Covering your *aaS - A security checklist for cloud models
Join the DZone community and get the full member experience.
Join For FreeIf you ask three organizations how they are using the Cloud, you will
get (at least) three answers. One may be considering using Google Apps
for email, to avoid asking an admin to reboot mail servers at 4am to
clear an email backlog. Another may be considering using Terramark or
Amazon EC2 to spin up compute power to run processor-intensive work
(like DNA sequencing, let's say). Another may be considering using
Amazon's S3 as external storage. Here is where the *aaS model comes to
the rescue. Cloud usage fits relatively neatly into the different
categorizations of SaaS, PaaS, and IaaS.
Using this categorization, I recently wrote a cloud security introduction for CSO Magazine which uses these categories: SaaS, PaaS, and IaaS, to show how security applies differently in each case. Check it out...
Using this categorization, I recently wrote a cloud security introduction for CSO Magazine which uses these categories: SaaS, PaaS, and IaaS, to show how security applies differently in each case. Check it out...
Cloud
security
Published at DZone with permission of Mark O'Neill, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.
Trending
-
Software Development: Best Practices and Methods
-
Getting Started With Istio in AWS EKS for Multicluster Setup
-
Database Integration Tests With Spring Boot and Testcontainers
-
Introduction to API Gateway in Microservices Architecture
Comments