Chapter 6. Securing the Cloud: Key Strategies and Best Practices
Information in this Chapter
Implementing effective security monitoring and vulnerability detection is a key strategy in cloud computing. Although security risks can be addressed in multiple ways, without a sound process and a considered strategy, efforts to accomplish this goal are often ineffective. This chapter details a forward-looking approach to security monitoring for a cloud implementation and presents best practices and key strategies for implementing, maintaining, and ensuring cloud security. Some of these practices are relevant to cloud ...
Get Securing the Cloud now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.