Professional Documents
Culture Documents
Conclusion
This chapter has discussed how security in a Cloud
Computing environment differs from that in a traditional
dedicated data centre.
Part of the difference is due to the software technologies
used to implement Cloud Computing environments.
Virtualisation abstracts operating environments away from
physical servers and makes assumptions about static
computing environments obsolete. The automated
orchestration aspects of Cloud environments means that
manual implementation of security products, components,
and configurations cannot keep up with dynamic topologies
of Cloud applications.
Beyond the Cloud technology changes, Cloud Computing
environments are also quite different from traditional data
centres. Because Cloud environments are shared pools of
resources, many traditional security practices based on
Copyright @ 2012. IT Governance Publishing.
113
EBSCO : eBook Academic Collection (EBSCOhost) - printed on 3/17/2019 8:24 PM via OPEN UNIVERSITY
OF CYPRUS
AN: 571554 ; Carstensen, Jared, Golden, Bernard, Morgenthal, JP.; Cloud Computing : Assessing the
Risks
Account: ns020823.main.eds
4: Cloud Computing Top Security Risks
114
EBSCO : eBook Academic Collection (EBSCOhost) - printed on 3/17/2019 8:24 PM via OPEN UNIVERSITY
OF CYPRUS
AN: 571554 ; Carstensen, Jared, Golden, Bernard, Morgenthal, JP.; Cloud Computing : Assessing the
Risks
Account: ns020823.main.eds