 shows how you may have safely guarded your local network ...

Get Cloud Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.