CHAPTER 33

Clouds Are Evil

John Strand

Black Hills Information Security

Sturgis, South Dakota

CONTENTS

33.1  Introduction

33.2  Command and Control

33.3  Cloudpassage

33.4  Summary

References

33.1  INTRODUCTION

It is often the case when humanity encounters something new and powerful that we jump in and embrace it without truly understanding the full implications of what we are dealing with. For example, when my father was a child he marveled at the beautiful glow from my grandfather’s watch with radium dials. My grandfather was part of the early Army experiments with nuclear testing and the watch was a gift. Years later, we understood the incredible danger associated with these beautiful timepieces. The point is, just because something is shiny ...

Get Cloud Computing Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.