Skip to main content

Posts

Showing posts from July, 2010

Cloud Security - is it very different

Many a times it is difficult to find the reasons as to why a cloud application security is very different than any other approaches. A cloud is very similar to a private hosted data center sans the physical security aspects of it. The various components that build up the system can very well be built into the cloud. IdMs, RBACs, Key or Token based Systems. It is only a matter of time where in the Cloud Providers will partner with all these providers to get the economies of scale. The approach to the cloud model is not very much different than to a colocation or a private cloud. The Hypervisor is another component that needs to be managed as part of the Vulnerability Management of resources. What is applicable in a traditional model is still applicable to the cloud and in addition the concerns of the cloud. A few questions to answer.. It is more a logical data flow diagram which can help you identify the type of data on move and at rest and the necessary logical controls therefore r