Introduction
Adopting cloud computing as an information technology model allows organizations to transition away from more traditional device-centric models and toward information- and service-based models. However, adopting cloud computing comes with certain trade-offs in terms of control over data and applications, compliance with laws and regulations, and the ongoing security of the data in the cloud. The good news is that when a cloud is implemented with appropriate security in place, the resultant security level of the cloud can not only be equal to but can actually exceed traditional ...

Get Securing the Cloud now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.