Introduction
Adopting cloud computing as an information technology model allows organizations to transition away from more traditional device-centric models and toward information- and service-based models. However, adopting cloud computing comes with certain trade-offs in terms of control over data and applications, compliance with laws and regulations, and the ongoing security of the data in the cloud. The good news is that when a cloud is implemented with appropriate security in place, the resultant security level of the cloud can not only be equal to but can actually exceed traditional ...

Get Securing the Cloud now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.