Table of Contents
Chapter 1: Cloud security ecosystem
1 How it all started—the story of an online bookstore
2 Consolidation of terminologies and perspectives
3 The achilles’ heel—depending on a trust relationship
4 Top threats and vulnerabilities of cloud security
5 Managing cloud security risks with the deming cycle
6 Plan—threats, risk, and requirements landscape
7 Do—cloud security approaches and challenges
8 Check—forensics and incident response
Get The Cloud Security Ecosystem now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.