Displaying articles for: 07-01-2012 - 07-07-2012
In the last two blog posts we discussed 7 aspects that need to be taken into account to ensure cloud security. But is addressing those individually good enough? In my mind not. I suggest looking at end-to-end scenarios that look at the interaction points between the aspects described previously. I also believe attacks will happen, so it's as important to spot them early and react quickly than to put defences up. Combining both in a "avoid, protect, identify, react" scenario is the key to ensure proper security in cloud and limit risk.
Last week I started discussing the 7 aspects needed to be reviewed in regards of cloud security. I discussed mobile, network and physical security. This time I describe the four remaining, platform, application & data security as well as identity & access management. Going back to the initial question, what levels of security are we prepared to implement and what risks can we afford. Let me know if you agree with my views by commenting on the article or discussing the subject the linkedIN discussion.