Chapter 9: Securing the Cloud

FOR YEARS, IT DATA centers have been secured physically to prevent users who do not have a need to physically touch computers, servers, and storage devices from doing so. A general security rule is that if an individual can physically touch a device, the individual can more easily break into the device. As you might imagine, for many IT personnel the thought of hosting applications in the cloud is very concerning. When you consider cloud security issues, you should think in terms of two types of threats. Your first list of threats should correspond to the threats common to both cloud-based and on-site solutions. Your second list should focus on those concerns specific to the cloud.

Learning Objectives

This chapter examines examines cloud-based security in detail. By the time you finish this chapter, you will be able to do the following:

  • List the security advantages of using a cloud-based provider.
  • List the security disadvantages of using a cloud-based provider.
  • Describe common security threats to cloud-based environments.
Cloud Computing book cover

Chapter 9 Pretest/Self-Assessment

Visit the Jones & Bartlett Learning site additional technology book solutions.

Chapter 9 Related Content

McAfee Security as a Service

Cloud Security Alliance

European Network and Information Security Agency (ENISA)