Effectiveness of Strategies For Successful Cloud Exploitation
Strategies for Securing Cloud Environments
Keywords:
strategies, successful, cloud exploitation, cloud computing, generic securities issues, IT manager, roles and responsibilities, secure application development, least privilege, traditional environmentsAbstract
In this paper we present strategies for successful cloudexploitation. Cloud computing is becoming more and more more main brook, itbecomes harder to differentiate between the generic securities issues that anIT manager needs to tackle, from those that are specific to cloud computing.Things like roles andresponsibilities, secureapplication development, leastprivilege and many more apply equally well in traditionalenvironments as they do in the cloud.Downloads
Download data is not yet available.
Published
2013-02-01
Issue
Section
Articles