CHAPTER 5: ASSESSING SECURITY IN THE CLOUD

In Chapter 4, we discussed why Cloud Computing security is different from traditional approaches to computing security. Among the reasons cited were:

  • Virtualisation  Many traditional security solutions rely on examining network traffic. In virtualised environments, network traffic often goes from one virtual machine to another without leaving the physical server, rendering network-attached security devices ineffective.
  • Dynamic environments  Virtualisation environments support dynamic placement and relocation of virtual machines to enable hardware failure resiliency and better application performance. The side effect of this is that security practices that assume a static environment are challenged to ...

Get Cloud Computing: Assessing the Risks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.