Cloud computing is flexible, efficient, and cost-effective, but not without risks. To maximize its potential, you need to fully understand its vulnerabilities and how to offset them.
This guide thoroughly examines cloud fundamentals, architecture, risks, and security principles. Two leadingsecurity experts detail critical approaches and solutions, helping you achieve the maximum return on cloud investments without compromising the safety of your information.
Avoid leakage and unauthorized data access among virtual machines running on the same server
Properly handle sensitive information
Prevent release of critical data to law enforcement or government agencies without approval by the client
Follow compliance and regulatory requirements
Deal with system crashes or failures
Protect against hacker invasions into client applications hosted on the cloud
Implement solid, robust security protection
Manage interoperability that allows a client to easily move applications among different cloud providers and avoid "lock-in"
"This worthwhile addition to the growing library of cloud security books contains very helpful prescriptions for security policies and practices." (Computing Reviews, January 2011)