Recently on SearchCloudSecurity
6 SaaS security best practices to protect applications
Use these SaaS security best practices to ensure your users' and organization's SaaS use stays as protected as the rest of your enterprise applications.
More Highlights
- Review these 7 CASB vendors to best secure cloud access
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these seven vendors stack up and protect access to cloud applications.
- CASB explained: Know its use cases before you buy
CASB tools help to secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology in a CASB explained tutorial.
- Organize a cloud IAM team to secure software-defined assets
Building a cloud IAM team with the necessary technical expertise and soft skills is key to securely managing IAM in complex cloud environments.
Definitions
- cloud access security broker (CASB)
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
- software-defined perimeter (SDP)
The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.
- hypervisor security
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.
Browse CloudSecurity Topics
Compliance and Governance
Learn how to maintain cloud computing compliance with government regulations and industry standards when moving IT operations and applications to a cloud environment. Also learn about cloud audit procedures, data governance for the cloud and other cloud computing management topics involving security.
Recent Definitions
- cloud access security broker (CASB)
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
- cloud SLA (cloud service-level agreement)
A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
- cloud computing
Cloud computing is a general term for anything that involves delivering hosted services over the internet.
Highlights
- Review these 7 CASB vendors to best secure cloud access
- CASB explained: Know its use cases before you buy
- Juggle a multi-cloud security strategy with these 3 steps
More Compliance and Governance Topics
- Cloud Compliance: Federal Regulations and Industry Regulations
- Cloud Computing Frameworks and Standards
- Cloud Computing Security Issues: Incident Response - Data Breach Prevention
- Cloud Computing SLAs and Legal Issues
- Evaluating Cloud Computing Providers
- PCI DSS Requirements for Cloud Computing
Virtualization
Virtualization is at the core of any cloud computing initiative, regardless of delivery model or deployment method. Service providers, or internal enterprise private cloud managers, use virtualization technology to realize efficiencies and flexibility offered by cloud computing. This section covers the risks and considerations around cloud computing virtualization security, including how to manage and ensure secure multitenancy of virtual machines on a single host, security risks and threats by Web-based hackers to the hypervisor, and how to handle data management and data governance.
Recent Definitions
- hypervisor security
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.
- virtual firewall
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.
- Cloudburst VM escape
Cloudburst VM (virtual machine) escape is an exploit method, credited to research firm Kostya Kortchinsky Immunity Inc., that takes advantage of IBM's Cloudburst cloud service provisioning software for cloud providers and a flaw in VMware Workstation to enable a guest-level virtual machine to attack its host.
Highlights
- Cloud workload protection platform security benefits, features
- Benefits of open source container vulnerability scanning
- Use these CCSK practice questions to prep for the exam
Operations
As your organization moves its infrastructure, applications and data into the cloud, security operations such as network security, vulnerability management, data protection and application security, as well as cloud-based security services, take on new importance. Learn how to handle cloud security management, including how to keep the integrity of your data and applications as they move to the cloud and how outsourced IT operations affect security operations.
Recent Definitions
- cloud access security broker (CASB)
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
- identity management (ID management)
Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
- What is configuration management? A comprehensive guide
Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
Highlights
- Review these 7 CASB vendors to best secure cloud access
- CASB explained: Know its use cases before you buy
- Organize a cloud IAM team to secure software-defined assets
More Operations Topics
- Cloud Data Storage, Encryption and Data Protection Best Practices
- Cloud Network Security Trends and Tactics
- Cloud Patch Management and Cloud Configuration Management
- Cloud Provisioning and Cloud Identity Management Issues
- Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
- Legacy Application Modernization for the Cloud
Architecture
Before purchasing or building cloud systems and services, learn the cloud computing security considerations and challenges involved the various cloud computing architecture models and how to address the "security in the cloud" challenge successfully.
Recent Definitions
- cloud access security broker (CASB)
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
- What is hybrid cloud? Everything you need to know
A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between these platforms.
- cloud computing
Cloud computing is a general term for anything that involves delivering hosted services over the internet.
Highlights
- 6 SaaS security best practices to protect applications
- Review these 7 CASB vendors to best secure cloud access
- CASB explained: Know its use cases before you buy
More Architecture Topics
- Cloud Computing Infrastructure as a Service (IaaS) Security
- Cloud Computing Platform as a Service (PaaS) Security
- Cloud Computing Software as a Service (SaaS) Security
- Hybrid and Private Cloud Computing Security
- Public Cloud Computing Security