Chapter 6
Using Cloud Security Services
IN THIS CHAPTER
Managing data protection
Instituting cloud security validation and multifactor authentication
Handling hardware security modules
Working with key management services
Exploring crypto service gateways
The number of cloud security services increases daily with the ever-changing cloud landscape. It’s almost impossible to keep up with all of them. If you've done your homework, you know what the risks are and you know where your vulnerabilities lie. Next comes the job of figuring out the cost effectiveness of either providing the services you need in-house or visiting the marketplace for solutions.
Though you may be responsible for providing security for your cloud environment — particularly, your data — you aren’t required to have at your fingertips all the capabilities you need. Keep your business goals in mind. Unless your business is cloud security, it's sometimes best to leave that task to people who eat, live, and breathe ...
Get Cybersecurity All-in-One For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.