Chapter 6
Managing Cloud Resources
IN THIS CHAPTER
Protecting cloud resources
Managing a virtual world
Handling patch management
Tagging assets
Managing logs
Instituting a defense DIY strategy
You probably adhere to best practices when it comes to the security of your network and devices that attach to your network. Making the move to include cloud resources into the mix will require that you make a paradigm shift in your thinking. You must wrap your mind around a great deal more. Incorporating the cloud into your IT world means you’ve done away with the protected border you’ve been managing. A new, virtual border must now be envisioned for you to adequately protect your cloud resources. More importantly, because cloud resources are interconnected with your local network, your safely guarded perimeter is no longer safe. Figure 6-1 shows how you may have safely guarded your local network ...
Get Cloud Security For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.