Cloud computing is flexible, efficient, and cost-effective, butnot without risks. To maximize its potential, you need to fullyunderstand its vulnerabilities and how to offset them.
This guide thoroughly examines cloud fundamentals, architecture,risks, and security principles. Two leadingsecurity experts detailcritical approaches and solutions, helping you achieve the maximumreturn on cloud investments without compromising the safety of yourinformation.
Avoid leakage and unauthorized data access among virtualmachines running on the same server
Properly handle sensitive information
Prevent release of critical data to law enforcement orgovernment agencies without approval by the client
Follow compliance and regulatory requirements
Deal with system crashes or failures
Protect against hacker invasions into client applications hostedon the cloud
Implement solid, robust security protection
Manage interoperability that allows a client to easily moveapplications among different cloud providers and avoid"lock-in"
"This worthwhile addition to the growing library of cloud securitybooks contains very helpful prescriptions for security policies andpractices." (Computing Reviews, January 2011)