
33
Chapter 3
Security in the Cloud
Sandy Bacik
Looking outside the organization to gain increased competitiveness, efficiency, flexibility, and,
potentially, lower cost is not new—it is simply outsourcing. So why is there so much hype about
cloud computing? Well, taking virtual machines containing critical, sensitive, and proprietary
information and applications off premise to public and shared environments creates new security
challenges. We have relied on network perimeter defense as the method to protect information
assets stored in a data center. is off premise virtual machines may also revoke compliance and
breach security policies. Information ...