O'Reilly logo

Securing the Cloud by Vic Winkler

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Securing the Cloud: Key Strategies and Best Practices
Implementing effective security monitoring and vulnerability detection is a key strategy in cloud computing. Although security risks can be addressed in multiple ways, without a sound process and a considered strategy, efforts to accomplish this goal are often ineffective. This chapter details a forward-looking approach to security monitoring for a cloud implementation and presents best practices and key strategies for implementing, maintaining, and ensuring cloud security. Some of these practices are relevant to cloud ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required