Chapter 4

Cloud Security

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Understand the different cloud computing architecture components.

  • Describe the cloud computing deployment models.

  • Understand the top cybersecurity risks in cloud deployments.

  • Describe cloud security best practices.

In a time when data is “the new gold,” and digital transformation is accelerating across all industries, cloud computing has emerged as a key technology that enables businesses to scale, innovate, and compete in the global market. However, as organizations increasingly migrate their operations, data, and applications to the cloud, the imperative to secure these assets against evolving threats ...

Get Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.