Appendix A. Information security refresher
In this appendix, we’ll review the basics of information security that will help you understand how security in the cloud works. We’ll cover six topics:
- Secret communications
- Keys
- Shared-key cryptography
- Public-key cryptography
- XML Signature
- XML Encryption
These topics are relevant because cloud providers, having based their services on web services, all use these security technologies in their everyday operations. As you’ll see, keys are issued the moment you sign up for cloud services. The APIs used to create and control machine instances all use one or more of these means to keep your operations secret and secure. Let’s begin with the concept of secret communications.
Secret communications ...
Get The Cloud at Your Service now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.